1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Network security: Chapter 19 - Dr. Munam Ali Shah

27 72 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 27
Dung lượng 694,09 KB

Nội dung

The topic discussed in this chapter are: Attacks on pseudorandom generators, tests for pseudorandom functions, true random generators. After studying this chapter you will be able to present an understanding of the random numbers and pseudorandom numbers; understand the use and implementation of TRNG, PRNG and PRF.

Network Security Lecture 19 Presented by: Dr Munam Ali Shah Summary of the Previous Lecture ■ We have discussed public/ asymmetric key cryptography in detail and RSA was discussed as an example ● RSA Algorithm ■ We have explored the TRNG and PRNG ● Introduction to Pseudorandom Numbers ● Some Pseudorandom Number Generators Summary of the Previous Lecture ■ by Rivest, Shamir & Adleman of MIT in 1977 ■ best known & widely used public-key scheme ■ Block cipher scheme: plaintext and ciphertext are integer between to n-1 for some n ■ Use large integers e.g n = 1024 bits Summary of the Previous Lecture ■ sample RSA encryption/decryption is: ■ given message M = 88 (nb 88

Ngày đăng: 30/01/2020, 11:22