Updates from August, 2010 Toggle Comment Threads | Keyboard Shortcuts

  • CG 6:53 pm on August 31, 2010 Permalink | Reply
    Tags: bluekrypt, , security level   

    BlueKrypt – Cryptographic Key Length Recommendation 

    A brilliant web site that can quickly evaluate the level of security from keylength. Awesome.

    Advertisements
     
    • lia 1:01 pm on September 1, 2010 Permalink | Reply

      panjang kunci aja kah…??
      kalau pertimbangan/aspek lainnya.., trutama utk kriptografi asimetrik.,rekomendasinya apa yaa..?

      • CG 10:04 am on September 4, 2010 Permalink | Reply

        ada banyak aspek. coba dilihat di link-nya.

  • CG 8:11 am on August 27, 2010 Permalink | Reply
    Tags: ,   

    Standardized Elliptic Curves 

    1. NIST. FIPS PUB 186-2 : DIGITAL SIGNATURE STANDARD (DSS). National Institute for Standards and Technology, 2000.
    2. SECG. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Group, 1999.
     
    • Budi Rahardjo 12:47 pm on August 27, 2010 Permalink | Reply

      langsung di-refer di paper ah … 😀

      • CG 4:06 pm on August 29, 2010 Permalink | Reply

        cari reference dan masukkin ke bibdesk itu satu urusan sendiri 😀 gimana lagi kalau gak pake lyx ya? 😀

  • CG 4:23 am on June 1, 2010 Permalink | Reply
    Tags: , , sandeep s kumar   

    The universe wants me to get up earlier 

    … to read this book to find out that it refers to a phd thesis I currently reading and also show me that this guy is actually very cool and he is the phd thesis advisor of this other guy who’s really an expert of the topic of my research and now I feel that everybody has done what I’m doing for my phd thesis. Whew. Sigh.

     
    • Darh Templar 4:47 am on June 1, 2010 Permalink | Reply

      antara prof paar dan prof ulrich itu ‘cool’-an mana? hehe.

      • CG 4:50 am on June 1, 2010 Permalink | Reply

        gelah. ulrich mah jaman dulu, mungkin sekarang udah jompo? 😛
        paar lebih asik kacamatanya mirip gue!!! :))

    • CG 4:52 am on June 1, 2010 Permalink | Reply

      btw tag phd life ko banyak banget ya udah 50 biji… hi hi hi…

    • sunarhadi 9:07 pm on June 1, 2010 Permalink | Reply

      emang orang crypto harus pake kacamata yaa?/ ataw orang yang pake kacamata berarti bakat di crypto??

    • Budi Rahardjo 5:17 pm on June 3, 2010 Permalink | Reply

      namanya juga perjuangan s3 … mana ada yang gampang

    • sunarhadi 9:26 pm on June 3, 2010 Permalink | Reply

      aneh ya…. hehehe…. 🙂
      semangat-semangat yaa…….

  • CG 9:55 am on April 30, 2010 Permalink | Reply
    Tags: , ,   

    Encryption – Decryption finally works 

    With the help of this debugger and that debugger, changing the data from this:

    into this:

    make the code works. It’s because the data occupied more space than the capacity of the number of words.


    lss-67-39:Rosing Experiments CG chika$ ./test_elgamal_CG
    poly_prime =
    8 0 0 0 0 c9
    setting up curve

    the curve after setting up:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    counter = 0
    inc = 5
    Base point
    x: 5 63323eab 10fc68f8 254d4d11 d2d518f2 9979dd24
    y: 4 883e6269 de8bf93e f6c224e3 330dbf7f 2dd25ec1

    create side 2's private key

    Side 2 secret:
    5 5d0be8bb a913fcdb 91edee60 4da6d486 295d85ac

    Generate side 2's public key

    Side 2 public key
    x: 0 60838c40 7580aec4 b658d152 729f7f67 51d694bd
    y: 0 1be3f90c c4a81de1 848ff01b d63e97a4 6b46c459
    data =
    0 68616c6c 6f0a0000 0 0 60000000

