applied cryptography - protocols, algorithms, and source code in c

175179 124 ch bennett and g brassard an update on

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ned char key = {0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19}; printf(“1\n”); seal_key(&ampsc,key); printf(“2\n”); for(i=0;i<1000;i++) buf[i]=0; printf(“3\n”); seal_encrypt(&ampsc,buf,1000); printf(“4\n”); t = 0; for(i=0;i<1000;i++) t = t ^ buf[i]; printf(“XOR of buf is %08lx.\n”,t); seal_key(&ampsc,key); seal_decrypt(&ampsc,buf,1); seal_decrypt(&ampsc,buf+1,999); flag = 0; for(i=0;i<1000;i++) if(buf[i]!=0)flag=1; if(flag) printf(“Decrypt failed.\n”); else printf(“Decrypt succeeded.\n”); } References 1. ABA Bank Card Standard, “Management and Use of Personal Information Numbers,” Aids from ABA, Catalog no. 207213, American Bankers Association, 1979. 2. ABA Document 4.3, “Key Management Standard,” American Bankers Association, 1980. 3. M. Abadi, J. Feigenbaum, and J. Kilian, “On Hiding Information from an Oracle,” Proceedings of the 19th ACM Symposium on the Theory of Computing, 1987, pp. 195–203. 4. M. Abadi, J. Feigenbaum, and J. Kilian, “On Hiding Information from an Oracle,” Journal of Computer and System Sciences, v. 39, n. 1, Aug 1989, pp. 21–50. 5. M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” Research Report 125, Digital Equipment Corp Systems Research Center, Jun 1994. 6. C.M. Adams, “On Immunity Against Biham and Shamir’s ‘Differential Cryptanalysis,’” Information Processing Letters, v. 41, 14 Feb 1992, pp. 77–80. 7. C.M. Adams, “Simple and Effective Key Scheduling for Symmetric Ciphers,” Workshop on Selected Areas in Cryptography—Workshop Record, Kingston, Ontario, 5–6 May 1994, pp. 129–133. 8. C.M. Adams and H. Meijer, “Security–Related Comments Regarding McEliece’s Public–Key Cryptosystem,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 224–230. 9. C.M. Adams and S.E. Tavares, “The Structured Design of Cryptographically Good S–Boxes,” Journal of Cryptology, v. 3, n. 1, 1990, pp. 27–41. 10. C.M. Adams and S.E. Tavares, “Designing S–B...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online