02/05/08 (Tu, Lecture 4): In this lecture we covered simple DES and then "full"
DES by analogy. We also discussed various modes of operation (such as ECB, CBC, OFB, and CTR). These modes of operation allow you to use block ciphers to process arbitrary sized messages.
02/07/08 (Th, Lecture 5): We finished our discussion on modes of operation. We
covered 2DES and 3DES. Moreover, we showed a meet-in-the-middle attack on
2DES. We started discussing mathematical background that we need for covering public-key cryptography. Some of the topics are GCD, Fermat's Little Theorem (FLT), and Chinese Remainder Theorem (CRT). I handed out a 5-page document on these topics.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment