Information Security - Chapter 2
Information Security - Chapter 2
Chapter 2
KEU, Computer Science Faculty
IT Department
Encryption
The two primary types of algorithms are private key and public key
algorithms. Also known Symmetric and Asymmetric algorithm.
Private key (Symmetric)
Private key algorithms are easier to set up for a small number of
users.
All of the secrecy from private key algorithms comes from
keeping the key secure. The key, if exposed, will allow any
person who has the key to decrypt the message.
Private key cryptography is also known as symmetric
cryptography because whatever process is done to encrypt the
message, the reverse process is done to decrypt the message.
2
Encryption
Public Key (Asymmetric)
In public key cryptography, there are two keys that are related.
Public key cryptography is also known as asymmetric cryptography
because the process done to encrypt the message is not done in
reverse to decrypt the message
The two keys in public key cryptography are known as the private
key and the public key.
These keys are related, that anything encrypted with the public
key can be decrypted with the private key, and anything encrypted
with the private key can be decrypted with the public key.
The security in public key cryptography is in keeping the private
key secure. The public key is called the public key because anyone
can have access to it.
3
Encryption
The private key in public key cryptography acts as a trap دام تله door
that decrypts a message encrypted with the public key.
There can be many components to implement public key
cryptography. The technical structures necessary to implement public
key cryptography are collectively known as public key
infrastructure (PKI).
With PKI, public keys are published as certificates on a certificate
authority. PKI may have all of the following components:
Certification Authority (CA)
Registration Authority (RA)
Certificate Repository منبع
Certificate Revocation List لست لغو و ابطال گواهی
4
Symmetric Encryption
7
8
Symmetric Cipher Model
Some Basic Terminology
plaintext - original message
ciphertext - coded message
cipher - algorithm for transforming plaintext to ciphertext
key - info used in cipher known only to sender/receiver
encipher (encrypt) - converting plaintext to ciphertext
decipher (decrypt) - recovering ciphertext from plaintext
cryptography - study of encryption principles/methods
cryptanalysis (codebreaking) - study of principles/ methods
of deciphering ciphertext without knowing key
cryptology - field of both cryptography and cryptanalysis
Requirements
two requirements for secure use of symmetric encryption:
a strong encryption algorithm
a secret key known only to sender / receiver
mathematically have:
Y = E(K, X)
X = D(K, Y)
assume encryption algorithm is known
implies a secure channel to distribute key
Cryptography
Unconditional security
no matter how much computer power or time is available, the
cipher cannot be broken since the ciphertext provides
insufficient information to uniquely determine the
corresponding plaintext
Computational security
given limited computing resources (eg time needed for
calculations is greater than age of universe), the cipher cannot
be broken
Brute Force Search
همیشه ممکن است به سادگی هر کلید را امتحان کنید
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
Classical Substitution Ciphers
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher Security
24