LECTURE NOTE 2 Flashcards
(57 cards)
making secret messages; The practice of creating secret messages by transforming plaintext (an ordinary readable message) into ciphertext (secret messages that are
difficult to interpret)
crypotography
breaking secret messages
The process of deciphering secret messages, involving the recovery of plaintext from ciphertext without possessing the key. Also called code breaking
cryptanalysis
The combined art and science of both creating and
deciphering “secret codes”.
It encompasses cryptography and cryptanalysis, representing the broader
field of secure communication techniques.
cryptology
term that serves as a synonym for any or all of the
aforementioned concepts, with the precise meaning determined by the
context in which it is used.
Crypto
what are the cryptographic systems are generally classified along three independent
dimensions
type of operations used for encryption, number of keys used, processing of plaintext
what are the types of operations used for encryption
substitution, transposition, product systems/ciphers
what are different types of number of keys used
symmetric, asymmetric
what are the different types of processing of plaintext
block cipher, stream cipher
each element in the plaintext is mapped into another element
substitution
elements in plaintext are rearranged
transposition
multiple stages/combinations of substitutions and
transposition
product systems/ciphers
sender and receiver use same key
symmetric
sender and receiver each use a different key
asymmetric
operates on input data in fixed-size blocks. Processes each
block independently, generating an output block
block cipher
process the input elements continuously, producing output
element one at a time, as it goes along
stream cipher
only to the sender and receiver, is a critical
component of the encryption/decryption processes.
key
a particular algorithm (cryptographic system)
cipher
original message
plaintext
encrypted or coded message
ciphertext
convert from plaintext to ciphertext (enciphering)
encryption
restore the plaintext from ciphertext (deciphering)
decryption
critical information used in cipher known only to sender/receiver
key
cryptosystem uses the same key to encrypt as to decrypt
symmetric key
cryptosystem uses a public key to encrypt and a
private key to decrypt
public/Asymmetric