Lesson 3 Basic Cryptography
Lesson 3 Basic Cryptography
Cryptography
Carmelyn M. Villamor
CCE Faculty
Learning Objectives
Historical Background
Cryptography
Symmetric/ Asymmetric Crypto Primitives
Modes of Operation
Hash Function
Cryptographer
Cryptologist
Cryptanalyst
A B
Intruder
Communications security
Integrity Non-repudation
Authenticity
Marvin is a rival
Ex. Cryptoquip
Transposition
Cipher
Change in position of letter in text
Ex. Caesar
Ex. Vigenere
? ?
Principles of Information Security, Fourth Edition
? 26
Attributes of Strong
Encryption
Confusion
Change key values each round
Performed through substitution
Complicates plaintext/key relationship
Diffusion
Change location of plaintext in ciphertext
Done through transposition
Inner: ciphertext
Outer: plaintext