Monthly Archives: July 2014

Welcome to Cryptology Research Group

The Cryptology Research Group (CRG) comprises of six academics supported by a number of masters and doctoral students.

The research and developmental work at the group is largely focused on design,

development, analysis

and evaluation of secure and efficient cryptographic protocols.


To become a nationally and internationally renowned research group in Cryptology.


  • To promote innovation and achat cialis 20mg novelty in Cryptology research and development.
  • To work in collaboration with government and industry in order to find cryptographic solutions to national level problems.
  • To create awareness through trainings, education, publications, and organizing conferences.

Symmetric Key Cryptography

Symmetric Key Cryptography refers to encryption methods in which both the sender and receiver share the same key.  This was the only kind of encryption publicly known until June 1976. Since then other schemes have also emerged on the scene, however, Symmetric Key Cryptography is still one of the most well researched area of this field.   

Symmetric key ciphers are implemented as either block

ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext as opposed to individual characters, the input form used by a stream cipher.

The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which have been designated cryptography standards by the US government cialis paiement paypal (though DES’s designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from

ATM encryption to e-mail privacy and secure remote accessStream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined with the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the levitra bayer uk cheap output stream is created based on a hidden internal state which changes as the cipher operates. That internal state is initially set up using the secret key material. RC4 is a widely used stream cipher. 


CRG, the cryptanalysis of block and stream ciphers is actively being researched by the group members. In addition, the group is also working on the design and analysis of boolean functions.

Information Security

Public Key Cryptography

Symmetric-key cryptosystems order levitra generic use the same key

for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps viagra naturel maca each ciphertext exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all consistent and secret. The difficulty of securely establishing a secret key between two communicating parties, when a secure channel does not already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.

In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different

but mathematically related keys are used—a public key and a private key. A public key system is so constructed that calculation of one key (the ‘private key’) is

computationally infeasible from the other (the ‘public key’), tadalafil vasodilator even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the

field since polyalphabetic substitution emerged

in the Renaissance”.

At CRG, interesting areas of this field including signcryption, identity based encryption, digital signatures and elliptic curve cryptography are currently being researched by the group members.



The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.

There are a wide variety of cryptanalytic attacks, and they can be classified in any of several ways. A common distinction turns on what an attacker knows and what capabilities are available. In a ciphertext-only attack, the cryptanalyst has access

only to the ciphertext (good modern cryptosystems are usually effectively immune to ciphertext-only attacks). In a known-plaintext attack, the

cryptanalyst has access to a ciphertext and its corresponding plaintext (or to riesgos del consumo de viagra many such pairs). In a chosen-plaintext attack, the cryptanalyst may commander viagra pas cher choose a plaintext and learn its corresponding ciphertext (perhaps many times) and in a chosen-ciphertext attack, the cryptanalyst may be able to choose ciphertexts and

learn their corresponding plaintexts. Also important, often overwhelmingly so, are mistakes generally in the

design or use of one of the protocols involved.

At CRG, the group members are working on the cryptanalysis of a number of widely known symmetric and asymmetric ciphers.


Cryptographic Hash Functions

A cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called the message, and the hash value is often called the message digest or simply the digest.

The ideal cryptographic hash function has four main properties:

  • it is easy to compute the hash value for any given message
  • it is infeasible to generate a message that has a given hash
  • it is infeasible to modify a message without changing the hash
  • it is infeasible to find two different messages with the same hash

Cryptographic hash functions have

many information security applications, notably in digital signaturesmessage authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and

as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic

hash values are sometimes called (digitalfingerprintschecksums, or just hash values.

At CRG, research on time complexity of hash functions and use of hash functions for compression is being conducted by the group members.


Quantum Cryptography

Quantum cryptography describes the

use acheter viagra of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.

Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes (e.g. RSA and ElGamal).

The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are

proven or conjectured to be impossible using only classical (i.e. non-quantum) communication.

The most well known and developed application of quantum cryptography is quantum key distribution (QKD). QKD describes the process of using quantum communication to establish a shared key between two parties (usually called Alice and Bob) without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. This is achieved by Alice encoding

the bits of

the key as quantum data and sending them to Bob; if Eve tries to learn these bits, the messages will be disturbed and Alice and Bob will notice. The key is then typically used for encrypted communication.

