Professional Documents
Culture Documents
and Cryptography
Dr. Ala Altaweel
aaltaweel@sharjah.ac.ae
University of Sharjah
1
Classical Encryption Techniques
2
Symmetric Encryption
3
Basic Terminology
• Plaintext
• The original message • Cryptographic system or
cipher
• Ciphertext • Schemes used for
encryption
• The coded message
• Cryptanalysis
• Enciphering or encryption
• Techniques used for
• Process of converting from deciphering a message
plaintext to ciphertext without any knowledge of
the enciphering details
• Deciphering or decryption
• Restoring the plaintext • Cryptology
from the ciphertext • Areas of cryptography and
cryptanalysis together
• Cryptography
• Study of encryption
4
Simplified Model of Symmetric Encryption
5
Model of Symmetric Cryptosystem
6
Cryptographic Systems
• Characterized along three independent dimensions:
The type of
operations used for The number of keys The way in which the
transforming plaintext used plaintext is processed
to ciphertext
Symmetric, single-
key, secret-key,
Substitution Block cipher
conventional
encryption
Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption
7
Cryptanalysis and
Brute-Force Attack
8
Table
2.1
Types of
Attacks
on
Encrypted
Messages
9
Encryption Scheme Security
• Unconditionally secure
• No matter how much time an opponent has, it
is impossible for him or her to decrypt the
ciphertext simply because the required
information is not there
• Computationally secure
• The cost of breaking the cipher exceeds the
value of the encrypted information
• The time required to break the cipher
exceeds the useful lifetime of the
information
10