Ch2 Cryptographic Tools
Ch2 Cryptographic Tools
Cryptographic Tools
2
Cryptographic Tools
Symmetric Encryption
4
• Cryptanalysis
rely on nature of the algorithm
plus some knowledge of plaintext
characteristics
even some sample plaintext-ciphertext pairs
exploits characteristics of algorithm to
deduce specific plaintext or key
• Brute-force attack
try all possible keys on some ciphertext until
get an intelligible translation into plaintext
5
Block
Verses
Stream
Ciphers
10
Message Authentication
Hash Functions
Random Numbers
Summary