Lecture 8
Lecture 8
Cryptology
From Greek κρυπτός, "hidden, secret";
Deals with
Cryptography Cryptoanalysis
from Greek κρυπτός, "hidden, secret";
• Cryptanalysis is the term used for the study of methods for obtaining the
meaning of encrypted information without access to the key that
normally required to do so; or it is the study of how to crack encryption
algorithms or their implementations.
Wax seal
signature
…………..
Why Have Cryptography
If the confidentiality or accuracy of your information is of any value at all, it
should be protected to an appropriate level.
If the unauthorized disclosure or alteration of the information could result in
any negative impact, it should be secured.
These are simple and widely accepted facts. However, the means to achieve the
requisite protection are usually far from obvious.
Caesar's Alphabet
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Substitution Ciphers
Substitution ciphers are the most simple, because they switch one letter for
another, throughout the length of a message. They are easily broken by analyzing the
frequency of letters in the ciphertext and applying the most commonly-used letters in
the appropriate places.
Modern Cryptography Systems
Reciprocal Ciphers
Reciprocal ciphers encompass more cryptography systems, and can make a
system either less secure or more usable. A reciprocal cipher means, just as one
enters the cleartext into the cryptography system to get the ciphertext, one could
enter the ciphertext into the same place in the system to get the clear text. Using
a reciprocal substitution is a form of cryptographic suicide - it makes the cipher
half as difficult to break. However, if Enigma weren't reciprocal, it would have
been significantly more difficult to implement.
Symmetric Ciphers
For a long time, symmetric ciphers were the only form of cryptography available. A
symmetric cipher uses the same key for encryption and decryption. Generally,
symmetric ciphers are no less secure than asymmetric ciphers, since, in most modern
cryptography systems, securing the key is more important than securing the
cryptography system itself.
• Symmetric key ciphers are implemented as either block
ciphers or stream ciphers. A block cipher enciphers input in
blocks of plaintext as opposed to individual characters, the
input form used by a stream cipher.
• The Data Encryption Standard (DES) and the Advanced
Encryption Standard (AES) are block cipher designs which
have been designated cryptography standards by the US
government (though DES's designation was finally
withdrawn after the AES was adopted). Despite its
deprecation as an official standard, DES (especially its still-
approved and much more secure triple-DES variant) remains
quite popular; it is used across a wide range of applications,
from ATM encryption to e-mail privacy and secure remote
access. Many other block ciphers have been designed and
released, with considerable variation in quality.
Stream ciphers, in contrast to the 'block' type,
create an arbitrarily long stream of key
material, which is combined with the plaintext
bit-by-bit or character-by-character.
In a stream cipher, the output stream is created
based on a hidden internal state which
changes as the cipher operates. That internal
state is initially set up using the secret key
material. RCA is a widely used stream cipher.
Cryptographic hash function are a third type of
cryptographic algorithm. They take a message
of any length as input, and output a short,
fixed length hash (which can be used in for
example a digital signature). For good hash
functions, an attacker cannot find two
messages that produce the same hash.
• Symmetric-key cryptosystems use the same key for
encryption and decryption of a message, though a
message or group of messages may have a different
key than others.
• A significant disadvantage of symmetric ciphers is
the key management necessary to use them
securely. Each distinct pair of communicating parties
must, ideally, share a different key, and perhaps
each ciphertext exchanged as well. The number of
keys required increases as the square of the
number of network members, which very quickly
requires complex key management schemes to keep
them all straight and secret.
Modern Cryptography Systems
Asymmetric Ciphers
In 1976 the notion of public-key (also, more generally, called asymmetric
key) cryptography was proposed in which two different but mathematically
related keys are used—a public key and a private key.
The Keys
The public and private keys have a very special property - they are
complementary to each other. In order to reverse the effects of one key, the other
must be applied to the ciphertext.
Signing a message
Suppose that isn't enough. Suppose Alice wants Bob to be absolutely sure that the
message was sent by her. Merely writing 'Love, Alice' at the bottom of the message
isn't good enough - anyone could write that. How will she guarantee that Bob will
know that she wrote it? By applying her own private key to the message. Anyone
that has her public key will be able to verify that Alice wrote the message. Now, Bob
can rest assured that Alice wrote the message, because it's been encrypted with her
private key. He also knows that only he can read the message, because it's also been
encrypted with his own public key.
Cryptographic Algorithms
There are of course a wide range of cryptographic algorithms in use. The following
are amongst the most well known:
HASH
A 'hash algorithm' is used for computing a condensed representation of a fixed length
message/file. This is sometimes known as a 'message digest', or a 'fingerprint'..
MD5
MD5 is a hashing algorithm that takes a message of up to 264 bits and reduces it to a digest of 128
bits (16 bytes).
The algorithm is a development of the MD4 algorithm invented by Ronald Rivest and announced
in 1990. Unfortunately, MD4 was flawed, so Rivest made some revisions, and the resulting
algorithm was christened MD5.
Any hashing (or digest) algorithm should be such that, given a digest and the corresponding
message from which it was derived, it should be computationally infeasible to construct a different
message with the same digest.
AES
This is the Advanced Encryption Standard (using the Rijndael block cipher) approved by NIST.