Now consider the opposite problem
Now consider the opposite problem: using an encryption algorithm to construct a one way hash function. Consider using RSA with a known key. Then process a message consisting of a sequence of blocks as follows: Encrypt the first block, XOR the result with the second block and encrypt again, etc. Show that this scheme is […]
Now consider the opposite problem Read More »