Professional Documents
Culture Documents
Reader’s Guide
The art of war teaches us to rely not on the likelihood of the enemy's not coming,
but on our own readiness to receive him; not on the chance of his not attacking,
but rather on the fact that we have made our position unassailable.
Roadmap
Cryptographic algorithms
symmetric ciphers
asymmetric encryption
hash functions
Mutual Trust
Network Security
Computer Security
Standards Organizations
Computer Security
Low
Moderate
High
1. not simple
Aspects of Security
security attack
security mechanism
security service
note terms
Passive Attacks
Active Attacks
Security Service
X.800:
RFC 2828:
cryptographic techniques
security concepts:
"I am fairly familiar with all the forms of secret writings, and am myself the
author of a trifling monograph upon the subject, in which I analyze one
hundred and sixty separate ciphers," said Holmes..
Symmetric Encryption
Requirements
mathematically have:
Y = E(K, X)
X = D(K, Y)
• substitution
• transposition
• product
• single-key or private
• two-key or public
• block
• stream
Cryptanalysis
general approaches:
cryptanalytic attack
brute-force attack
Cryptanalytic Attacks
ciphertext only
chosen plaintext
chosen ciphertext
chosen text
More Definitions
unconditional security
computational security
128 2128 = 3.4 1038 2127 µs = 5.4 1024 5.4 1018 years
years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 5.9 1030 years
years
Caesar Cipher
by Julius Caesar
example:
Caesar Cipher
abcdefghijklmnopqrstuvwxyz
DEFGHIJKLMNOPQRSTUVWXYZABC
abcdefghij k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
A maps to A,B,..Z
Summary
have considered:
Playfair cipher
polyalphabetic ciphers
transposition ciphers
stenography