3 Cryptography Classical encryption
3 Cryptography Classical encryption
Security
Cryptography basics, Classical
Encryption Techniques
By
Dr. Mudassar Raza
Professor
Department of Computer Science
Namal University Mianwali https://techgirls.ece.vt.edu/slides/introduction_to_cybersecurity.html#39
CS 555 Topic 1 5
By: Dr. Mudassar Raza
Goals of Cryptography
• The most fundamental problem cryptography
addresses: ensure security of communication over
insecure medium
• What does secure communication mean?
• confidentiality (privacy, secrecy)
• only the intended recipient can see the communication
• integrity (authenticity)
• the communication is generated by the alleged sender
• What does insecure medium mean?
• Two possibilities:
• Passive attacker: the adversary can eavesdrop
• Active attacker: the adversary has full control over the
communication channel
CS 555 Topic 1 6
By: Dr. Mudassar Raza
Approaches to Secure Communication
• Steganography
• “covered writing”
• hides the existence of a message
• depends on secrecy of method
• Cryptography
• “hidden writing”
• hide the meaning of a message
• depends on secrecy of a short key, not method
CS 555 Topic 1 7
By: Dr. Mudassar Raza
Terms: Cryptography,
cryptanalysis, and cryptology
• Cryptography,
• Traditionally, designing algorithms/protocols
• Nowadays, often synonym with cryptology
• Cryptanalysis
• Breaking algorithms/protocols
CS 555 Topic 1 8
By: Dr. Mudassar Raza
History of Cryptography
• 2500+ years
• An ongoing battle between codemakers and
codebreakers
• Driven by communication & computation technology
• paper and ink (until end of 19th century)
• cryptographic engine & telegram, radio
• Enigma machine, Purple machine used in WWII
• computers & digital communication
CS 555 Topic 1 9
By: Dr. Mudassar Raza
Major Events in History of
Cryptography
• Mono-alphabetical ciphers (Before 1000 AD)
• Frequency analysis (Before 1000 AD)
• Cipher machines (early 1900’s)
• Shannon developed theory of perfect secrecy and information theoretical
security (around 1950)
• US adopts Data Encryption Standard in 1977
• Notion of public key cryptography and digital signatures introduced
(1970~1976)
• The study of cryptography becomes mainstream in the research community
(1976)
• Development of computational security and other theoretical foundation of
modern cryptography (1980’s)
CS 555 Topic 1 10
By: Dr. Mudassar Raza
Classical Encryption
Techniques
• Symmetric encryption
• Secret key encryption
• Shared key encryption
• Substitution ciphers
• Permutation (or transposition) ciphers
• Product ciphers