Professional Documents
Culture Documents
Chapter 2
Chapter 2
Cryptography;
Encryption Techniques
Terminologies
Cryptography: Schemes for encryption and
decryption
Encryption: The process by which plaintext is
converted into ciphertext.
Decryption: Recovering plaintext from the ciphertext
Secret key: Used to set some or all of the various
parameters used by the encryption algorithm. In a
classical (symmetric key) cryptography, the same
secret key is used for encryption and decryption
Cryptanalysis: The study of “breaking the code”.
Cryptology: Cryptography and cryptanalysis together
constitute the area of cryptology.
Cryptography
Given
P=Plaintext
C=CipherText
C = EK (P) Encryption
P = DK ( C) Decryption
Cryptography
Cryptographic system are characterized along three independent
dimension:
1.The type of operation used for transforming plaintext to cipher
text: all encryption algorism are based on two general principles:
SUBSTITUATION each element in the plain text is mapped in to
another element. TRANSPOSITION-each element in the plain
text is rearranged.
2.The number of keys used: sender and receiver use the same key
and different key
3.The way in which the plain text is processed:
A. Block cipher process the input one block of elements at a time
producing an output block for each input block.
B. Stream cipher process the input element continuously
producing output one element at a time as it goes along.
Cryptography
Caesar Cipher: SUBSTITUATION principle
Example?
Cryptography
Types of attacks
The attacker has only the ciphertext and his
goal is to find the corresponding plaintext
The attacker has a ciphertext and the
corresponding plaintext and his goal is to
find the key
Intruders
Cryptography
Summary
A pair of keys (private, public)
If you have the private key, you can easily
decrypt what is encrypted by the public key
Otherwise, it is computationally infeasible to
decrypt what has been encrypted by the
public key
Cryptography
Hash functions
In late 1974, IBM proposed "Lucifer", which was then modified by NSA
(National Security Agency) in 1976 to become the DES (Data Encryption
Standard). The DES was approved by the NBS in 1978. The DES was
standardized by the ANSI under the name of ANSI X3.92, also known as
DEA (Data Encryption Algorithm).
Cryptography
DES- Example of Symmetric Cryptosystem …
DES Utilizes block cipher, which means that during the
encryption process, the plaintext is broken into fixed length blocks
of 64 bits.
The key is 56 bits wide. 8-bit out of the total 64-bit block key is
used for parity check (for example, each byte has an odd number
of bits set to 1).
56-bit key gives 256 ( 7.2*1016) possible key variations
Major Activities
Key Generation (Algorithm)
Encryption
Digital signing
Decryption
Signature verification
Cryptography
RSA- Key Generating Algorithm
RSA- Decryption
Recipient B does the following
Uses his private key (n, d) to compute m = cd mod n
Extracts the plaintext from the message representative
m
Cryptography
RSA- Digital signing
Sender A does the following
Creates a message digest of the information to be sent
Represents this digest as an integer m between 0 and n-1
Uses her private key (n, d) to compute the signature
s = md mod n.
Sends this signature s to the recipient, B.
Attacker can put in his own key for someone else, and
start signing fake contracts (and even checks!).
Maybe we can secure the phonebook, but then it kills the
idea of keys widely and easily available (publicly) .
Cryptography
Key Distribution: Problems