Cryptography Flashcards
Goal of a Cryptosystem
Relay an information from one place to another without anyone else being able to know it.
the process of using an algorithm to transform information into a format that cannot be read.
Encryption
is the process of using another algorithm to transform encrypted information back into a readable format.
Decryption
The original information is referred to as the
plain text
encrypted version of original information is the
cipher text
Objectives of Encryption
Confidentiality
Integrity
Authenticity
Non-repudiation
The sender (let us call her Alice) and receiver (let us call him Bob) can be assured that no third party can read the message.
Confidentiality
Alice and Bob can be sure that no third party can make changes in the message.
Integrity
Bob can be sure that it is Alice who sent the message.
Authenticity
Bob can prove to any third party that Alice sent the message
Non-repudiation
example Simple Ciphers
Dancing Man Cipher System
Pigpen Cipher
If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.
Caesar’s Cipher/ shift cipher
Vigenère Cipher maker
french diplomat, Blaise de Vigenere, 1523-1596.
He viewed the cipher as a substitution cipher where a different alphabet was used for the next letter of the message, with the alphabets repeating periodically — according to some key.
Vigenère Cipher
is a substitution cipher where each letter of the plain text is replaced with another letter of the alphabet. It uses a fixed key which consist of the 26 letters of a “shuffled alphabet”.
MONO-ALPHABETIC CIPHER SYSTEM
a substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example
The Enigma machine is more complex example
POLY-ALPHABETIC CIPHER SYSTEM
Two Basic Techniques of encryption
Symmetric encryption
Asymmetric encryption
also called secret key encryption
only has one key
Symmetric encryption
also called public key encryption
has a public key and secret key
Asymmetric encryption
introduced a new method of encryption and key management now referred to as public key cryptography.
W. Diffie and M. Hellman
system that uses a pair of keys (a PUBLIC KEY and a PRIVATE KEY).
Public key cryptography
Each individual is assigned these keys to encrypt and decrypt information.
A message encrypted by one of the two keys (the public key) can only be decrypted by the other key in the pair (the private key).
Public key cryptography
(the public key) incryptor
(the private key) decryptor
true
is available for others to use when encrypting information that will be sent to an individual.
People can use that individual’s_________ to decrypt information sent by him
public key
is accessible only to the individual.
The individual can use his _________ to decrypt any message encrypted with his public key.
The public key
means that the difference a – b is divisible by the integer n
Modular arithmetic