0% found this document useful (0 votes)
49 views11 pages

Cryptography

This document discusses cryptography concepts including cryptology, cryptography, cryptanalysis, ciphers, cryptographic techniques, choosing cipher systems, public key cryptosystems, key distribution, link encryption, end-to-end encryption, and digital signatures. It explains that cryptography deals with encoding data into codes using algorithms and keys, while cryptanalysis recovers encrypted data. There are three classes of encryption techniques: substitution ciphers, transposition ciphers, and product ciphers. Public key cryptosystems like RSA use different keys for encryption and decryption to securely distribute keys. Digital signatures authenticate messages using public key cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views11 pages

Cryptography

This document discusses cryptography concepts including cryptology, cryptography, cryptanalysis, ciphers, cryptographic techniques, choosing cipher systems, public key cryptosystems, key distribution, link encryption, end-to-end encryption, and digital signatures. It explains that cryptography deals with encoding data into codes using algorithms and keys, while cryptanalysis recovers encrypted data. There are three classes of encryption techniques: substitution ciphers, transposition ciphers, and product ciphers. Public key cryptosystems like RSA use different keys for encryption and decryption to securely distribute keys. Digital signatures authenticate messages using public key cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cryptography

Cryptography terms
• Cryptology is the science of secret codes
• Cryptography deals with systems for translating
data into codes that are meaningless to anyone
who does not possess the system for recovering
the initial data.
• Cryptanalysis are the techniques for recovering
encrypted data
• Cipher is an algorithm for performing encryption
or decryption
Cryptography
Cryptographic Techniques
They are three classes of techniques for enciphering
plaintext:
• Substitution ciphers

• Transposition ciphers.

• Product ciphers
Cryptography
Choosing a Cipher System
• A cipher system has two components: algorithm
and the key
• Five desirable properties of a cipher system:
• High Work Factor
• Small key
• Simplicity
• Low error propagation
• Little expansion of message size.
Cryptography

Private key cryptosystems?


Cryptography
Public Key Cryptosystems
• Ensuring the secure distribution of a private key to
parties who need the key is a difficult task.
• The widely known public key cryptosystem is the
RSA scheme.
• The disadvantage of public key cryptosystems is
that they are slow relative to the processing time
required for private-key cryptosystems.
Cryptography
Key Distribution
• Maintaining the secrecy of the cryptographic key is
of paramount importance.
• The method chosen to distribute a key must be
reliable; and maintain the secrecy of the keys thus
maintaining overall secrecy of the cryptosystem.

• Reminder: assignment diffie-hellman key


exchange protocol
Cryptography
Link Encryption
• Protects all data traversing a communication link
between two nodes in a network.
• The two nodes share a common encryption key.
• The message and its source and destination
identifiers can be encrypted.
• Link encryption can not protect the integrity of data
if a node in the network is subverted.
• High costs may have to be incurred to protect the
security of each node in the network.
Cryptography
End to End Encryption
• End to End encryption protects the integrity of
data passing between a sender and receiver,
independently of the nodes that the data
traverses.
• It provides limited protection against traffic
analysis.
• Consequently, link encryption sometimes is used in
conjunction with end to end encryption to reduce
exposures from traffic analysis.
Cryptography

Explain Diffie-Hellman key exchange, El-gamal


and RSA Algorithms.
Cryptography
Digital Signatures
• Establishing the authenticity of individuals and
preventing the disavowal of messages and or
contracts are still critical requirements when data
is exchanged in electronic form.
• A digital signature is simply a string of 0s and 1s
rather than a line drawn on a page.
• Public key cryptosystems can be used to establish:
secret messages
signed messages
signed, secret messages.
Boundary Controls
Secret Message
•S Pur(m)
•R Prr[Pur(m)]

Signed Secret Message


•S Pur(m)
•S Prs[Pur(m)]
•R Pus (Prs[Pur(m)])
•R Prr[Pur(m)]

You might also like