PU Is Security - 5. Net Security Cryptography R
PU Is Security - 5. Net Security Cryptography R
Crypto+Graphy
• Crypto = “Secret” and Graphy = “Writing”
• Cryptography means secret writing
10/21/2 4
017
• Number of keys used
• Hash functions: no key
• Secret key cryptography: one key
• Public key cryptography: two keys - public, private
• Type of encryption operations used
• substitution / transposition / product
• Way in which plaintext is processed
• block / stream
• The way in which the plaintext is processed (block cipher
processes the input one block of elements at a time, producing an
output block for each input block. Stream Cipher processes the
input elements continuously, producing output one element at a
time, as it goes along
The enemy is an
outsider listening to
traffic
10/21/2 8
017
A B
intruder
10/21/2 9
017
10/21/2 1
017 0
A B
TTP
10/21/2 1
017 1
A B
LEA
10/21/2 1
017 2
• plaintext - the original message
• ciphertext - the coded message
• cipher - algorithm for transforming plaintext to ciphertext
• key - info used in cipher known only to sender/receiver
• encipher (encrypt) - converting plaintext to ciphertext
• decipher (decrypt) - reconverting ciphertext from plaintext
• cryptography - study of encryption principles/methods
• cryptanalysis (codebreaking) - the study of principles/
methods of deciphering ciphertext without knowing key
• cryptology - the field of both cryptography and
cryptanalysis
• Encryption: plaintext (clear text) x is converted into a ciphertext under
the control of a key K.
• We write eK(x).
• Decryption with key K computes the plaintext from the ciphertext y.
• We write dK(y).
• Symmetric ciphers: the decryption key is essentially the same as the
encryption key.
• Asymmetric ciphers: it is computationally infeasible to derive the
private decryption key from the corresponding public encryption
key.
10/21/2 1
017 4
10/21/2 1
017 5
Symmetric cipher model consists of five
elements:
1. Plain Text
2. Encryption algorithm
3. Secret key
4. Cipher text
5. Decryption algorithm
1. Plaintext is the original message or data that is fed into the
algorithm as input.
2. Encryption algorithm perfonns various substitutions and
transformations on the plaintext.
3. Secret key is a value independent of the plaintext and of
the algorithm. The exact substitutions and transfomiations
perfomied by the algorithm depend on the key.
4. Ciphertext is the unreadable message produced as output.
It depends on the plain text and secret key.
5. Decryption algorithm takes the cipher text and the secret
key and produces the original plain text.
Same key is used for encryption and decryption
process. So, it is called symmetric cipher.
CipherText: RIR_ESE_T_GNE_E_
As per above rule, column length is : 4
2. Then, write the cipher text in columns again, then
re-order the columns by refonning the keyword.
Read matrix row wise to get plain text.
Example,