applied cryptography - protocols, algorithms, and source code in c

Applied cryptography protocols algorithms and source code in c

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: an, Leonard M., 163–164, 467 Adler, Roy, 266 Agnew, G. B., 423 Algebraic structure, DES, 282–283 Algorithm M, 393–394 Algorithms, 2–4, 17 all-or-nothing disclosure of secrets, 543–546 Asmuth-Bloom, 529–530 Barrett’s, 244 Berlekamp-Massey algorithm, 380, 404 block chain mode, 206–207 choosing, 354–355 replay, 191–193 breaking, 8 CAST, 334–335 choosing, 214–216 cipher block chaining mode, 193–197, 208–210 cipher block chaining of plaintext difference mode, 208 cipher block chaining with checksum, 207–208 cipher-feedback mode, 200–202, 208–210 cipher mode choosing, 208–210 summary, 209 classes, 217 coin flipping using Blum integers, 543 using exponentiation modulo p, 542–543 using square roots, 541–542 complexity, 237–239 constant, 238 convertible undeniable signatures, 538–539 counter mode, 205–206, 209 cubic, 238 data compression, 226 designated confirmer signatures, 539–540 Diffie-Hellman, fair, 546–547 digital signatures, 39 exponential, 238 for export, 215–216 extended Euclidean, 246–248 factoring, 256 ISO/IEC 9979 registered, 607 Karnin-Greene-Hellman, 530 Khafre, 317–318 Khufu, 317 linear, 238 linear syndrome, 381 modes, DES, 277–278 multiple block cascading, 367–368 combining, 368 multiple-key public-key cryptography, 527–528 oblivious transfer, 550 one-way accumulators, 543 output-feedback mode, 203–205, 208–210 output feedback with a nonlinear function, 208 plaintext block chaining mode, 208 plaintext feedback mode, 208 polynomial, 238 polynomial-time, 238 probabilistic encryption, 552–554 propagating cipher block chaining mode, 207 public-key, 4–5, 33 quadratic, 238 quantum cryptography, 554–557 restricted, 3 running times, 238–239 secret-sharing algorithms, 528–531 secure multiparty computation, 551–552 Algorithms (Cont.) security, 8–9 self-synchronizing stream cipher, 198–199 stream ciphers, 197–198 subliminal-channel signature, 79 superpolynomial, 238 symmetric, 4 synchronous stream cipher, 202–203 TEA, 346 types, 189 unconditionally secure, 8 undeniable digital signatures, 536–539 using, 213–229 vector scheme, 529 zero-knowledge proofs, 548–550 See also Block ciphers; Stream ciphers All-or-nothing disclosure of secrets, 96, 543–546 voting with a single central facility, 128–130 Alternating stop-and-go generator, 383, 385, 410–411 American National Standards Institute, DES approval, 267–268 Anderson, Ross, 391 ANDOS, see All-or-nothing dis...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online