Cryptography Reference
In-Depth Information
TABLE 16.2
i
C
is congruent to
R i
modulo
p i
1
74111215
234
499
2
74111215
201
503
3
74111215
147
563
Using the write subkeys, we encipher the records by forming the sum
C w 1 R 1 +
w 3 R 3
108744576 234 + 98327950 201 + 75550097 147
56316012993
w 2 R 2 +
74111215 (mod 141311311).
To retrieve a particular record R i from the database, we simply compute the least non-
negative residue of C modulo p i . Table 16.2 shows all the retrieved records.
Editing a Record Note that modifying some record R i to some new value R i with this
scheme is particularly easy, for it does not involve recomputing the entire sum
C w i R i (mod M ) 0 C < M , i = 1, 2, . . . , n .
All we have to do is compute the difference between the new value and the old value:
D = R i R i ,
then add this to the sum to get a new enciphered value for the database.
C C
+
w i D
(mod
M
).
This works because
C C
w i D
w 1 R 1 + w 2 R 2 + . . . + w i R i + . . . + w n R n + w i D
w 1 R 1 +
+
w 2 R 2 + . . . +
w i R i + . . . +
w n R n +
w i (
R i R i )
w 1 R 1 +
w i R i
w 1 R 1 + w 2 R 2 + . . . + w i R i + . . . + w n R n (mod M ).
w 2 R 2 + . . . +
w i R i w i R i + . . . +
w n R n +
E XAMPLE .
Suppose in our previous example that individual 2 wishes to change
R 2 = 201
to the new value
R 2
= 103.
Search WWH ::




Custom Search