ELEC5616_Computer And Network Security_2014 Semester 1_CNS_Lecture_14

更新时间:2023-06-03 18:31:42 阅读: 评论:0

b级成绩查询ELEC5616 COMPUTER & NETWORK SECURITY
Lecture 14:
Cryptographic Protocols II
SECRET SPLITTING
Problem: You are the CEO of Coca-Cola. You’re responsible for keeping the formula cret from Pepsi’s industrial spies. You could tell your most trusted employees, – They could defect to the opposition – They could fall to rubber ho cryptanalysis How can we split a cret among two or more parties where each piece by itlf is uless?
英语语法培训
SECRET SPLITTING学校消防
Simple XOR Algorithm: Assume Trent wishes to protect message m: 1. Trent generates a random bit string r, the same length m 2. Trent computes s = m ⊕ r 3. Trent gives Alice r 4. Trent gives Bob s Each piece is called a shadow To reconstruct m, Alice and Bob XOR their shadows together If r is truly random, the system is perfectly cure (OTP) To extend the scheme to n people, generate n random bit strings (e.g. m ⊕ r ⊕ s ⊕ t = u)
tempo丶topteam
SECRET SPLITTING
Secret splitting aims to enhance reliability without increasing risk through distributing trust Issues: The system is adjudicated by Trent
Trent can hand out rubbish and say it’s part of the cret He can hand out a piece to Alice, Bob, Carol and Dave, and later tell everyone that only the first three pieces are needed and Dave is fired
All parties know the length of the message
It’s the same length as their piece of message
orgasmThe message is malleable
Alice can manipulate her shadow to “blind” it or alter bits in a known way (like flipping)
turnaroundAll parties are required to recover message (bus factor = 1)
SECRET SHARING
insultProblem: You are responsible for a small third-world country’s nuclear weapons program. You want tbyr
o ensure that no single lunatic can launch a missile. You want to ensure that no two lunatics can collude to launch a missile. You want at least three of five officers to be lunatics before a missile can be launched (bus factor = 3) We call this a (3,5)-threshold scheme
constant是什么意思
SHAMIR’S [T,N]-THRESHOLD SCHEME国土安全第一季
Bad on polynomial interpolation, and the fact that a polynomial y=f(x) of degree t-1 is uniquely defined by t points (x,y) Trent wishes to distribute message m amongst n urs, where any group of t urs can recover m (bus factor = n-t+1) Setup – Trent choos a prime p > max(m, n) – Trent ts a0 = m – Trent lects t-1 random, independent coefficients (a1…at-1 (0 ≤ aj ≤ p-1), defining the polynomial f(x) = Σj=0t-1 ajxj ) – Trent computes yi = f(xi) mod p (1 ≤ xi ≤ p-1) (just any random points on the curve ) – Trent nds share (xi,yi) to ur i

本文发布于:2023-06-03 18:31:42,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/78/850690.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:查询   英语语法   消防
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图