IAS - Chapter 2 Half
IAS - Chapter 2 Half
IAS - Chapter 2 Half
Cryptography
Information Assurance and Security 2015 E.C
Basic Terminology
•Plaintext - original message , Unencrypted data
•Cipher text -coded message , encrypted data
•Cipher - an algorithm that can perform encryption or decryption.
-an algorithm for transforming plaintext to cipher text.
•Key – information used in cipher known only to sender/receiver
-is the essential piece of information that determines the output of a cipher.
encipher (encrypt) - converting plaintext to cipher text, the translation of data into a
secret code.
Basic Terminology
•Decrypt - recovering cipher text from plaintext (decipher)
-Converting cipher text into plan text.
•Cryptanalysis -the study of principles/ methods of deciphering
cipher text without knowing key.
-It is known as code breaking.
•. Cryptography –is the study of secret writing. Crypto means secret and graphy
means writing.
- Study of encryption and decryption principles/methods
•Cryptology - field of both cryptography and cryptanalysis
Cryptography
•Security depends on the secrecy of the key, NOT the secrecy of the algorithm.
Given
• P=Plaintext
• C=Ciphertext
• k=key shared by sender and receiver
C = EK (P) Encryption
P = DK (C) Decryption
Symmetric Encryption Model
Asymmetric Encryption
•Uses two keys, a "private" key and a "public key,“ to perform encryption and decryption.
•Public-key, known by anybody, and can be used to encrypt messages, and verify
signatures.
•Private-key, known only to the recipient, used to decrypt messages, and sign (create)
signatures.
•Use of two keys has consequences in the areas of confidentiality, key distribution, and
authentication.
Public-Key Cryptography Principles
Computationally Secure
Transposition cipher
Substitution
•If the symbols in the plaintext are alphabetic characters, we replace one character
with another. For example, we can replace character A with D, and character T
with Z. If the symbols are digits (0 to 9), we can replace 3 with 7, and 2 with 6.
•For example, if the algorithm says that character A in the plaintext is changed
to character D, every character A is changed to character D.
•The relationship between characters in the plaintext and the cipher text is a
one-to-one relationship.
Cont.…
Plaintext : HELLO
Ciphertext : KHOOR
Solution: The cipher is monoalphabetic because both occurrences of L's are
encrypted as O's.
•Each letter in the plaintext is replaced by a letter fixed positions later in the alphabet.
Additive Cipher…
• C = E(3, p) = (p + 3) mod 26
A shift may be of any amount, so that the general Caesar encryption algorithm is
C = E(k, p) = (p + k) mod 26, where the key k takes on a value in the range 1 to
25.
Example: Use the additive cipher with key =15 to encrypt the message “Hello”.
Soln. : We apply the encryption algorithm to the plaintext character by character
By using the reverse decrypt algorithm, we can now decrypt the cyphertext
“WTAAD”.
The reason is that the encryption algorithm can be interpreted as “shift key
character down” and the decryption algorithm can be interpreted as “shift key
character up” .
For this reason, this cipher is also sometimes called as caesar cipher.
Polyalphabetic cipher
• For example, character A could be changed to D in the beginning of the text, but
it could be changed to N at the middle.
•Example :
Plaintext : MEET
Ciphertext : RING