Sunday, November 10, 2013

sections 9.1-9.4

Difficult: Are we going to have to break any of these? Because I'm not sure I'd be able to until possible after reading later sections that probably go into methods to break them. Though I'm sure they are similar to how we break RSA and ElGamal. I also thought the ElGamal Signature Scheme was kind of complicated, but still kind of like the normal ElGamal encryption method, so maybe it's not as bad as it looks? Could you do examples of these methods in class?

Interesting: I thought it was interesting how the different encryption methods could be modified to create personalized signatures and also that this idea hasn't (explicitly) come up before these sections really. I also thought the difference between the signature with appendix and message recover scheme was interesting.

No comments:

Post a Comment