You are on page 1of 11

Cryptography

Cryptography terms
• Cryptology is the science of secret codes
• Cryptography deals with systems for translating
data into codes that are meaningless to anyone
who does not possess the system for recovering
the initial data.
• Cryptanalysis are the techniques for recovering
encrypted data
• Cipher is an algorithm for performing encryption
or decryption
Cryptography
Cryptographic Techniques
They are three classes of techniques for enciphering
plaintext:
• Substitution ciphers

• Transposition ciphers.

• Product ciphers
Cryptography
Choosing a Cipher System
• A cipher system has two components: algorithm
and the key
• Five desirable properties of a cipher system:
• High Work Factor
• Small key
• Simplicity
• Low error propagation
• Little expansion of message size.
Cryptography

Private key cryptosystems?


Cryptography
Public Key Cryptosystems
• Ensuring the secure distribution of a private key to
parties who need the key is a difficult task.
• The widely known public key cryptosystem is the
RSA scheme.
• The disadvantage of public key cryptosystems is
that they are slow relative to the processing time
required for private-key cryptosystems.
Cryptography
Key Distribution
• Maintaining the secrecy of the cryptographic key is
of paramount importance.
• The method chosen to distribute a key must be
reliable; and maintain the secrecy of the keys thus
maintaining overall secrecy of the cryptosystem.

• Reminder: assignment diffie-hellman key


exchange protocol
Cryptography
Link Encryption
• Protects all data traversing a communication link
between two nodes in a network.
• The two nodes share a common encryption key.
• The message and its source and destination
identifiers can be encrypted.
• Link encryption can not protect the integrity of data
if a node in the network is subverted.
• High costs may have to be incurred to protect the
security of each node in the network.
Cryptography
End to End Encryption
• End to End encryption protects the integrity of
data passing between a sender and receiver,
independently of the nodes that the data
traverses.
• It provides limited protection against traffic
analysis.
• Consequently, link encryption sometimes is used in
conjunction with end to end encryption to reduce
exposures from traffic analysis.
Cryptography

Explain Diffie-Hellman key exchange, El-gamal


and RSA Algorithms.
Cryptography
Digital Signatures
• Establishing the authenticity of individuals and
preventing the disavowal of messages and or
contracts are still critical requirements when data
is exchanged in electronic form.
• A digital signature is simply a string of 0s and 1s
rather than a line drawn on a page.
• Public key cryptosystems can be used to establish:
secret messages
signed messages
signed, secret messages.
Boundary Controls
Secret Message
•S Pur(m)
•R Prr[Pur(m)]

Signed Secret Message


•S Pur(m)
•S Prs[Pur(m)]
•R Pus (Prs[Pur(m)])
•R Prr[Pur(m)]

You might also like