    Hide data on curve and send from side 1 to side 2

    curve before send_elgamal:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Their_public before send_elgamal:
    x: 0 60838c40 7580aec4 b658d152 729f7f67 51d694bd
    y: 0 1be3f90c c4a81de1 848ff01b d63e97a4 6b46c459
    =====IN send_elgamal=====
    data (in send_gamal function) :
    0 68616c6c 6f0a0000 0 0 60000000
    Base point
    x: 5 63323eab 10fc68f8 254d4d11 d2d518f2 9979dd24
    y: 4 883e6269 de8bf93e f6c224e3 330dbf7f 2dd25ec1
    Base curve
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    random value:
    5 3a0f94f6 e0caf9a7 2d189f04 8591c5e5 3935d4dc
    Random point C1
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    counter = 0
    inc = 0
    raw point M (after poly_embed)
    x: 0 68616c6c 6f0a0000 0 0 60000000
    y: 0 7a64a103 a296a42d 4130d375 23ef2cf2 3f1a3ec0
    Their_public:
    x: 0 60838c40 7580aec4 b658d152 729f7f67 51d694bd
    y: 0 1be3f90c c4a81de1 848ff01b d63e97a4 6b46c459
    hidden point (after poly_elptic_mul)
    x: 7 1f5fceb7 8269106c c1708600 cde8821b 38e0c7ee
    y: 2 d752fec4 40840001 be4a3e7f 347e7013 7f36ce97
    Hidden data (C2):
    x: 6 a8a348b9 60a911b7 852a3bb9 8ba949df 5a157ae
    y: 0 239b098 7584aea3 af4431db 2f3fa3f4 312c5ea9
    Random point (C1):
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    =====OUT send_elgamal

    AFTER send_elgamal
    curve after send_elgamal:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Hidden data (C2)
    x: 6 a8a348b9 60a911b7 852a3bb9 8ba949df 5a157ae
    y: 0 239b098 7584aea3 af4431db 2f3fa3f4 312c5ea9
    Random point (C1)
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6

    Recover transmitted message

    IN receive_elgamal
    Base curve in receive_elgamal
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Hidden_data (in receive_elgamal) :
    x: 6 a8a348b9 60a911b7 852a3bb9 8ba949df 5a157ae
    y: 0 239b098 7584aea3 af4431db 2f3fa3f4 312c5ea9
    Random point
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    hidden_point (d*C1):
    x: 7 1f5fceb7 8269106c c1708600 cde8821b 38e0c7ee
    y: 2 d752fec4 40840001 be4a3e7f 347e7013 7f36ce97
    &raw_point:
    x: 0 68616c6c 6f0a0000 0 0 60000000
    y: 0 7a64a103 a296a42d 4130d375 23ef2cf2 3f1a3ec0
    raw_point.x
    0 68616c6c 6f0a0000 0 0 60000000
    &raw_data (point):
    x: bffff630 bbe72787 d25ef6fb 139332fc 90db35c4 fd129391
    y: 0 2 d6670f0 ab08aca3 8818adbe cf36881d
    raw_data (point):
    x: 0 68616c6c 6f0a0000 0 0 60000000
    y: 0 68616c6c 6f0a0000 0 0 60000000
    &raw_data (field):
    bffff630 bbe72787 d25ef6fb 139332fc 90db35c4 fd129391
    raw_data (field):
    0 68616c6c 6f0a0000 0 0 60000000
    =====OUT receive elgamal

    sent data
    0 68616c6c 6f0a0000 0 0 60000000
    received data (field)
    0 68616c6c 6f0a0000 0 0 60000000

     
  • CG 9:13 pm on April 28, 2010 Permalink | Reply
    Tags: , ,   

    Now reading 

    Christof Paar, “Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields”, Dissertation, Institute for Experimental Mathematics, Universität Essen, Germany, 1994.