At CRG, group members are currently researching on quantum key distribution and role of quantum cryptography in noise reduction.


Zero Knowledge Proofs

A protocol between two parties Alice and Bob is zero-knowledge (from Alice’s point of view), if it does not leak any information to Bob. Zero-knowledge is a viagra naturel maca fundamental notion in cryptography and has important applications. For example, Alice can prove to Bob that she knows a secret key corresponding to a given public key (e.g., for identifying herself to Bob) without leaking any information whatsoever about the secret key.

A zero-knowledge proof must satisfy three properties:

  1. Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover.
  2. Soundness: if the statement viagra feminin forum uso is false, no cheating prover can convince the honest verifier that

    it is true, except with female viagra some small probability.

  3. Zero-knowledge: if the cialis generique statement is true, no cheating verifier learns anything other than this fact. This is formalized by showing that every cheating verifier has somesimulator that, given only the statement to be proved (and no access to the prover), can produce a transcript that “looks like” an interaction between the honest prover and the cheating verifier.

The first two of these are properties of more general interactive proof systems. The third is what makes the proof zero-knowledge.

At CRG, researchers are currently working on finding feasible solutions for using zero knowledge proofs

for authentication and access control.

The Chinese leadership is ready for

The Chinese leadership is ready for this deal because it is very frightened by the prospect of climate change. China gets hit harder and earlier than most countries by global warming, and the risk of political destabilization is real. All Beijing needed was a serious commitment to emission cuts by the United States and the deal would have been done.

A Summary of the Research Literature: There is some research support for the above wholesale nhl jerseys theoretical explanations of homelessness. In a synthesis of research findings on factors associated with homelessness, Hartman (2000) identified the primary cause of homelessness as a lack of affordable housing due in part to high rental prices and a decline in construction, some cases, abandonment of government subsidized housing. However, the higher rates of mental illness and/or addictions among homeless people compared to the general population that Hartman noted and several studies have also reported, have been critiqued primarily because the prevalence rate varies from study to study raising questions about their accuracy.

The Scottish blasphemy laws were even harsher than the English. James Affleck was indicted in the High Court of Justiciary for selling the Age of Reason and other books including a translation of a Chinese prayer. wholesale jerseys The society was closed down by the police, and among the books seized from the Society’s library were Mirabaud’s System of Nature, Shelley’s Queen Mab, Voltaire’s Philosophical Dictionary, and Owen’s Essays on the Formation of Character.

Hire a personal trainer to inspire you to exercise together, or visit a spa together. Spend a night out at the theater and have dinner at a quiet and romantic candlelit restaurant. Watch a Sport Event If your boy friend or husband is a sport fan, you can go with him t on the town including tickets to a professional sporting event.

IStock/JOE CICAK 1987: NFL players start a 24 day wholesale nhl jerseys strike that would wipe out one week of the league’s season. The games scheduled for the third week of cheap nba jerseys the season would be canceled, but the games for weeks four through six were played with replacement players and some veterans who crossed the picket line. Having failed to achieve their demands, and given the willingness of the players to cross the picket lines and networks to broadcast the replacement games, the union voted to end the strike on Oct.

Play hard, play fair and play to the best of your ability and wholesale china jerseys win lose or draw after the game shake your opponent’s hand and say ‘good game’. At this stage of my life I’m a spectator mostly and my favorite thing in my whole life to do is to watch my kids practice or play sports. And although I haven’t been the best at it in the past I vow from this day forward to heed to Bob Robertson’s words, win, lose or draw and hope all of you reading will do the same.

and he follows with a comment

Read, he begs, and he follows with a comment he heard once: the prison industry knows how large to build their facilities by looking at the literacy rates for nearby children. Support your library, he demands, so you’re not “stealing from the future to pay for today.””words have power,” says Gaiman, and that includes the power to take readers to other places, or to make them uneasy and shuddery. He’s a fan of Halloween, of “stories that stray into the shadows,” and of tales that seem to portend bad things.” when things get tough, this is what you should do.”Let’s get this out first: “The View from the Cheap Seats” Does.

