26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110 INTERNET SECURITY<br />

Example 3.22 Compute (57) • (13) = (fe)<br />

(57) = (01010111)<br />

(57) • (02) = xtime(57) = (10101110) = (ae)<br />

(57) • (04) = xtime(ae) = (01011100) ⊕ (00011011)<br />

= (01000111) = (47)<br />

(57) • (08) = xtime(47) = (10001110) = (8e)<br />

(57) • (10) = xtime(8e) = (00011100) ⊕ (00011011) = (07)<br />

Thus, it follows that<br />

(57) • (13) = (57) •{(01) ⊕ (02) ⊕ (10)}<br />

= (57) ⊕ (57) • (02) ⊕ (57) • (10)<br />

= (57) ⊕ (ae) ⊕ (07)<br />

= (01010111) ⊕ (10101110) ⊕ (00000111)<br />

= (11111110) = (fe)<br />

Polynomials with finite field elements in GF(2 8 )<br />

A polynomial a(x) with byte-coefficient in GF(2 8 ) can be expressed in word form as:<br />

a(x) = a3x 3 + a2x 2 + a1x + a0 ⇔ a = (a0,a1,a2,a3)<br />

To illustrate the addition and multiplication operations, let<br />

b(x) = b3x 3 + b2x 2 + b1x + b0 ⇔ b = (b0,b1,b2,b3)<br />

be a second polynomial.<br />

Addition is performed by adding the finite field coefficients of like powers of x<br />

such that<br />

a(x) + b(x) = (a3 ⊕ b3)x 3 + (a2 ⊕ b2)x 2 + (a1 ⊕ b1)x + (a0 ⊕ b0)<br />

This addition corresponds to an XOR operation between the corresponding bytes in each<br />

of the words. Multiplication is achieved as shown below:<br />

The polynomial product c(x) = a(x) • b(x) is expanded and like powers are collected<br />

to give<br />

c(x) = a(x) • b(x) = c6x 6 + c5x 5 + c4x 4 + c3x 3 + c2x 2 + c1x + c0<br />

= (c6,c5,c4,c3,c2,c1,c0)<br />

TEAMFLY<br />

Team-Fly ®

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!