Omówiono związki profesora Janusza Groszkowskiego z wojskiem w okresie międzywojennym, w czasie II wojny światowej i po jej zakończeniu. Wymieniono prace Profesora wykonywane w Wojskowym Instytucie Łączności i Wojskowej Akademii Technicznej.
EN
Discussed are Prof. Janusz Groszkowski’s ties with the army in the interwar period, during the Second World War and after its end. Mentioned are Mr Professor’s works carried out in Wojskowy Instytut Łączności (Military Institute of Communications) and Wojskowa Akademia Techniczna (Military University of Technology).
The first part of the paper explains the need for combining message encryption and authentication. We begin with the example to emphasize the fact that privacy‡ does not imply authenticity. Then we prove, one needs both privacy and authenticity, even if one's aim is just getting privacy. In the second part we present an overview of different methods for providing authenticated encryption (AE) i.e. generic compositions, single-pass modes and two-pass combined modes. We analyze what are the advantages and disadvantages of different AE constructions. In the third part of the paper we focus on nonce§ based authenticated encryption modes. Our motivation is the wish to know the methodology of designing authenticated encryption mode of operation. We take into consideration a few most important properties, e.g. parallelizability, memory requirements and pre-processing capability. We analyze possibilities of choice of underlying encryption and authentication components and their order in a message we also try to answer. What does single-key mode really mean? Finally we mention the importance of provable security theory in the security of authenticated encryption modes.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.