     
  • CG 6:11 am on April 25, 2010 Permalink | Reply
    Tags: berk sunar, ,   

    Now reading 

    1. B. Sunar, E. Savas and C. K. Koc. Constructing composite field representations for efficient conversion. IEEE Transactions on Computers, 52(11):1391-1398, November 2003.
    2. B. Sunar, An Efficient Basis Conversion Algorithm for Composite Fields with Given Representations IEEE Transactions on Computers, 54(8):992-997, August 2005.
     
    • Budi Rahardjo 6:42 am on April 25, 2010 Permalink | Reply

      oh no, more things to read …

      • CG 5:26 am on April 27, 2010 Permalink | Reply

        i have sent the files to you too 🙂 happy reading 😀

    • budi sulistyo 4:53 pm on April 26, 2010 Permalink | Reply

      Berusaha tetap bertahan di jalur riset… Pertemuan jumat tetap ya? He2
      Semangat!

      • CG 5:26 am on April 27, 2010 Permalink | Reply

        @budi sulis: kapan dong gabung diskusi lagi? 🙂

  • CG 4:42 am on April 23, 2010 Permalink | Reply
    Tags: ,   

    Now reading: 

    Efficient Conversion Algorithm for Composite Field Representation, E. Savas, B. Sunar, C. K. Koc.

     
  • CG 5:55 pm on April 17, 2010 Permalink | Reply
    Tags: , pointer,   

    Pointers are so cruel… 

    They’re bad! And mean!

    After weeks of debugging, and still cannot get the plaintext back, now I’m moving to the next: building ECC on composite fields.

    Note: below is the result of the codes with printf-s everywhere. With the help of this debugger.

    The algorithm seems correct but the data recovered looks weird.


    poly_prime =
    8 0 0 0 0 c9
    setting up curves

    the curve after setting up:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    counter = 0
    inc = 5
    Base point
    x: 5 63323eab 10fc68f8 254d4d11 d2d518f2 9979dd24
    y: 4 883e6269 de8bf93e f6c224e3 330dbf7f 2dd25ec1

    create side 2's private key

    Side 2 secret:
    5 5d0be8bb a913fcdb 91edee60 4da6d486 295d85ac

    Generate side 2's public key

    Side 2 public key
    x: 1d5ba6c2 5378466 ae5d1cce 48770132 e9d6d710 a7448cd1
    y: 4 85500816 ccee8906 56a133dc 19c325f8 4bb9ffa6
    data =
    68616c6c 6f0a0000 0 0 0 60000000

    Hide data on curve and send from side 1 to side 2

    curve before send_elgamal:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Their_public before send_elgamal:
    x: 1d5ba6c2 5378466 ae5d1cce 48770132 e9d6d710 a7448cd1
    y: 4 85500816 ccee8906 56a133dc 19c325f8 4bb9ffa6
    =====IN send_elgamal=====
    data (in send_gamal function) :
    68616c6c 6f0a0000 0 0 0 60000000
    Base point
    x: 5 63323eab 10fc68f8 254d4d11 d2d518f2 9979dd24
    y: 4 883e6269 de8bf93e f6c224e3 330dbf7f 2dd25ec1
    Base curve
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    random value:
    5 3a0f94f6 e0caf9a7 2d189f04 8591c5e5 3935d4dc
    Random point C1
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    counter = 0
    inc = 0
    counter = 0
    -- pnt->x =
    x: bffff4b8 a00754ec bffff4d8 a0073a58 a a
    y: 68616c6d 6f0a0000 0 0 0 60000000
    raw point M (after poly_embed)
    x: 68616c6d 6f0a0000 0 0 0 60000000
    y: 1 2c310f6b e4c3751c 2ef637ef ce837cb2 88e21c99
    Their_public:
    x: 1d5ba6c2 5378466 ae5d1cce 48770132 e9d6d710 a7448cd1
    y: 4 85500816 ccee8906 56a133dc 19c325f8 4bb9ffa6
    hidden point (after poly_elptic_mul)
    x: 6 987b3fe3 f486168f 19bba08c b943f599 c43cfa22
    y: 1 6a16b493 afad94b4 f93c6f41 40281e42 8c448f24
    Hidden data (C2):
    x: 68616c6c d3ba4b92 8c4b46c0 a6c78778 afcaf788 5187c979
    y: 68616c69 372ef71c 96586e6d bad28a2 ff127133 b48ca3de
    Random point (C1):
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    =====OUT send_elgamal

