Cryptography
Cryptography terms
• Cryptology is the science of secret codes
• Cryptography deals with systems for translating
data into codes that are meaningless to anyone
who does not possess the system for recovering
the initial data.
• Cryptanalysis are the techniques for recovering
encrypted data
• Cipher is an algorithm for performing encryption
or decryption
Cryptography
Cryptographic Techniques
They are three classes of techniques for enciphering
plaintext:
• Substitution ciphers
• Transposition ciphers.
• Product ciphers
Cryptography
Choosing a Cipher System
• A cipher system has two components: algorithm
and the key
• Five desirable properties of a cipher system:
• High Work Factor
• Small key
• Simplicity
• Low error propagation
• Little expansion of message size.
Cryptography
Private key cryptosystems?
Cryptography
Public Key Cryptosystems
• Ensuring the secure distribution of a private key to
parties who need the key is a difficult task.
• The widely known public key cryptosystem is the
RSA scheme.
• The disadvantage of public key cryptosystems is
that they are slow relative to the processing time
required for private-key cryptosystems.
Cryptography
Key Distribution
• Maintaining the secrecy of the cryptographic key is
of paramount importance.
• The method chosen to distribute a key must be
reliable; and maintain the secrecy of the keys thus
maintaining overall secrecy of the cryptosystem.
• Reminder: assignment diffie-hellman key
exchange protocol
Cryptography
Link Encryption
• Protects all data traversing a communication link
between two nodes in a network.
• The two nodes share a common encryption key.
• The message and its source and destination
identifiers can be encrypted.
• Link encryption can not protect the integrity of data
if a node in the network is subverted.
• High costs may have to be incurred to protect the
security of each node in the network.
Cryptography
End to End Encryption
• End to End encryption protects the integrity of
data passing between a sender and receiver,
independently of the nodes that the data
traverses.
• It provides limited protection against traffic
analysis.
• Consequently, link encryption sometimes is used in
conjunction with end to end encryption to reduce
exposures from traffic analysis.
Cryptography
Explain Diffie-Hellman key exchange, El-gamal
and RSA Algorithms.
Cryptography
Digital Signatures
• Establishing the authenticity of individuals and
preventing the disavowal of messages and or
contracts are still critical requirements when data
is exchanged in electronic form.
• A digital signature is simply a string of 0s and 1s
rather than a line drawn on a page.
• Public key cryptosystems can be used to establish:
secret messages
signed messages
signed, secret messages.
Boundary Controls
Secret Message
•S Pur(m)
•R Prr[Pur(m)]
Signed Secret Message
•S Pur(m)
•S Prs[Pur(m)]
•R Pus (Prs[Pur(m)])
•R Prr[Pur(m)]