Classical Cryptography
Classical Cryptography
Classical cryptography
Much of the material below is based on Chapter 1 of Cryptography: theory and
practice by Douglas R. Stinson.
These days the channel might be a telephone line, or a computer network. However
cryptography has a long history. In the past the channel may have been a published
book or a newspaper article (and the `opponent' would have been an ordinary
reader), or the channel may have been a soldier carrying a concealed message with
the opponent being the enemy army. Examples can be found in any introduction to
cryptography, for example in the Code Book (see recommended reading), or in
We call Alice's message plaintext. Let's say her message is x. Alice encrypts
the message by applying one of a set of rules. The rule e K used depends on her
choice of a secret key K. The encrypted message y=eK(x), which we call
ciphertext, is sent over the insecure channel to Bob. Separately, by a secure
channel Alice sends Bob her secret key K, which he will need to decipher Alice's
message. When Bob receives the encrypted message y he decrypts the message
by applying the decryption rule dK corresponding to the key K and retrieves Alice's
plain text message x=dK(y). Meanwhile the opponent Oscar has intercepted the
ciphertext y, but (ideally) without knowledge of the key K he is unable to
understand it.