Professional Documents
Culture Documents
Chapter 02
Chapter 02
What is cryptography?
Classic cryptosystems
o The Caesar cipher
o Monoalphabetic replacement cipher
o The one-time pad
Types of cryptosystems
o Codes vs. ciphers
o Symetric-key vs. assymetric-key (public key)
o Hybrid cryptosystems
A B C D E F G H I J K L MN O P Q R S T U VWX Y Z
J Q P L M Z K OWH A N X I E U R Y T G S F D V C B
A B C D E F G H I J K L MN O P Q R S T U VWX Y Z
J Q P L M Z K OWH A N X I E U R Y T G S F D V C B
Encryption: replace each plaintext letter with the
corresponding cipher letter
o Replace every “A” in the plaintext with a “J”
o Replace every “B” in the plaintext with a “Q”
o Replace every “C” in the plaintext with a “P”, etc.
A B C D E F G H I J K L MN O P Q R S T U VWX Y Z
J Q P L M Z K OWH A N X I E U R Y T G S F D V C B
Ciphertext:
o “W uymzmy zymmlex dwgo ljikmy ge tnjfmyc dwgo
mjtm.”
A B C D E F G H I J K L MN O P Q R S T U VWX Y Z
J Q P L M Z K OWH A N X I E U R Y T G S F D V C B
Decryption: replace each plaintext letter with the
corresponding cipher letter from the cipher
alphabet
Plaintext
o “I prefer freedom with danger to slavery with ease.”
= “ATTACK AT DAWN”
Encrypt(M,CPublic) Encrypt(M,APublic)
B C A
o A and B think their messages secure, but C reads them
o Public-key cryptography depends on knowing to whom a
public key belongs