The properties of these 12 schemes are given in table 5.5together with fixed points and some properties if the underlying block cipher is DES.For each of these schemes it is possible to write a “proof” of their security based on ablack box model of the encryption algorithm, as was done for the Davies-Meyer scheme(number 5 in the table) in [328].
đang được dịch, vui lòng đợi..
