Lecture On safety and security of information systems: Cryptography
Số trang: 56
Loại file: pdf
Dung lượng: 1.22 MB
Lượt xem: 28
Lượt tải: 0
Xem trước 6 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!
Nội dung trích xuất từ tài liệu:
Lecture On safety and security of information systems: Cryptography Cryptography Contents 1) Basic Terminology of cryptography 2) History of cryptography 3) Symmetric Cipher 4) Asymmetric Cipher 5) Hashing algorithms 1. Basic Terminology Basic Terminology Plaintext: The original message Ciphertext: the crypted message Encryption: the process of converting plaintext into ciphertext Plaintext Ciphertext Decryption: the process of recovering ciphertext into plaintext Ciphertext Plaintext Cipher: is an algorithm to encrypt or decrypt information. Basic Terminology Cryptosystem: The algorithms, or ciphers, used to encrypt and decrypt data Cryptosystem = encryption + decryption algorithms. Key: info used in cipher known only to sender/receiver Cryptology Cryptography: is the Science of Writing in Secret Code Cryptanalysis: science of studying attacks against cryptographic systems Cryptology = Cryptography + Cryptanalysis CRYPTOLOGY CRYPTOGRAPHY CRYPTANALYSIS Cryptography Cryptographic systems are characterized along three independent dimensions Type of encryption operations used Substitution: replacing each element of the plaintext with another element Transposition: rearranging the order of the elements of the plaintext. Product: using multiple stages of substitutions and transpositions Cryptography Number of keys used: Symmetric: single-key, private-key Asymmetric: two-key, public-key way in which the plaintext is processed Block cipher: processes the input one block of elements at a time Stream cipher: processes the input elements continuously Cryptanalysis Objective: to recover the key in use rather than simply to recover the plaintext of a single ciphertext. Two general approaches: Brute-force attack: try every key to decipher the ciphertext Cryptanalysis attack: exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used Cryptanalysis Brute-force attack: On average, half of all possible keys must be tried to achieve success. Cryptology CRYPTOLOGY CRYPTOGRAPHY CRYPTANALYSIS SYMMETRIC ASYMMETRIC CLASSICAL MODERN Substitution Block ciphers Transposition Stream ciphers 2. Symmetric Ciphers A. Classical Encryption B. Modern Encryption SYMMETRIC CIPHER MODEL Plaintext Encryption algorithm Secret key Ciphertext Decryption algorithm Requirements Two requirements for secure use of symmetric encryption: strong encryption algorithm secret key know only to sender/receiver Mathematically have Y=E(K,X) X=D(K,Y) assume encryption algorithm is known implies a secure channel to distribute key A. Classical encryption Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Substitution Techniques Hill Cipher Polyalphabetic Ciphers One-Time Pad A. Classical encryption (Cont.) Transposition Techniques Steganography Substitution Techniques a) Caesar Cipher Invented by Julius Caesar. Each letter is replaced by the letter K positions further down the alphabet. Example: Plaintext: meet me after the toga party Key: k=3 Ciphertext: PHHW PH DIWHU WKH WRJD SDUWB a) Caesar Cipher Mathematically, map letter to numbers: C = E(P, k) = (P + k) mod 26 C: Ciphertext letter P: Plaintext letter P = D(C, k) = (C - k) mod 26 K: Key [1-25] Plaintext = “Go to the canteen after class”, k =4 Ciphertext = ???
