Professional Documents
Culture Documents
Example:
- The solution to all security problems.
K=3
- Reliable unless implemented properly.
TREATY IMPOSSIBLE is translated to…
- Reliable unless used properly.
WUHDWB LPSRVVLEOH
- Something you should try to yourself.
Plaintext
- A message in its natural format readable by an attacker.
MESSAGE AUTHENTICATION
- Original message or data (also called cleartext).
- A digest can be used to check the integrity of a message: that the message
has not been changed.
Ciphertext
- Message altered to be unreadable by anyone except the intended
recipients.
TYPES of CIPHERS
Encryption
Private key cryptosystems/ciphers - Transforming the plaintext, under the control of the key.
- The secret key is shared between two parties.
Key
Public key cryptosystems/ciphers - Sequence that controls the operation and behavior of the cryptographic
- The secret key is not shared and two parties can still communicate using algorithm.
their public keys.
Decryption
- Transforming the ciphertext back to the original plaintext.
©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
TYPES of CRYPTHOGRAPHY - Classical transposition or permutation ciphers.
- These hide the message by rearranging the letter order without altering the
Stream Ciphers actual letters used.
- Are fast and easy to implement in hardware - Word Jumble
- One byte at a time.
- Mixes plaintext with key stream Monoalphabetic Cipher
- Either using Symmetric Key or Public Key. - Caesar
- “Cipher” line can be any permutation of the 26 alphabetic character.
Block Ciphers
- Are stronger, but slower and often implemented in hardware.
- One or large block at a time.
- Substitution and transposition. RAIL FENCE CIPHER
Transposition Cipher
- Change position of letter in text
©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
SHA-1
- Computes 160-bit hash value.
STENOGRAPHY - NIST approved message digest algorithm.
DES CRYPTANALYSIS
- Modes: ECB, CBC, CFB, OFB, CM
3DES The study of methods to break cryptosystems.
AES Often targeted at obtaining a key.
IDEA Attacks may be passive
Blowfish .
RC4
RC5 CRYPTANALYSIS ATTACKS
CAST
Brute Force
SAFER
- Trying all key values in the keyspace.
Twofish
Frequency Analysis
ASSYMETRIC ALGORITHMS
- Guess values based on frequency of occurrence.
RNG Attack
HASHING ALGORITHMS - Predict IV used by an algorithm