Académique Documents
Professionnel Documents
Culture Documents
TechKnowXpress Cryptography 2
There are three eras in the history of Cryptography:
The Manual era
The Mechanical era
The Modern era
TechKnowXpress Cryptography
Cryptosystem The combination of algorithm, key,
and key management functions used to perform
cryptographic operations.
TechKnowXpress Cryptography 5
Key Sequence that controls the
operation and behavior of the
cryptographic algorithm.
TechKnowXpress Cryptography 6
Authentication
ensures that whoever supplies or
accesses sensitive data is an authorized
party.
Confidentiality
assures that only authorized parties are
able to understand the data.
TechKnowXpress Cryptography
Integrity
ensures that when a message is sent over a
network, the message that arrives is the
same as the message that was originally
sent.
Nonrepudiation
ensuring that the intended recipient actually
received the message & ensuring that the
sender actually sent the message.
TechKnowXpress Cryptography
Brute force
Trying all key values in the keyspace.
Chosen Ciphertext
Decrypt known ciphertext to discover key.
Dictionary Attack
Find plaintext based on common words.
Frequency Analysis
Guess values based on frequency of
occurrence.
TechKnowXpress Cryptography 9
Factoring Attacks
Find keys through prime factorization.
Replay Attack
Repeating previous known values.
TechKnowXpress Cryptography
Chosen plaintext attacks
The cryptanalyst introduces the plaintext into
the system and then watches for how that
plaintext will be encrypted.
TechKnowXpress Cryptography
Known plaintext attack
The attacker has both the ciphertext and the
plaintext.
TechKnowXpress Cryptography
Differential Power Analysis
This is an attack on smart cards.
TechKnowXpress Cryptography
There are several size of
encryption keys:
64 bit encryption
128 bit encryption
256 bit encryption
512 bit encryption
1024 bit encryption
TechKnowXpress Cryptography
Symmetric
o Even if an attacker captures the data, the attacker will not be
able to manipulate it in any meaningful way.
o Symmetric algorithms use a single key shared by two
communicating parties.
o The same key is used for both encryption and decryption.
Asymmetric
o Mathematically related key pairs for encryption and
decryption.
o Public and private keys.
Hybrid
o Combines strengths of both methods.
Asymmetric distributes symmetric key.
o TechKnowXpress Cryptography 15
Asymmetric Cryptography
Symmetric Cryptography
TechKnowXpress Cryptography
Types of Symmetric Cryptography:
Stream-based Ciphers
Mixes plaintext with key stream.
Good for real-time services.
Block Ciphers
Substitution and transposition.
E.g.: DES, AES.
TechKnowXpress Cryptography
Public Key Cryptography
TechKnowXpress Cryptography
TechKnowXpress Cryptography
Quantum cryptography describes the use
of quantum mechanical effects (in
particular quantum communication
and quantum computation) to
perform cryptographic tasks or to break
cryptographic systems.
TechKnowXpress Cryptography
The advantage of quantum cryptography is
that it allows the completion of various
cryptographic tasks that are proven or
conjectured to be impossible using only
classical communication.
TechKnowXpress Cryptography
Digital signatures can be
permanently tied to the content of
the message being signed. They
cannot then be 'moved' from one
document to another, for any
attempt will be detectable.
TechKnowXpress Cryptography
In digital signature schemes, there are two
algorithms: one for signing, in which a secret
key is used to process the message and one for
verification, in which the matching public key is
used with the message to check the validity of
the signature.
TechKnowXpress Cryptography
Traditionally, a watermark has been
used to verify the authenticity of a
document.
TechKnowXpress Cryptography
Drivers Licenses, diplomas, official
letterhead were the primary
applications of watermarks . More
recently, used to track or prevent
redistribution of TV logos.
TechKnowXpress Cryptography
Purpose of using:
Ensure authenticity of digital goods.
Prevent unauthorized use/ensures
copyright.
Prevent copying.
TechKnowXpress Cryptography
DRM is the practice of imposing
technological restrictions that control
what users can do with digital media.
TechKnowXpress Cryptography
TechKnowXpress Cryptography