Cryptography-PART-1
Cryptography-PART-1
Course outcome
⚫ Symmetric-Key Cryptography
– Stream ciphers, Block ciphers, Encryption algorithms(DES,
AES) Message Authentication codes
⚫ Asymmetric-Key Cryptography
– Number Theory, RSA encryption, Diffe hellman key
exchange, ElGamal encryption algorithm, Digital Signatures
Text Book:
⚫ Introduction to Modern Cryptography by Jonathan
Katz and Yehuda Lindell
⚫ Cryptography: Theory and Practices by Douglas
Stinson
⚫ Cryptography and Network Security: Principles and
Practice, Seventh Edition, William Stallings, 2017,
Pearson, ISBN 10:1-292-15858-1
Basic notions in our course
⚫ Block or stream
⚫ Text ciphers
⚫ Text ⚫ Secret-key ⚫ Passive and active
⚫ Services Cryptosystems adversary
Confidentiality ⚫ Public-key ⚫ Crypt analysis
Integrity Cryptosystems ⚫ Certificates
Authentication ⚫ Private Key ⚫ Message
⚫ Public Key Authentication
code
⚫ Cipher text
⚫ Hash functions
⚫ Plain Text
Number Theory
Why do we need cryptography
⚫ e-mail
⚫ e-commerce
⚫ Secure card transaction
Cryptography
In Practice
we use both
(symmetric and
Asymmetric)
Confidentiality:
– Assures that private or confidential information is not made
available or disclosed to unauthorized individuals.
⚫ A breach of confidentiality means that someone gains
access to information who should not have access to it
⚫ In the context of network security, only the sender and
intended receiver should “understand” message
contents
Contd…
Services Mechanism
⚫ Eavesdropping attacks
⚫ Man-in-the-middle (MITM) attacks
⚫ Denial of Service (DoS) attacks
Contd…
Eavesdropping Attacks
⚫ Cryptanalytic attacks:
– Rely on the nature of the algorithm, general characteristics of
the plaintext, and some sample plaintext–ciphertext pairs.
– Goal: to attempt to deduce a specific plaintext or to deduce
the key being used
⚫ Brute-force attack:
– Tries every possible key on a piece of ciphertext until an
intelligible translation into plaintext is obtained
cryptanalytic attacks
⚫ Shift Cyphers
⚫ Mono-alphabetic Cyphers
⚫ Poly-alphabetic substitution
Shift (Caesar) Ciphers
⚫ Lesson is
– enormously large key space, so that it becomes impractical
for that adversary to do a brute force kind of attack
⚫ Idea is
– Map each plain character to an arbitrary cipher text character
in one to one
⚫ So there are candidates of 26! or
Cryptanalysis on Monoalphabetic
Ciphers
⚫ Frequency Analysis:
– Exploit the redundancy present in the underlying natural
language
–
The character E occurs
more frequently
compared to any other
character
Ciphertext: “VPXZGIAXIVWPUBTTMJPWIZITWZT
Summary of historical Ciphers
⚫ Modern Cryptography
– Strong scientific foundation and principles
⚫ Principle 1:
– is formal security definitions
⚫ Principles 2:
– Precisely stating any (unproven) assumption used in the
construction
⚫ Principles 3:
– Rigorous proof of security