Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a...

download Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.

If you can't read please download the document

Transcript of Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a...

Mekanisme security & Crytography Cryptography Security Cryptography may be a component of a secure system Adding cryptography may not make a system secure Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key cryptology - the field of both cryptography and cryptanalysis Terms: types of ciphers restricted cipher symmetric algorithm public key algorithm Restricted cipher Secret algorithm Leaking Reverse engineering HD DVD (Dec 2006) and Blu-Ray (Jan 2007) RC4 All digital cellular encryption algorithms DVD and DIVX video compression Firewire Enigma cipher machine Every NATO and Warsaw Pact algorithm during Cold War Symmetric algorithm Secret key C = EK(M ) M = DK(C ) Public key algorithm Public and private keys C1 = Epublic(M ) M = Dprivate(C1 ) also: C2 = Eprivate(M ) M = Dpublic(C2 ) Symmetric Cipher Model Requirements two requirements for secure use of symmetric encryption: a strong encryption algorithm a secret key known only to sender / receiver Y = E K (X) X = D K (Y) assume encryption algorithm is known implies a secure channel to distribute key Classic Cryptosystems Substitution Ciphers Jenis subtitution chipers Caesar Cipher earliest known substitution cipher by Julius Caesar first attested use in military affairs replaces each letter by 3rd letter on example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB Caesar Cipher can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y Z then have Caesar cipher as: C = E(p) = (p + k) mod (26) p = D(C) = (C k) mod (26) Ancient Hebrew variant(ATBASH) meet me after the toga party NVVG NV ZUGVI GSV GLTZ KZIGB TABEL Transposition Ciphers Transposition ciphers: staff cipher Secara Horisontal Transposition cipher with key