From 752f08937a1ef987dbb371b44cae5e17c82ab52c Mon Sep 17 00:00:00 2001 From: Sungchan Yi Date: Wed, 13 Nov 2024 11:09:38 +0900 Subject: [PATCH] [PUBLISHER] upload files #172 * PUSH NOTE : 3. Symmetric Key Encryption.md * PUSH NOTE : 03. Symmetric Key Cryptography (2).md * DELETE FILE : _posts/lecture-notes/modern-cryptography/2023-09-18-symmetric-key-cryptography-2.md --- .../2023-09-19-symmetric-key-encryption.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/_posts/lecture-notes/modern-cryptography/2023-09-19-symmetric-key-encryption.md b/_posts/lecture-notes/modern-cryptography/2023-09-19-symmetric-key-encryption.md index 6ad1e33..4cb7ae9 100644 --- a/_posts/lecture-notes/modern-cryptography/2023-09-19-symmetric-key-encryption.md +++ b/_posts/lecture-notes/modern-cryptography/2023-09-19-symmetric-key-encryption.md @@ -132,7 +132,7 @@ Additional explanation available in [Modes of Operations (Internet Security)](.. ### Electronic Codebook Mode (ECB) -![is-03-ecb-encryption.png](../../../assets/img/posts/lecture-notes/modern-cryptography/is-03-ecb-encryption.png) +![is-03-ecb-encryption.png](../../../assets/img/posts/is-03-ecb-encryption.png) - ECB mode encrypts each block with the same key. - Blocks are independent of each other. @@ -140,7 +140,7 @@ Additional explanation available in [Modes of Operations (Internet Security)](.. ### Ciphertext Block Chain Mode (CBC) -![is-03-cbc-encryption.png](../../../assets/img/posts/lecture-notes/modern-cryptography/is-03-cbc-encryption.png) +![is-03-cbc-encryption.png](../../../assets/img/posts/is-03-cbc-encryption.png) Let $X = \left\lbrace 0, 1 \right\rbrace^n$ and $E : \mathcal{K} \times X \rightarrow X$ be a **PRP**. @@ -191,7 +191,7 @@ Note that if $k_1$ is the same as the key used for encrypting messages, then thi ### Counter Mode (CTR) -![is-03-ctr-encryption.png](../../../assets/img/posts/lecture-notes/modern-cryptography/is-03-ctr-encryption.png) +![is-03-ctr-encryption.png](../../../assets/img/posts/is-03-ctr-encryption.png) Let $F : \mathcal{K} \times X \rightarrow X$ be a secure **PRF**.