Introduction to Protocol Building Blocks In Cryptography

Introduction to Protocol Building Blocks In Cryptography

Loading document ...
Loading page ...


Author(s): Maher Ali Rusho

Download Full PDF Read Complete Article

DOI: 10.18483/ijSci.2612 23 305 1-3 Volume 11 - Sep 2022


The Whole point of cryptography is to solve problems. It solves problems that involve secrecy, authentication ,integrity and dishonest people .A protocol Is a series of steps ,involving two or more parties designed to accomplish a task. A series of steps means that the protocol has a sequence, from start to finish. Analyzing stream ciphers is often easier than analyzing block ciphers. For example, one important metric used to analyze LFSR-based generators is linear complexity, or linear span. This is defined as the length, n, of the shortest LFSR that can mimic the generator output. Any sequence generated by a finite-state machine over a finite field has a finite linear complexity [1006]. Linear complexity is important because a simple algorithm, called the Berlekamp-Massey algorithm, can generate this LFSR after examining only 2n bits of the keystream [1005]. Once you’ve generated this LFSR, you’ve broken the stream cipher.


Adjudicated Protocols, Self enforceing portals, One Way function, Massage Authentication Code (MAC), Publich Key


  7. Book Of Applied Cryptography Second Edition By Bruce Schneir

Cite this Article:

International Journal of Sciences is Open Access Journal.
This article is licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) License.
Author(s) retain the copyrights of this article, though, publication rights are with Alkhaer Publications.

Search Articles

Issue June 2023

Volume 12, June 2023

Table of Contents

World-wide Delivery is FREE

Share this Issue with Friends:

Submit your Paper