Cryprography: Difference between revisions

From miki
Jump to navigation Jump to search
(New page: This page just gathers miscellaneous remarks I collected on Cryptography in general. No effort is made to tidy things up. This will be done as soon as the page gets some volume... == Str...)
 
(Redirected page to Cryptography)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
#REDIRECT [[Cryptography]]
This page just gathers miscellaneous remarks I collected on Cryptography in general.

No effort is made to tidy things up. This will be done as soon as the page gets some volume...

== Stream Cipher ==

=== Security Properties ===

* Stream cipher building block must be invertible, otherwise it is easy to create collisions.


== Hash Functions ==

=== Security Attacks ===

* Man-in-the-Middle pre-image attacks.
: Principle is to generate a message m = m<sub>1</sub>||m<sub>2</sub>, such that H(m)=h. If H(m)=g(F(IV,m<sub>1</sub>),m<sub>2</sub>), the MITM attacks consists in generate random m<sub>1</sub>, m<sub>2</sub> until one get G<sup>-1</sup>(h,m<sub>2</sub>) = F(IV,m<sub>1</sub>). Power of the attack relies on the fact that probability of finding a collision is inv. prop. to sqrt of the state size.
: ''''Countermeasures'''' - prevent attacker to exploit symmmetry properties between round so that he can't discard part of the state, or control part of the state. Make attacker to use too much memory.

Latest revision as of 11:02, 16 January 2014

Redirect to: