انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة
الكلية كلية العلوم للبنات
القسم قسم الحاسبات
المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي
07/02/2017 07:18:20
3.5 Stream Encryption Approaches There are two different approaches to stream encryption they are; synchronous methods and self-synchronous methods. 3.5.1 Synchronous stream ciphers In a synchronous stream cipher the key stream is generated independently of the message stream. The algorithm that generates the stream must be deterministic so the stream can be reproduced for decryption. This means that if a ciphertext is lost during transmission, the sender and receiver must resynchronize their key generators before they can proceed. Furthermore, this must be done with out repeating any part of the key. The starting state of the generator is initialized by a "seed" 10 as illustrated in figure (3.5). Synchronous stream ciphers have the advantage of not propagating errors. A transmission error effecting one character will not affect subsequent characters. From another point of view; this is a disadvantage in that it is easier for an opponent to modify (with out detection) a single ciphertext character. 3.5.2 Self-Synchronous Stream ciphers A self-synchronous stream ciphers derives each key character from a fixed number n of preceding cipher text character. This is done by using a cipher feed back mode (CFB) because the ciphertext characters participate in the feed back loop. It is some times called chaining, because each ciphertext character depend on preceding cipher-text character (chain) the feed back as shown figure (3.6). The feedback register R is a shift register when each cipher text character Ci is shifted into one end of R immediately after being generated, the character at the other end is discarded. Register R is initialized to the seed 10. During each iteration, the value of R is used as input to a block encryption algorithm (EB), the right most character of the algorithm becomes the next key character. If a ciphertext character is altered or lost during transmission, the receiver s shift register will differ from the transmitter s, and subsequent cipher text will not be correctly deciphered until the error character is shifted out of the register 3.5 Stream Encryption Approaches There are two different approaches to stream encryption they are; synchronous methods and self-synchronous methods. 3.5.1 Synchronous stream ciphers In a synchronous stream cipher the key stream is generated independently of the message stream. The algorithm that generates the stream must be deterministic so the stream can be reproduced for decryption. This means that if a ciphertext is lost during transmission, the sender and receiver must resynchronize their key generators before they can proceed. Furthermore, this must be done with out repeating any part of the key. The starting state of the generator is initialized by a "seed" 10 as illustrated in figure (3.5). Synchronous stream ciphers have the advantage of not propagating errors. A transmission error effecting one character will not affect subsequent characters. From another point of view; this is a disadvantage in that it is easier for an opponent to modify (with out detection) a single ciphertext character.
3.5.2 Self-Synchronous Stream ciphers A self-synchronous stream ciphers derives each key character from a fixed number n of preceding cipher text character. This is done by using a cipher feed back mode (CFB) because the ciphertext characters participate in the feed back loop. It is some times called chaining, because each ciphertext character depend on preceding cipher-text character (chain) the feed back as shown figure (3.6). The feedback register R is a shift register when each cipher text character Ci is shifted into one end of R immediately after being generated, the character at the other end is discarded. Register R is initialized to the seed 10. During each iteration, the value of R is used as input to a block encryption algorithm (EB), the right most character of the algorithm becomes the next key character. If a ciphertext character is altered or lost during transmission, the receiver s shift register will differ from the transmitter s, and subsequent cipher text will not be correctly deciphered until the error character is shifted out of the register
المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الى لوحة التحكم
|