11.07.2015 Views

Slides - Inria

Slides - Inria

Slides - Inria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Add Randomness in the Encryption ProcessSchemes from Plotkin arraysCAIAF2011D. E. SimosPrivate-KeyCryptosystemsMotivationCryptographicAlgorithmsEncryptionSchemesCryptanalysisConclusionPlotkin Cipher (Koukouvinos and Simos, AMIS, 2011)Encryption: Divide a message m of arbitrary length into blocksm 1 , . . . , m q of length 4 (padding the last block with zeros ifnecessary)Randomness: Random vectors g 1 , . . . , g q of length 4 areconstructed using pseudorandom generatorsEncryption matrix: The Plotkin array of order 8 and type(1, 1, 1, 1, 1, 1, 1, 1), denoted by P , whereP P T = (A 2 + B 2 + . . . + H 2 )I 8Encryption process: The matrix P is applied successively tom i ⊕ g iCiphertext: c = P (m 1 ⊕ g 1 ) ⊕ . . . ⊕ P (m q ⊕ g q )Decryption: Divide c into blocks c 1 , . . . , c q of size 8 andcompute P T c i /fKey k: The chosen entries A, B, . . . , H of P ; (integer numbers)13 / 26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!