Coach Eaux may well finish 6 1 and receive an invite to the Sugar Bowl which would be the best postseason date for the Tigers since the cheap jerseys national championship cheap nba jerseys game on Jan. 9, 2012 if No. 14 LSU beats No. If things aren’t heated enough for you and your sweetie after dinner, head to the beach for a special couple’s bonfire featuring S’mores complete with spicy Sriracha infused marshmallows! Rates start at $635. The package is available from Feb. 14 to 16, 2014.

SYDNEY: Most Canadians do not go to Sydney for a night, so a serviced apartment where you can spread out a bit over a few days is a great option. At the Quest Potts Point you can cook your own meals, but are also wholesale china jerseys surrounded by one of the city coolest neighborhoods, with wonderful Thai and Japanese restaurants close by. It is walking distance to the harbour and to great shopping and there a nice rooftop garden with great views of the city.

Time is one of the few companies in the bike industry to weave its own carbon fiber tubes. This allows the French manufacturer to do three things: tune the ride of the Izon for a customized balance of weight to stiffness; refine the ride of the frame to best handle pedaling loads; and dial in shock absorption. Our favorite part of this frame? The fork.

In three years, IMPSA went bust. In Germany, a Turkish company placed an order on us for 150 MW. No German bank would fund him. Beginning in the early 2000s, the industry realized it faced a looming threat. Its work force was made up largely of those who built reactors in the 1970s and 1980s and transitioned into jobs running the plants. That population, infused with years of experience and knowledge, would not be around forever.

If he gets the grant money, he will rent airships from a manufacturer in Mississauga, Ont., using them to as transport infrastructure for short term flights such as caching scientific supplies, dropping off and picking up research crews in cheap jerseys isolated areas, accessing hunting areas and testing scientific equipment. cheap jerseys Well, he says, he wants to determine airships could have a role in mitigating some of the effects of a warming Arctic. Interested in airships was piqued by a scientific expedition he undertook in the Arctic in 2004.

Of water have been evaporated by

As much as 6.9 cub. In. Of water have been evaporated by 1.7 cub. Make sure to inquire your travel agency if they know some cheap hotels Sydney that they could recommend to you when you have decided to travel to Sydney. They will surely give you a great suggestion on where you can look for Sydney cheap hotels which will be fitting for your tight budget without compromising your overall experience. Remember to ask the things you do not understand and read the catalogues they give.

It said: certainly hope you will be addressing the unprecedented action by the White House today when they refused selected news outlets from a cheap jerseys White House news conference. This is dangerous beyond pale and I believe you should strongly condemn this activity without pulling any punches. Of course it dangerous, and of course I condemn it.

It a town city, not a big city city. People do collaborate here. Musicians have always moved here to be session players. Over the years, there had been many tears in Ms. Gibson’s life, and they had often been shed in Wally’s office with the door locked. He gave advice and tried to help when possible, but his greatest role was that of a listener.

By purchasing items only during this time, you are going to save up a lot of gold. If you wait until the game gets difficult for you, usually, too hard to advance, you make sure that you aren’t wasting gold on items that you will never use. All of these items will add up by the end of the game, but you aren’t going to be happy with the results.

A third call came in cheap nfl jerseys within the same two hour period from a barber wholesale nhl jerseys shop downtown. He says a man there cheap nba jerseys showed similar symptoms. That man told Lassiter he had just left Nixon Catering following his shift.. “The first thing that shows up is a female touching my truck. So after that, I let it play out. She went and touched my truck, then over to my little car there touched that one as well checking all the door handles.

Janet Patin is one of many cheap jerseys Oregon physicians trying to counteract million dollar marketing campaigns. She uses a program called “Tar Wars” with local fifth graders. “It’s a terrible addiction, and that’s why it’s best not to start because it is hard to stop.”The Campaign for Tobacco Free Kids estimates the tobacco industry spends almost $100 million a year in Oregon to market its products..

Yet another big box is about to go up on Connecticut Avenue, further clogging an already congested stretch of roadway. The traffic congestion is also set to spread to Main Street and Westport Avenue where developers are eyeing new sites for even more big boxes. Is that what we want for our city? More parking lots and strip malls.