Nội dung trích xuất từ tài liệu:
Lecture On safety and security of information systems: Cryptography Cryptography Contents 1) Basic Terminology of cryptography 2) History of cryptography 3) Symmetric Cipher 4) Asymmetric Cipher 5) Hashing algorithms 1. Basic Terminology Basic Terminology Plaintext: The original message Ciphertext: the crypted message Encryption: the process of converting plaintext into ciphertext Plaintext Ciphertext Decryption: the process of recovering ciphertext into plaintext Ciphertext Plaintext Cipher: is an algorithm to encrypt or decrypt information. Basic Terminology Cryptosystem: The algorithms, or ciphers, used to encrypt and decrypt data Cryptosystem = encryption + decryption algorithms. Key: info used in cipher known only to sender/receiver Cryptology Cryptography: is the Science of Writing in Secret Code Cryptanalysis: science of studying attacks against cryptographic systems Cryptology = Cryptography + Cryptanalysis CRYPTOLOGY CRYPTOGRAPHY CRYPTANALYSIS Cryptography Cryptographic systems are characterized along three independent dimensions Type of encryption operations used Substitution: replacing each element of the plaintext with another element Transposition: rearranging the order of the elements of the plaintext. Product: using multiple stages of substitutions and transpositions Cryptography Number of keys used: Symmetric: single-key, private-key Asymmetric: two-key, public-key way in which the plaintext is processed Block cipher: processes the input one block of elements at a time Stream cipher: processes the input elements continuously Cryptanalysis Objective: to recover the key in use rather than simply to recover the plaintext of a single ciphertext. Two general approaches: Brute-force attack: try every key to decipher the ciphertext Cryptanalysis attack: exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used Cryptanalysis Brute-force attack: On average, half of all possible keys must be tried to achieve success. Cryptology CRYPTOLOGY CRYPTOGRAPHY CRYPTANALYSIS SYMMETRIC ASYMMETRIC CLASSICAL MODERN Substitution Block ciphers Transposition Stream ciphers 2. Symmetric Ciphers A. Classical Encryption B. Modern Encryption SYMMETRIC CIPHER MODEL Plaintext Encryption algorithm Secret key Ciphertext Decryption algorithm Requirements Two requirements for secure use of symmetric encryption: strong encryption algorithm secret key know only to sender/receiver Mathematically have Y=E(K,X) X=D(K,Y) assume encryption algorithm is known implies a secure channel to distribute key A. Classical encryption Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Substitution Techniques Hill Cipher Polyalphabetic Ciphers One-Time Pad A. Classical encryption (Cont.) Transposition Techniques Steganography Substitution Techniques a) Caesar Cipher Invented by Julius Caesar. Each letter is replaced by the letter K positions further down the alphabet. Example: Plaintext: meet me after the toga party Key: k=3 Ciphertext: PHHW PH DIWHU WKH WRJD SDUWB a) Caesar Cipher Mathematically, map letter to numbers: C = E(P, k) = (P + k) mod 26 C: Ciphertext letter P: Plaintext letter P = D(C, k) = (C - k) mod 26 K: Key [1-25] Plaintext = “Go to the canteen after class”, k =4 Ciphertext = ???
Tìm kiếm theo từ khóa liên quan:
Lecture On safety and security of information systems On safety and security of information systems Basic terminology of cryptography History of cryptography Symmetric cipher Bài giảng Bảo mật hệ thống thông tinTài liệu có liên quan:
-
Lecture On safety and security of information systems: Introduction to information systems security
59 trang 63 0 0 -
Bài giảng Bảo mật hệ thống thông tin
137 trang 43 0 0 -
Lecture On safety and security of information systems: Symmetric ciphers
41 trang 39 0 0 -
Lecture On safety and security of information systems: Cryptographic hash funtionns
22 trang 36 0 0 -
Lecture On safety and security of information systems: Malicious attacks
39 trang 35 0 0 -
Lecture On safety and security of information systems: Access control
18 trang 34 0 0 -
Bài giảng Bảo mật hệ thống thông tin: Chương 7 - ĐH Bách khoa TP HCM
70 trang 33 0 0 -
Lecture On safety and security of information systems: Firewall
26 trang 30 0 0 -
Bài giảng Bảo mật hệ thống thông tin: Chương 5 - ĐH Bách khoa TP HCM
66 trang 29 0 0 -
38 trang 27 0 0