Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect...
-
Upload
raymond-lucas -
Category
Documents
-
view
213 -
download
0
Transcript of Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect...
![Page 1: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/1.jpg)
Introduction to Cryptology
Fall 2006
![Page 2: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/2.jpg)
Definitions
Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove integrity [1]
Cryptography comes from the Greek words Kryptos, meaning hidden, Graphen, meaning to write.
Cryptography is the art of communicating confidentially through an insecure channel
Cryptanalysis is the art of deciphering those communications when one is not the legitimate receiver.
Cryptology is the union of these two domains. Cryptology is actually the study of codes and ciphers.
![Page 3: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/3.jpg)
Definitions
Plaintext the original message that is to be changed into a secret form
Cipher, Cryptosystem, Encryption Method is a procedure for converting the plaintext message into encrypted message – ciphertext
The word cipher originates from the Hebrew word "Saphar," meaning "to number."
Decryption - the process that conducted by the intended receiver to recover original message (plaintext) from the encrypted message (ciphertext)
Key - keeps the message secret
![Page 4: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/4.jpg)
Encryption-Decryption
Plaintext Ciphertext
Encryption Method
Encryption key
Ciphertext Plaintext
Decryption method
Decryption Key
![Page 5: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/5.jpg)
Symmetric and Asymmetric Ciphers
Symmetric Cipher – knowledge of encryption key is equivalent to knowledge of the decryption key, or the same key is used for encryption and decryption.
Asymmetric Cipher (Public-Key Cryptosystem) the knowledge of encryption key give little information about the decryption key and vice versa
![Page 6: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/6.jpg)
Early History of Cryptology
Polybius’ Checkboard
205 – 123 B.C.
Plaintext POLYBIUS produces the ciphertext
3534315412244543
1 2 3 4 5
1 A B C D E
2 F G H IJ K
3 L M N O P
4 Q R S T U
5 V W X Y Z
![Page 7: Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.](https://reader036.fdocuments.in/reader036/viewer/2022082821/5697bfc91a28abf838ca8bba/html5/thumbnails/7.jpg)
Julius Caesar Cipher
Caesar enciphered messages by replacing each letter by the third letter after that one:
A D, B E, C F, D G, …Z C Plaintext “ET TU, BRUTE?'' becomes the ciphertext “HW
WX, EUXWH?'' Ciphertext may be deciphered by replacing each letter by
the third previous letter. We think of each letter as corresponding to a number from 0
to 25 To encipher, we map numbers according to
C ( P + 3 )(mod 26) To decipher, we map numbers according to
P (C – 3) (mod 26)