Monday, November 15, 2010

14.1-14.2, due on November 17

1. As soon as we started applying hash functions to this seemingly simple and understandable concept, things went downhill. I didn't understand the second half of page 320 on. It seems like this confusing part is somewhat of an extension of the previous concepts of section 14.2. Also, I'm getting all of the sequences of numbers confused. The s's, v's, and j's all get jumbled together.

2. The broad concepts discussed are really interesting. I like the fact that something can be verified with a very high probability without any useful information being released to Victor, and therefore, by Eve. I'm curious to know if the Feige-Fiat-Shamir Identification Scheme is really what is used in ATM and other machines which must verify the identity of a person.

No comments:

Post a Comment