You are on page 1of 10

1502543 - Network Security

and Cryptography
Dr. Ala Altaweel
aaltaweel@sharjah.ac.ae
University of Sharjah

1
Classical Encryption Techniques

2
Symmetric Encryption

• Also referred to as conventional encryption or


single-key encryption
• Was the only type of encryption in use prior to the
development of public-key encryption in the 1970s
• Remains by far the most widely used of the two
types of encryption

3
Basic Terminology
• Plaintext
• The original message • Cryptographic system or
cipher
• Ciphertext • Schemes used for
encryption
• The coded message
• Cryptanalysis
• Enciphering or encryption
• Techniques used for
• Process of converting from deciphering a message
plaintext to ciphertext without any knowledge of
the enciphering details
• Deciphering or decryption
• Restoring the plaintext • Cryptology
from the ciphertext • Areas of cryptography and
cryptanalysis together
• Cryptography
• Study of encryption
4
Simplified Model of Symmetric Encryption

5
Model of Symmetric Cryptosystem

6
Cryptographic Systems
• Characterized along three independent dimensions:

The type of
operations used for The number of keys The way in which the
transforming plaintext used plaintext is processed
to ciphertext

Symmetric, single-
key, secret-key,
Substitution Block cipher
conventional
encryption

Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption

7
Cryptanalysis and
Brute-Force Attack

Cryptanalysis Brute-force attack


• Attack relies on the nature of the • Attacker tries every possible key on
algorithm plus some knowledge of the a piece of ciphertext until an
general characteristics of the plaintext intelligible translation into plaintext
• Attack exploits the characteristics of is obtained
the algorithm to attempt to deduce a • On average, half of all possible keys
specific plaintext or to deduce the key must be tried to achieve success
being used

8
Table
2.1
Types of
Attacks
on
Encrypted
Messages

9
Encryption Scheme Security
• Unconditionally secure
• No matter how much time an opponent has, it
is impossible for him or her to decrypt the
ciphertext simply because the required
information is not there

• Computationally secure
• The cost of breaking the cipher exceeds the
value of the encrypted information
• The time required to break the cipher
exceeds the useful lifetime of the
information
10

You might also like