Professional Documents
Culture Documents
LTMHTT
LTMHTT
(x) = (x), T
(y) =
1
(y)
15
16
V d 1. Kha b mt ca mt m thay th cho bi bng sau:
A B C D E F G H I J K L M
d l r y v o h e z x w p t
N O P Q R S T U V W X Y Z
b g f j q n m u s k a c i
1
a b c d e f g h i j k l m
X N Y A H P O G Z Q W B T
n o p q r s t u v w x y z
S F L R C V M U E K J D I
2.1.3. M Affine
nh ngha 3. t { = ( = Z
26
v
/ = (a, b) Z
2
26
: gcd(a, 26) = 1
Vi mi kha K = (a, b) / v vi x, y Z
26
, m Affine c nh ngha nh sau:
c
K
(x) = (ax + b) mod 26
T
K
(y) = a
1
(y b) mod 26
2.1.4. M Vigenre
nh ngha 4. Chn m l mt s nguyn dng. t { = ( = / = (Z
26
)
m
. Vi mi
kha K = (k
1
, k
2
, ..., k
m
) / v vi x = (x
1
, x
2
, ..., x
m
) {, y = (y
1
, y
2
, ..., y
m
) (,
m Vigenre c nh ngha nh sau:
c
K
(x) = (x
1
+ k
1
, x
2
+ k
2
, ..., x
m
+ k
m
) mod 26
T
K
(y) = (y
1
k
1
, y
2
k
2
, ..., y
m
k
m
) mod 26
17
2.1.5. M Hill
nh ngha 5. Chn m 2. t { = ( = (Z
26
)
m
v
/ = M
mm
m
(Z
26
) : det (M) = 0
Khi vi mi kha K / v x {, y (, m Hill c nh ngha nh sau:
c
K
(x) = xK (mod 26)
T
K
(y) = yK
1
(mod 26)
2.1.6. M chuyn v - Permutation Cipher
nh ngha 6. Chn m l mt s nguyn dng. t { = ( = (Z
26
)
m
v / l tp
cc hon v m phn t 1, ..., m. Khi vi mi kha K l mt hon v m phn t v
x {, y (, m hon v c nh ngha nh sau:
c
K
(x) = c
K
(x
1
, ..., x
m
) = (x
K(1)
, ..., x
K(m)
)
T
K
(y) = T
K
(y
1
, ..., y
m
) = (y
K
1
(1)
, ..., y
K
1
(m)
)
V d 2. Vi m = 6, ta c mt kha l hon v sau:
x 1 2 3 4 5 6
(x) 3 5 1 6 4 2
1
(x) 3 6 1 5 2 4
2.2. Bi tp thc hnh
Bi tp 1. Vit hm tnh m c
sh(k)
v gii m T
sh(k)
dch chuyn da trn kha k cho
trc l mt s nguyn khng m khng qu 25.
Bi tp 2. Mt ngi tm cch nng cao tnh an ton cho vn bn m ha ca mnh.
Anh ta ngh ra mt kha l mt s nguyn dng c n ch s k = k
1
k
2
...k
n
vi k
i
l
cc ch s thp phn, sau anh ta m ha vn bn p ca mnh nh sau: E
k
(p) =
c
sh(k
1
)
(c
sh(k
2
)
(...(c
sh(kn)
(p)...)), bit c
sh(k
i
)
(x) l hm m ha dch chuyn c kha k
i
.
1. Vit hm tnh m v gii m cho phng php m ha ny.
2. Nhn xt v tnh an ton ca phng php ny so vi m dch chuyn gc.
18
3. Nhng iu kin no ca k lm cho E
k
(p) = p?
Bi tp 3. Vit hm tnh m c
s()
v gii m T
s()
thay th da trn kha trong v
d 1 trn.
Bi tp 4. Mt ngi s dng hm c
s()
m ha vn bn p ca mnh nh sau:
E
= c
s()
(c
s()
(p)).
1. Hy nhn xt v kt qu m ha c nhn c.
2. Th cho mt kha khc E
= (k
1
, 2c
sh(k
2
)
(p)) v E
K
(p) = c
a(K
)
(p). Hy vit hm tnh m
v gii m cho phng php ny.
Bi tp 8. Vit hm tnh m c
v(K)
v gii m T
v(K)
Vigenre da trn kha K Z
m
26
.
Bi tp 9. Mt ngi m ha vn bn p chiu di m ca mnh vi kha K = Z
m
26
theo phng php sau: p
= (c
a((11,k
1
))
(p
1
), c
a((11,k
2
))
(p
2
), ..., c
a((3,km))
(p
m
)) v E
K
(p) =
c
v(K)
(p
).
Tnh khng xung t (collision resistance): kh c th tnh ton tm c hai
thng ip khc nhau m c cng m bm. Ngha l, kh c th tm c m = m
).
Ch . Thut ng "kh c th tnh ton" y c ngha phc tp ca vic tnh
ton l trn a thc, hoc i hi ti nguyn vt qu kh nng cung cp. C th ta
c nh ngha sau:
4.2. Bi tp thc hnh
Bi tp 25. Ci t thut ton Merkle Damg ard nh x mt chui bit c chiu di
bt k (nhng nh hn 2
128
, 2
256
, 2
512
) thnh mt chui bit c chiu di l bi s ca
n = 128, 256, 512.
Bi tp 26. Hy xut v ci t thut ton nh x mt chui bit c chiu di bt
k thnh mt chui bit c chiu di l bi s ca 32.
Bi tp 27. Ci t thut ton padding cho hm bm SHA-1.
