Académique Documents
Professionnel Documents
Culture Documents
1. CRYPTOGRAPHY It is an art of creating the ciphers. 2. CRYPTANALYSIS It is an art of braking the ciphers. (hacking)
CIPHERTEXT: It is an unintelligible form of original text(plain text) which is obtained after applying an encryption algorithm to the original text. This encryption algorithm is called a CIPHER
Security requirements
Confidentiality
assure that data can be kept secret method: encryption
Integrity
assure that received message has not been altered method: digital signature
Authentication
about verifying identities method: digital certificate
Encryption
Encryption key
This is Plaintext
Encryption
123@8(@0kfl30kfl
Plaintext
Ciphertext
SYMMETRIC CRYPTOGRAPHY: 1. same encryption and decryption key 2. encryption and decryption algorithms are reverse of each other
Decryption
Decryption Key
123@8(@0kfl30kfl
Decryption
This is Plaintext
Ciphertext
Plaintext
ASSYMETRIC CRYTOGRAPHY
Plaintext
Ciphertext
private key
123@8(@0 kfl30kfl
Decryption
This is Plaintext
Ciphertext
Plaintext
DIGITAL SIGNATURE
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery and tampering.
Digital signatures employ a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type.
History:
1. In 1976, Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed. Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm that could be used for primitive digital signatures (Note that this just serves as a proof-ofconcept, and "plain" RSA signatures are not secure.) The first widely marketed software package to offer digital signature was Lotus Notes, released in 1989, which used the RSA algorithm.
2.
3.
File
Message Digest
Digital Signature
Sender
Signed file File Step 1a : Find the message digest of the file Digital Signature
Receiver
Step 1b : Decrypt the digital signature with senders public key Message Digest
Same Accept
Different Reject
INTEGRITY: the sender and receiver of a message may have a need for
confidence that the message has not been altered during transmission. If a message is digitally signed, any change in the message after signature will invalidate the signature.