[PUBLISHER] upload files #158

* PUSH NOTE : 9. Public Key Encryption.md

* PUSH NOTE : 3. Symmetric Key Encryption.md

* PUSH ATTACHMENT : is-03-ecb-encryption.png

* PUSH ATTACHMENT : is-03-cbc-encryption.png

* PUSH ATTACHMENT : is-03-ctr-encryption.png

* PUSH NOTE : 03. Symmetric Key Cryptography (2).md

* PUSH NOTE : 5. CCA-Security and Authenticated Encryption.md

* DELETE FILE : _posts/lecture-notes/modern-cryptography/2023-09-18-symmetric-key-cryptography-2.md

* DELETE FILE : assets/img/posts/Lecture Notes/Modern Cryptography/is-03-cbc-encryption.png

* DELETE FILE : assets/img/posts/Lecture Notes/Modern Cryptography/is-03-ctr-encryption.png

* DELETE FILE : assets/img/posts/Lecture Notes/Modern Cryptography/is-03-ecb-encryption.png
This commit is contained in:
2024-11-12 20:44:37 +09:00
committed by GitHub
parent eeba575c28
commit 187179afaf
2 changed files with 460 additions and 3 deletions

View File

@@ -132,7 +132,7 @@ Additional explanation available in [Modes of Operations (Internet Security)](..
### Electronic Codebook Mode (ECB)
![is-03-ecb-encryption.png](../../../assets/img/posts/is-03-ecb-encryption.png)
![is-03-ecb-encryption.png](../../../assets/img/posts/Lecture%20Notes/Modern%20Cryptography/is-03-ecb-encryption.png)
- ECB mode encrypts each block with the same key.
- Blocks are independent of each other.
@@ -140,7 +140,7 @@ Additional explanation available in [Modes of Operations (Internet Security)](..
### Ciphertext Block Chain Mode (CBC)
![is-03-cbc-encryption.png](../../../assets/img/posts/is-03-cbc-encryption.png)
![is-03-cbc-encryption.png](../../../assets/img/posts/Lecture%20Notes/Modern%20Cryptography/is-03-cbc-encryption.png)
Let $X = \left\lbrace 0, 1 \right\rbrace^n$ and $E : \mathcal{K} \times X \rightarrow X$ be a **PRP**.
@@ -191,7 +191,7 @@ Note that if $k_1$ is the same as the key used for encrypting messages, then thi
### Counter Mode (CTR)
![is-03-ctr-encryption.png](../../../assets/img/posts/is-03-ctr-encryption.png)
![is-03-ctr-encryption.png](../../../assets/img/posts/Lecture%20Notes/Modern%20Cryptography/is-03-ctr-encryption.png)
Let $F : \mathcal{K} \times X \rightarrow X$ be a secure **PRF**.