    AFTER send_elgamal
    curve after send_elgamal:
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Hidden data (C2)
    x: 68616c6c d3ba4b92 8c4b46c0 a6c78778 afcaf788 5187c979
    y: 68616c69 372ef71c 96586e6d bad28a2 ff127133 b48ca3de
    Random point (C1)
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6

    Recover transmitted message

    IN receive_elgamal
    Base curve in receive_elgamal
    form: 1
    a2: 0 0 0 0 0 2
    a6: 0 0 0 0 0 1

    Hidden_data (in receive_elgamal) :
    x: 68616c6c d3ba4b92 8c4b46c0 a6c78778 afcaf788 5187c979
    y: 68616c69 372ef71c 96586e6d bad28a2 ff127133 b48ca3de
    Random point
    x: 2 d6670f0 ab08aca3 8818adbe cf36881d 83accc06
    y: 2 cad560f5 72c889b5 226934a2 733455c8 c53a15a6
    hidden_point (d*C1):
    x: 7 1f5fceb7 8269106c c1708600 cde8821b 38e0c7ee
    y: 2 d752fec4 40840001 be4a3e7f 347e7013 7f36ce97
    &raw_point:
    x: 68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389
    y: 3 fae10821 85e832bb b9c6d8ab cc4439f4 eb7441ea
    raw_point.x
    68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389
    &raw_data (point):
    x: bffff670 10700ccf af82abf6 b46a9779 16316b62 7df7f7d
    y: 4037177 debca93c 4b16e65 77a8ff5a 70c28f88 1d5ba6c1
    raw_data (point):
    x: 68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389
    y: 68616c6c 6f0a0000 0 0 0 60000000
    &raw_data (field):
    bffff670 10700ccf af82abf6 b46a9779 16316b62 7df7f7d
    raw_data (field):
    68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389
    =====OUT receive elgamal

    sent data
    68616c6c 6f0a0000 0 0 0 60000000
    received data (point)
    x: 68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389
    y: 68616c6c 6f0a0000 0 0 0 60000000
    received data (field)
    68616c6a de301be6 24719966 c269b54f ef049a08 8c7af389

     
    • Budi Rahardjo 7:11 pm on April 17, 2010 Permalink | Reply

      masih belum selesai debuggingnya. kayaknya mau ngerapihin code-nya dulu

      • CG 8:15 pm on April 17, 2010 Permalink | Reply

        be careful. the pointers like to behave unexpectedly anytime we alter the code. bad pointers! grrrrrr!!!

  • CG 1:48 pm on April 8, 2010 Permalink | Reply
    Tags: , ,   

    Houston, we cannot recover the plaintext 


    poly_prime =
    8 0 0 0 0 c9
    data test =
    68616c6c 6f0a0000 0 0 0 6000000
    setting up curves

    the curve after setting up:
    form: 1
    a2: 2 0 0 0 0 0
    a6: 1 0 0 0 0 0

    counter = 0
    inc = 5
    Base point
    x: 5 63323eab 10fc68f8 254d4d11 d2d518f2 9979dd24
    y: 7 95f678a8 39481c22 2f4c7995 4a571060 6fe263b2

    create side 2's private key

    Side 2 secret:
    5 5d0be8bb a913fcdb 91edee60 4da6d486 295d85ac

    Generate side 2's public key

    Side 2 public key
    x: d107f500 66784cc8 9a0621db 9050de48 31c6e7c5 7d65d83b
    y: 2 1763b098 91e23a1e 2f96df5c 50c63a33 a4b16c75

