Cryprography: Difference between revisions
Jump to navigation
Jump to search
(New page: This page just gathers miscellaneous remarks I collected on Cryptography in general. No effort is made to tidy things up. This will be done as soon as the page gets some volume... == Str...) |
(Redirected page to Cryptography) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
#REDIRECT [[Cryptography]] |
|||
This page just gathers miscellaneous remarks I collected on Cryptography in general. |
|||
No effort is made to tidy things up. This will be done as soon as the page gets some volume... |
|||
== Stream Cipher == |
|||
=== Security Properties === |
|||
* Stream cipher building block must be invertible, otherwise it is easy to create collisions. |
|||
== Hash Functions == |
|||
=== Security Attacks === |
|||
* Man-in-the-Middle pre-image attacks. |
|||
: Principle is to generate a message m = m<sub>1</sub>||m<sub>2</sub>, such that H(m)=h. If H(m)=g(F(IV,m<sub>1</sub>),m<sub>2</sub>), the MITM attacks consists in generate random m<sub>1</sub>, m<sub>2</sub> until one get G<sup>-1</sup>(h,m<sub>2</sub>) = F(IV,m<sub>1</sub>). Power of the attack relies on the fact that probability of finding a collision is inv. prop. to sqrt of the state size. |
|||
: ''''Countermeasures'''' - prevent attacker to exploit symmmetry properties between round so that he can't discard part of the state, or control part of the state. Make attacker to use too much memory. |
Latest revision as of 11:02, 16 January 2014
Redirect to: