Professional Documents
Culture Documents
Machine
3-1
Copyright © 2015 Pearson Education, Inc.
World’s first: electronic digital
programmable computer
???
• Substitution is circular
K=19
• The person encrypting the messages
chooses key, “k”.
Copyright © 2015 Pearson Education, Inc.
CAESAR’S CIPHER TRANSPOSITION
EXAMPLE EXAMPLE
Examples
3-17
Symmetric
Key
Encryption • Integrity
for:
• Non-repudiation
5
Copyright © 2015 Pearson Education, Inc.
Source of the diagram: https://en.wikipedia.org/wiki/Cryptographic_hash_function
Hashing (4)
Characteristic Encryption Hashing
Result length About the Short fixed
same length length
as the regardless of
• Hashing plaintext message length
3-28
• Hashing Algorithms
3-29
3-30
31
3-31
Copyright © 2015 Pearson Education, Inc.