Intro Cryptography
Intro Cryptography
Cryptanalysis Cryptology
• Techniques used for • The areas of cryptography
deciphering a message and cryptanalysis
without any knowledge of
the enciphering details
Cryptographic Systems
• Characterized along three independent dimensions:
Transposition
Asymmetric, two-
key, or public-key Stream cipher
Product encryption
Encryption Scheme Security
• Unconditionally secure
• No matter how much time an opponent has, it is
impossible for him or her to decrypt the
ciphertext simply because the required
information is not there
• Computationally secure
• The cost of breaking the cipher exceeds the
value of the encrypted information
• The time required to break the cipher exceeds
the useful lifetime of the information
Substitution Technique
1. HELLO → KHOOR
2. CLASS → FODVV
3. SECRET → VHFUHW
1. WORLD → BTLWI
2. CIPHER → HNUMJW
3. SECURITY → XJHWZNXZD
Part 2: Decoding Messages
Task 3: Decode the following messages with a shift of 4
backward
1. XLIEX
2. GSVVIH
3. WXVSKVI
Task 4: Decode the following messages with a shift of 7
backward
4. MZWWL
5. QVDIKN
6. HXHZN
Part 2: Decoding Messages
Task 3: Decode the following messages with a shift of 4
backward
1. XLIEX → TEBAS
2. GSVVIH → CRRRDE
3. WXVSKVI → STMPTOA
Brute-Force
Cryptanalysis
of
Caesar Cipher
(This chart can be found on page 75 in the
textbook)
Monoalphabetic Cipher
• Permutation
• Of a finite set of elements S is an ordered sequence of
all the elements of S , with each element appearing
exactly once