Bi tp 28. Ci t thut ton SHA-1 bm mt chui k t c chiu di bt k
thnh mt chui bit c chiu di 160 bit.
Bi tp 29. Ci t thut ton MD5 bm mt chui k t c chiu di bt k thnh
mt chui bit c chiu di 128 bit.
Chng 5.
H m logarit ri rc
5.1. Tm tt l thuyt
5.1.1. Bi ton logarit ri rc
Cho nhm nhn (G, ), mt phn t G c bc n v phn t '`. Tm s nguyn
duy nht a, 0 a n 1, sao cho
a
=
5.1.2. H m ElGamal
Chn p l mt s nguyn t sao cho bi ton logarit ri rc trn Z
p
khng th gii
d dng, v t Z
p
l mt phn t nguyn thy (phn t sinh). t { = Z
p
,
( = Z
p
Z
p
, v
/ = (p, , a, ) :
a
(mod p)
Khi b (p, , ) c cng khai v s a c gi b mt.
Vi K = (p, , a, ), v mt s ngu nhin b mt k Z
p1
, vic m ha v gii m
theo h ElGamal c thc hin nh sau:
c = c
K
(p, k) = (y
1
, y
2
) Z
p
Z
p
trong
y
1
=
k
mod p
y
2
= c
k
mod p
24
25
p = T
K
(y
1
, y
2
) = y
2
(y
a
1
)
1
mod p
5.2. Bi tp thc hnh
Bi tp 30. Ci t thut ton Pohlig-Hellman gii bi ton logarit ri rc.
Bi tp 31. Ci t thut ton Sharks gii bi ton logarit ri rc.
Bi tp 32. Ci t thut ton Pollard Rho gii bi ton logarit ri rc.
Bi tp 33. Ci t thut ton tm mt phn t nguyn thy (phn t sinh) ca Z
p
.
Bi tp 34. Ci t thut ton ElGamal m ha v gii m mt chui k t c
chiu di bt k.
Chng 6.
Ch k in t
6.1. Tm tt l thuyt
6.1.1. Ch k in t s dng h m RSA
Chn n = pq vi p, q l cc s nguyn t. t { = / = Z
n
v
/ = (n, p, q, a, b) : a b mod n
(n, b) c cng khai, (p, q, a) c gi b mt. Khi vi K = (n, p, q, a, b) / v
x, y Z
n
, vic k v kim tra ch k in t c thc hin nh sau:
sig
K
(x) = x
a
mod n
ver
K
(y) = true x y
b
mod n
6.1.2. Ch k ElGamal
Chn p l mt s nguyn t sao cho bi ton logarit ri rc trn Z
p
khng th gii d
dng (trit tiu, suy bin). t Z
p
l mt phn t nguyn thy (phn t sinh), v
{ = Z
p
, / = Z
p
Z
p1
. Ta nh ngha
/ = (p, , a, ) :
a
(mod p)
B (p, , ) c cng khai, s a c gi b mt. Khi vi mt kha K = (p, , a, )
v mt s ngu nhin (b mt) k Z
p1
, vic k v kim tra ch k in t ElGamal
c thc hin nh sau:
26
27
Ch k in t
sig
K
(x, k) = (, )
trong
=
k
mod p
= (x a)k
1
mod (p 1)
Kim tra ch k: vi x, Z
p
v Z
p1
,
ver
K
(x, (, )) = true
delta
x
(mod p)
6.1.3. Ch k in t da trn hm bm SHA-1
Chn p l mt s nguyn t L-bit sao cho bi ton logarit ri rc trn Z
p
khng th
gii d dng (trit tiu, suy bin) v L 0 (mod 64) v 512 L 1024, v chn q l
mt s nguyn t 160-bit l c s ca p 1. t Z
p
l mt cn bc q ca n v
theo modulo p, v t { = 0, 1
, / = Z
q
Z
q
. Ta nh ngha
/ = (p, q, , a, ) :
a
(mod p)
trong 0 a q 1. B (p, q, , ) c cng khai v a c gi b mt.
Vi K = (p, q, , a, ) v mt s ngu nhin (b mt) k sao cho 1 k q 1, vic k
v kim tra ch k in t da trn hm bm SHA-1 c thc hin nh sau:
Ch k in t
sig
K
(x, k) = (, )
trong
= (a
k
mod p) mod q
= (SHA1(x) + a)k
1
mod q
, khng ng thi bng 0.
Kim tra ch k: vi x 0, 1
v , Z
q
,
ver
K
(x, 9, )) = true (
e
1
e
2
mod p) mod q =
trong
28
e
1
= SHA1(x)
1
mod q
e
2
=
1
mod q
6.2. Bi tp thc hnh
Bi tp 35. Ci t chng trnh tnh ch k in t v kim tra ch k in t da
trn thut ton RSA.
Bi tp 36. Ci t chng trnh tnh ch k in t v kim tra ch k in t
ElGamal.
Bi tp 37. Ci t chng trnh tnh ch k in t v kim tra ch k in t da
trn hm bm SHA-1.
Bi tp 38. Ci t chng trnh tnh ch k in t v kim tra ch k in t da
trn hm bm MD5.
Ti liu tham kho
[1] Douglas R. Stinson, Cryptography: Theory and Practice, 3rd. ed., Chapman &
Hall/CRC, 2006.
[2] A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography,
CRC Press, 1996.
[3] Phm Huy in, H Huy Khoi, M ho thng tin: C s ton hc v ng dng,
NXB HQG H Ni, 2003.
29