Public-Key Cryptosystems
Okamoto-Uchiyama
The Okamoto-Uchiyama cryptosystem is homomorphic and malleable. cryptosystem.
- Choose random primes
and - Compute
- Choose
such that - Compute
Encryption
- Choose message
- Chose integer
at random - Compute ciphertext
Decryption
- Define
RSA
Rivest-Shamir-Adleman
- Choose random primes
and - Compute
- Compute [Euler's totient](algo.org::*Euler’s Totient Function) of
, - Choose
such that - Compute
such that - Choose message
- Compute ciphertext
Symmetric-Key Cryptosystems
Symmetric cryptosystems are malleable.
Stream Ciphers
Stream ciphers often produce correlated ciphertext. The initialization vector used must be random and unique to prevent
CTR
Counter mode
Counter mode is a method of using a block cipher as a stream cipher.
RC4
Rivest Cipher 4
Block Ciphers
AES
Advanced Encryption Standard
DES
Data Encryption Standard
Hash Functions
SHA
Secure Hash Algorithm