Professional Documents
Culture Documents
Try to fool the targeted receivers that the messages are sent by the
real person.
In vulnerable connection, to depend only on cryptography
mechanisms are inadequate.
Like
Digital
certificate
Is
Identification :
Proves identity (verifies the sender of the information).
Grant the right to access information or other services online.
Includes insuring the identity of all parties involved in a transaction.
Encryption:
Used in secure web transactions.
Contain the key used to encrypt the data.
Non-repudiation:
Elgamal signature
clear
can
private
initial
final
criteria:
criteria
general security
ease of software & hardware implementation
implementation attacks
flexibility (in en/decrypt, keying, other factors)
designed
by Rijmen-Daemen in Belgium
has 128/192/256 bit keys, 128 bit data
an iterative rather than feistel cipher
designed
to be:
data
initial
round
with fast XOR & table lookup implementation
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Byte5
Byte9
Byte13
Byte2
Byte6
Byte10
Byte14
Byte3
Byte7
Byte11
Byte15
Byte4
Byte8
Byte12
Byte16
attacks
1st
row is unchanged
2nd row does 1 byte circular shift to left
3rd row does 2 byte circular shift to left
4th row does 3 byte circular shift to left
decrypt
since
in
knowing
but