Block Cipher
DES
DES
stand for Data Encryption Standard
.
Spectral properties of S-Box:
- Hadamard transform: $$\displaystyle f(w) = \sum_{x \in F_2^n} (-1)^{f(x) + xw}$$
- Avalanche transform: $$\displaystyle A(w) = \sum_{x \in F_2^n} (-1)^{f(x) + f(x + w)}$$
Triple-DES: $$C = E_{K_3} (D_{K_2} (E_{K_1}(M)))$$ or $$C = D_{K_3} (E_{K_2} (D_{K_1}(M)))$$
Encryption Modes:
- Electronic Codebook (
ECB
) Mode => Security risks. - Cipher Block Chaining (
CBC
) Mode.
Montgomery Ladder
A compute algorithm that resist side-chanel attack.
|
|
AES
Stream Cipher & Block Cipher
Block Cipher: more computationally costly.
Stream Cipher: More desired randomness properties.
Hash Functions
Why Hash?
- Save Storage
- Efficient
- Additional information for integrity check
Hash Standards:
- MD5, Rivest
- SHA-1
- SHA-2
- SHA-3 Kecchak
SHA-1
IBC
(Identity-Based Cryptography)
Extract:
The public key $$Q_i \in \mathbb{G}_1^*$$ of node i with identity $$ID_i$$ is as $$Q_i = H_1(ID_i)$$, where ID
is an arbitrarily long binary string. The KGC derive
Encryption & Decryption:
Encryption:
When a user is transmitting a message
m
to user i confidentially, he encryptsm
using user i’s public key and the system parameter in the following way: $$Encrypte(m) \rightarrow C$$When C is computed by:
- Randomly choose $$\sigma \in {0, 1}^*$$, and compute $$r =$$