Theoretical Background on Cryptographic Primitives

نویسنده

  • Bogdan Groza
چکیده

This material intends to be a brief introduction to symmetric and asymmetric cryptographic primitives, pointing out some relevant design principles and security properties. Nonetheless, we call attention to the correct practical use and current standards. This material is intended in part to serve as theoretical background for practical laboratory works were you will get accustomed with the use of cryptographic functions in a more practical way, e.g., by using cryptographic libraries in some programming environment or by analysing protocols. 4 1. Theoretical background on cryptographic primitives 1 Theoretical background on cryptographic primitives We begin with symmetric cryptographic constructions, i.e., functions that rely on the same key for both en-cryption and decryption. The fact that the same key is used for both operations should not be interpreted in a strict way, the keys can actually be distinct but it is mandatory that one can be easily computed from the other (in contrast to assymetric primitives). We also group in this sections a class of primitives that do not require a key: hash functions. The reason for this is that they rely more or less on the same design principles and more, they form the basis of the keyed primitive called Message Authentication Code (MAC). A final subject that we encounter is the construction of some pseudo-random number generators, we stay here to a very shallow approach that exemplifies some basic constructions. Subsequently, we address asymmetric functions, that is, functions that rely on two distinct keys for encryption and decryption (or signing and verification). Since one of the keys (the decryption or signing key) is always kept secret this is also referred as the private key, while its counterpart is made publicly available, hence the name public key. Moreover, computing the private part of the key from the public part must be infeasible. A symmetric key cryptosystem, also referred to as symmetric encryption scheme, requires the existence of three algorithms: the encryption and decryption algorithms which are an immediate need, but also a key generation algorithm. While the key generation algorithm may do nothing more but picking at random a key, it is core to the security of the scheme and cannot be neglected in the definition (some key generation algorithms do more than picking keys at random as keys need to have a predefined format, this is more prominent in the case of public key primitives). Briefly, the symmetric encryption algorithm …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Cryptographic Primitives for Information Authentication - State of the Art

This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signature schemes; the first class can be divided into Manipulation Detection Codes (MDCs, also known as one-way and collision resistant hash functions) and Message Authentication Codes (or MACs). The theoretical background...

متن کامل

Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...

متن کامل

On Related-Secret Pseudorandomness

Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among keys to circumvent security properties. Security against related-key attacks has been a subject of study in numerous recent cryptographic papers. However, most of these results are attacks on specific constructions, whi...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015