![](https://img-blog.csdnimg.cn/20201014180756925.png?x-oss-process=image/resize,m_fixed,h_64,w_64)
cryptography
Drscq
STRIVE FOR MY DREAM
展开
-
Understanding Zero Knowledge Proofs (ZKP)
零知识证明(ZKP)是密码学中的一个迷人概念,其中一方(证明者)可以向另一方(验证者)证明他们知道一个值,而不透露关于该值的任何信息。原创 2024-07-05 03:05:41 · 473 阅读 · 0 评论 -
In the modern cryptography, we can use the exponential equation to design the encryption. What is th
In modern cryptography, the two main counterparts often referred to when using exponential equations to design encryption are:Discrete Logarithm Problem (DLP): This is a well-known hard problem that forms the basis for the security of many cryptographic s原创 2024-07-04 00:31:16 · 361 阅读 · 0 评论 -
Puncturable Pseudorandom Functions
伪随机函数(PRF)是一种函数,它接受一个输入并产生一个输出,这个输出对于任何有效的算法来说都无法与随机区分。伪随机函数可以看作是一种确定性地生成随机看起来的值的方法。可穿刺伪随机函数(PRF)是一种伪随机函数,它允许生成可以在除了指定的一组点之外的所有点上评估伪随机函数的密钥。穿刺密钥不会泄露任何关于穿刺点处的伪随机函数值的信息。可穿刺伪随机函数对于诸如前向保密、撤销和混淆等应用很有用。原创 2023-09-14 07:27:41 · 475 阅读 · 0 评论 -
现代密码学的优势:一位拥有 10 年以上经验的专家的观点 (NewBing)
但是,由于现代密码学技术的应用,你的信用卡信息将被加密,只有授权用户(如银行)才能解密并访问它。例如,你在网上订购了一件红色毛衣,但由于数据完整性受到破坏,你收到的却是一件绿色毛衣。想象一下,你接到一个电话,声称是你的银行打来的,并要求你提供个人信息。但是,在现代密码学中,通信双方都需要通过认证过程来验证彼此身份,从而防止欺诈行为。作为一名拥有 10 年以上经验的密码学专家,我可以告诉你,现代密码学是一项了不起的技术。总之,现代密码学为我们提供了强大的安全保障,并使我们能够安全地进行在线交易和通信。原创 2023-04-11 11:59:57 · 82 阅读 · 0 评论 -
现代密码学的优势:一位拥有 10 年以上经验的专家的观点 (NewBing)
但是,由于现代密码学技术的应用,你的信用卡信息将被加密,只有授权用户(如银行)才能解密并访问它。例如,你在网上订购了一件红色毛衣,但由于数据完整性受到破坏,你收到的却是一件绿色毛衣。想象一下,你接到一个电话,声称是你的银行打来的,并要求你提供个人信息。但是,在现代密码学中,通信双方都需要通过认证过程来验证彼此身份,从而防止欺诈行为。作为一名拥有 10 年以上经验的密码学专家,我可以告诉你,现代密码学是一项了不起的技术。总之,现代密码学为我们提供了强大的安全保障,并使我们能够安全地进行在线交易和通信。原创 2023-04-05 12:02:44 · 134 阅读 · 0 评论 -
The Study Plan for Reading the Book “Introduction to Modern Cryptography“ byJonathan Katz and Yehuda
This is just a suggestion, and you can adjust the timeline based on your own pace and schedule. Let me know if you have any other questions.原创 2023-03-18 19:03:15 · 44 阅读 · 0 评论 -
To See the Basic Uses of libtomcrypt from an example of AES-CTR
The description of functions for following codesThe functions of the block could be categorized bygenerate dataencrypt datadecrypt dataThe codes in three different filesfile_1 named Block.hpp#ifndef BLOCK_HPP#define BLOCK_HPP#include "config.hpp原创 2022-04-26 18:45:27 · 361 阅读 · 0 评论 -
The test for AES-CTR cipher with encryption and decrypiton in different time
string path = clientDataDir + "TEST"; int signal; Block block; Block *block_test = new Block(); unsigned char plaintext[BLOCK_SIZE], deciphertext[BLOCK_SIZE]; unsigned char ciphertext[BLOCK_SIZE]; if (block_test->set_data() != 0原创 2022-02-13 18:34:41 · 277 阅读 · 0 评论 -
The the tricky question when I use the yarrow_start() and ctr_start() after regerster_cipher(&aes_d)
Here is my scenario:I was just prepared with the pseudo-random number generator with yarrow which could create an IV array with a random seed. and I just made it into a function just like following:int IV_generator(unsigned char buf[], unsigned int.原创 2022-02-09 19:42:23 · 493 阅读 · 0 评论 -
How to print the char array with Hexadecimal numbers
The following fucntion could achieve the goal:#include <stdio.h>static const char __hexa__[16] = {'0', '1', '2', '3', '4' , '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'};void fprintBuffer_raw(FILE* file, const char* buffer, size_t buffer原创 2022-02-09 19:40:52 · 150 阅读 · 0 评论 -
The basic uses for pseudo-random number generator in libtomcrypt
the problem here is I need a random iv(initialization vector), the best way to achieve that is use the pseudo-random number generator. But the pseudo-random generator need a unique random seed as its starting point.in addition, there is a header file nam原创 2022-02-09 14:52:10 · 559 阅读 · 0 评论 -
Cipher Block chaining
what is cipher block chainingThe following is the description:原创 2022-02-05 19:26:43 · 694 阅读 · 0 评论