"MODERN CRYPTOGROPHY: THEORY AND PRACTICE" learning notes first chapter

xiaoxiao2021-03-06  63

Chapter ONE: Begining with a Simple Communication Game

Three Important Aspects To Serve As General Guidelines for Security System Designers and Implementors:

1. Be Explicit About All Assumptions Needed

(i) Identify All Assumptions Made in The Protocol.

(ii) for Each Assumption in Step (i), DETERMINE The Effect On The Security of The Protocol if That Assumption Were Violated.

2.be Explicit About Exact Security Services To Be Offered

Further Refinement of The General Services IS Necessary. Here Are Some Examples:

Confidentiality => Privacy, Anonymity, Invisibility, IndiStinguishability

Authentication => DATE-Origin, Data-Integrity, Peer-Entity

Non-reputation => Message-INSSURANCE, MESSAGE-Receipt

Proof of knowge => Knowledge Possession, Knowledge Structure

3. Be Explicit About Special Cases in Mathematics

There Some Exeptions In The Hard Mathematics Problems, Like "SuperSingular Curves Super Sites" and "Anomalous Curves Informal Curve" IN ECC. Also, in the big intensive decomposition, if the two prime p and q are adjacent, this problem is easy.

转载请注明原文地址:https://www.9cbs.com/read-120220.html

New Post(0)