Professional Documents
Culture Documents
Cryptography-Information Systems Security
Cryptography-Information Systems Security
Cryptography-Information Systems Security
Chapter 2 - Cryptography
Dr Mercy Chitauro
Contents
• Encryption
• Types of encryption algorithms
• Encryption Uses
Introduction
What is encryption
Introduction
Encryption Algorithm
• Y= F(x,k)
• Y = Ciphertext (scrambled information)
• X= Our original data known as plaintext
• K= Additional information used in the
algorithm
Creating Ciphertext
Some Basic
Cryptology - field of both cryptography and
Terminology cryptanalysis.
• The
• The type
type of of operations
operations usedused
for for transforming
transforming plaintext
plaintext to ciphertext
to ciphertext
• Substitution
• Substitution
• Each
• Each element
element in the
in the plaintext
plaintext is mapped
is mapped intointo another
another element
element
• Transposition
• Transposition
• Elements
• Elements in the
in the plaintext
plaintext areare rearranged
rearranged
Cryptosystems • Fundamental
• Fundamental requirement
requirement is that
is that no information
no information be lost
be lost
are generically • Product
• Product systems
systems
• Involve
• Involve multiple
multiple stages
stages of substitutions
of substitutions andand transpositions
transpositions
classified along • The
• The number
number of keys
of keys usedused
three • Referred
• Referred to to
encryption
as as
if
symmetric,
symmetric,
both sender
single-key,
single-key,
and receiver
secret-key,
secret-key,
use the
or conventional
or conventional
same key
encryption if
both sender and receiver use the same key
independent • Referred
• Referred to to
as as asymmetric,
asymmetric, two-key,
two-key, or public-key
or public-key encryption
encryption if theifsender
the
sender andeach
receiver
use aeach use akey different key
dimensions: and
• The
• The
receiver
wayway in which
in which the the
different
plaintext
plaintext is processed
is processed
• Block
• Block cipher
cipher processes
processes thethe
inputinputoneone blockblock of elements
of elements at a at a time,
time, producing
producing an output block
an output block for each input block for each input block
• Stream
• Stream cipher
cipher processes
processes thetheinputinput elements
elements continuously,
continuously, producing
producing output
output one element at a time,
one element at a time, as it goes along as it goes along
Transposition Ciphers
Substitution Ciphers
xxxx
Types of Encryption
Algorithms
Hash
Symmetric
Asymmetric
Symmetric Encryption
• Also referred to as conventional encryption
or single-key encryption
Confidentiality Authentication
Data
Authentication Access Control Data integrity Nonrepudiation
Confidentiality
13 Storch Street T: +264 61 207 2258
Private Bag 13388 F: +264 61 207 9258
Windhoek E: fci@nust.na
NAMIBIA W: www.nust.na
Summary