    Hide data on curve and send from side 1 to side 2

    counter = 0
    inc = 0
    counter = 0
    -- pnt->x =
    x: bffff4d8 1 bffff508 90483f7b a0073a58 905e07e8
    y: 100131 1000 0 bffff7a0 bffff71c 1ed5
    counter = 1
    -- pnt->x =
    x: bffff4d8 1 bffff508 90483f7b a0073a58 905e07e8
    y: 100132 1000 0 bffff7a0 bffff71c 1ed5
    Hidden data
    x: 100135 70f0eb24 c996c3e4 2d120279 e9f3ec30 3370129a
    y: 100132 7a61b198 ccba8673 27995624 c069db6f ab7bdfaa
    Random point
    x: d107f503 81d255cd 358038a7 148e84da a7b39f16 75d320c4
    y: 3 e0053e42 6538a7a0 41dabd3 4cb90701 9a31b3b0

    Recover transmitted message

    sent data
    100130 1000 0 bffff7a0 bffff71c 1ed5
    received data
    d117f431 a8e83258 f59857d7 646d8b77 90191393 f6674925

     
  • CG 3:08 pm on March 28, 2010 Permalink | Reply  

    Debugging headache 

    phd student is having big headache figuring out why a simple operation 2P – P is not equal to P. going to have a holiday without bringing the laptop but still have this problem unsolved… arrrrrrhhhh!!!

            data->e[NUMWORD] = 0x6000000;
            data->e[NUMWORD-1] = 0x0;
            data->e[NUMWORD-2] = 0x0;
            data->e[NUMWORD-3] = 0x0;
            data->e[NUMWORD-4] = 0x6f0a0000;
            data->e[NUMWORD-5] = 0x68616c6c;
    
            print_field("data test = ", data);
    
            //t is for storing the k
            null(t);
            t->e[NUMWORD] = 2;   //k  = 2, Q = 2*P
            print_field("t = ", t);
            printf("setting up curves\n\n");
            set_curve(curve);
            print_curve("the curve after setting up: ", curve);
    
            poly_embed(data, curve, 1, 0, p);
            printf("data after embedded to the curve: \n");
            print_point("p = ", p);
    
            printf("after point multiplication: \n");
            poly_elptic_mul(t, p, r, curve);
            print_point("r = ", r);
    
            null(t);
            t->e[NUMWORD] = 1;  
            print_field("t = ", t);
            printf("get the point back: \n");
            poly_elptic_mul(t, p, q, curve);
            print_point("q = ", q); 
            poly_esub(r, q, s, curve);
            print_point("s = ", s);
    


    poly_prime =
    8 0 0 0 0 c9
    NUMWORD = 5
    data test =
    68616c6c 6f0a0000 0 0 0 6000000
    t =
    0 0 0 0 0 2
    setting up curves

    the curve after setting up:
    form: 1
    a2: 2 0 0 0 0 0
    a6: 1 0 0 0 0 0

    counter = 0
    inc = 1
    data after embedded to the curve:
    p =
    x: 68616c6c 6f0a0000 0 0 0 6000000
    y: 2 7fcb6ca7 1bdfc7ca 17329198 9524f59c ec7659ad
    after point multiplication:
    r =
    x: 68616c6c 90451c30 58c15ae5 9afb81ac 98bea99d 567b1a47
    y: 2 ddf40f6e adf0823c 6931b5e1 be2b181a 4cafded5
    t =
    0 0 0 0 0 1
    get the point back:
    q =
    x: 68616c6c 6f0a0000 0 0 0 6000000
    y: 2 7fcb6ca7 1bdfc7ca 17329198 9524f59c ec7659ad
    s =
    x: 1 cf0b01a6 9e358040 b87f8a0d 56118a0a 50644166
    y: 0 5a4b1583 616c21cb 3ecc2d26 d99e32df ac36450

     
    • niken 2:50 pm on April 2, 2010 Permalink | Reply

      libur dulu aja…. jangan pikirin ini pas liburan…. ya? ya? ya? nanti pas balik baru deh 😀

c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel