Professional Documents
Culture Documents
Cryptography
Cryptography
HISTORY
People have always had a fascination with keeping
WHY CRYPTOGRAPHY?
The need for more sophisticated methods of protecting
way of living.
The techniques needed to protect data belong to the field
of cryptogra- phy.
TERMS
Cryptography, cryptology, and cryptanalysis, which are
cryptography.
Cryptanalysis deals with breaking such systems.
SECURE COMMUNICATIONS
SECURE COMMUNICATIONS
(CONT..)
Alice and Bob, who want to communicate with each other.
A third party, Eve, is a potential eavesdropper.
When Alice wants to send a message, called the
INTRUDERS GOALS
1.
2.
Find the key and thus read all messages encrypted with that key.
3.
Corrupt Alice's message into another message in such a way that Bob
will think Alice sent the altered message.
4.
Masquerade as Alice, and thus communicate with Bob even though Bob
believes he is communicating with Alice.
respectively.
A more active and malicious adversary, corresponding to cases (3) and
Oscar.
POSSIBLE ATTACKS
1.
2.
3.
4.
KERCKHOFFS PRINCIPLE
One of the most important assumptions in modern
ENCRYPTION/DECRYPTION
METHODS
Symmetric key
Public key
the difficulty of
factoring large integers), ElGamal system (based on
the discrete log problem), NTRU (lattice based) and
the McEliece system (based on error correcting
codes).
puts her message in the box, locks Bob's lock on it, and
sends the box back to Bob.
KEY LENGTH
Most algorithms employ keys, and the security of the
Confidentiality: Eve should not be able to read Alice's message to Bob. The
main tools are encryption and decryption algorithms.
2.
Data integrity: Bob wants to be sure that Alice's message has not been
altered. Many cryptographic primitives, such as hash functions, provide
methods to detect data manipulation by malicious or accidental
adversaries.
3.
Authentication: Bob wants to be sure that only Alice could have sent the
message he received. There are actually two types of authentication that
arise in cryptography: entity authentication and data-origin authentication.
4.
Non-repudiation: Alice cannot claim she did not send the message. This is
important in electronic commerce applications, where a consumer cannot
deny the authorization of a purchase.
CRYPTOGRAPHIC APPLICATIONS
Digital signatures
Identification
Key Establishment
Secret sharing
Security protocols
Electronic cash:
Games
DIGITAL SIGNATURES
One of the most important features of a paper and ink letter is the
signature.
When a document is signed, an individual's identity is tied to the
message.
The assumption is that it is difficult for another person to forge the
IDENTIFICATION
When logging into a machine or initiating a
KEY ESTABLISHMENT
When large quantities of data need to be encrypted, it is best
party give keys to Alice and Bob. Two examples are Blom's key
generation scheme and Kerberos, which is a very popular
symmetric cryptographic protocol that provides authentication
and security in key exchange between users on a network.
SECRET SHARING
Suppose that you have a combination to a bank safe, but
SECURITY PROTOCOLS
How can we carry out secure transactions over open
ELECTRONIC CASH
Credit cards and similar devices are convenient but do
GAMES
How can you flip coins or play poker with people who are
CLASSICAL
CRYPTOSYSTEMS
CONVENTION
plaintext will be written in lowercase letters and
follows:
TECHNIQUES
Shift Ciphers
Affine Ciphers
The Vigenere Cipher
The Playfair Ciphers
The ADFGX ciphers
SHIFT CIPHERS
One of the earliest cryptosystems is often attributed to
Julius Caesar.
He shifted each letter by three places, so a became D, b
AFFINE CIPHERS
Cryptosystem using affine function
Choose two integers and , with gcd(, 26) 1
x x + (mod 26)
For example, let = 9 and = 2, so we are working with 9x + 2. Take a plaintext
x = 1/9(y 2)
But 1/9 needs to be reinterpreted when we work mod 26. Since gcd(9,26) 1,
first the letter of the plaintext and shift by 21. Then shift the
second letter by-4, the third by 2, and so on. Once we get to
the end of the key, we start back at its first entry.
Decrypt method using negative of the chipertext
British
The Playfair system was invented around 1854 by Sir
scheme:
If the two letters are not in the same row or column, replace each letter by the letter
that is in its row and is in the column of the other letter. For example, et becomes MN,
since M is in the same row as e and the same column as t, and N is in the same row as
t and the same column as e.
If the two letters are in the same row, replace each letter with the letter immediately
to its right, with the matrix wrapping around from the last column to the first. For
example, me becomes EG.
If the two letters are in the same column, replace each letter with the letter
immediately below it, with the matrix wrapping around from the last row to the first.
For example, ol becomes VR.
VR GQ XN KU
To decrypt, reverse the procedure.
letters i and j are treated as one, and the columns of the matrix are
labeled with the letters A ,D ,F ,G ,X . For example, the matrix could
be:
Each plaintext letter is replaced by the label of its row and column.
GG FD XX AG FD GA
Then, Choose a keyword, for example, Rhein. Label the
alphabetic order:
BLOCK CIPHERS
In many of the aforementioned cryptosystems, changing
analysis.
Block ciphers avoid these problems by encrypting blocks
HILL CIPHER
Choose an integer n, for example n = 3.
gcd(det(M), 26) = 1
This means that there is a matrix N with integer entries such that
follows:
is blockcipher.
This becomes (we add an x to fill the last space) 1 11 14 2 10
2 8 15 7 4 17 23.
etc.
In our case, the ciphertext is RBZMUEPYONOM.
It is easy to see that changing one letter of plaintext will
EXERCISES
Tunjukkan ciphertext hasil enkripsi menggunakan hill
ONE-TIME PADS
The one-time pad, which is an unbreakable cryptosystem,
and Is.
The key is a random sequence of 0s and Is of the same
1 = 0.
For example, if the massage is 00101001 and the key is