Chapter ONE: Begining with a Simple Communication Game
Three Important Aspects To Serve As General Guidelines for Security System Designers and Implementors:
1. Be Explicit About All Assumptions Needed
(i) Identify All Assumptions Made in The Protocol.
(ii) for Each Assumption in Step (i), DETERMINE The Effect On The Security of The Protocol if That Assumption Were Violated.
2.be Explicit About Exact Security Services To Be Offered
Further Refinement of The General Services IS Necessary. Here Are Some Examples:
Confidentiality => Privacy, Anonymity, Invisibility, IndiStinguishability
Authentication => DATE-Origin, Data-Integrity, Peer-Entity
Non-reputation => Message-INSSURANCE, MESSAGE-Receipt
Proof of knowge => Knowledge Possession, Knowledge Structure
3. Be Explicit About Special Cases in Mathematics
There Some Exeptions In The Hard Mathematics Problems, Like "SuperSingular Curves Super Sites" and "Anomalous Curves Informal Curve" IN ECC. Also, in the big intensive decomposition, if the two prime p and q are adjacent, this problem is easy.