Vous êtes sur la page 1sur 20


Ch-1 prepared by: Diwan

Essential Terms
Cryptography Encryption
Plain text Cipher text

Cipher text Plain text

Cryptanalysis Cryptology

Source: http://www.unmuseum.org/enigma.j

Basic Terminologies
Cryptography deals with creating documents that can be shared secretly over public communication channels Cryptographic documents are decrypted with the key associated with encryption, with the knowledge of the encryptor The word cryptography comes from the Greek words: Krypto (secret) and graphein (write) Cryptanalysis deals with finding the encryption key without the knowledge of the encryptor Cryptology deals with cryptography and cryptanalysis Cryptosystems are computer systems used to encrypt data for secure transmission and storage

Basic Terminologies
Keys are rules used in algorithms to convert a document into a secret document Keys are of two types:
Symmetric Asymmetric

A key is symmetric if the same key is used both for encryption and decryption A key is asymmetric if different keys are used for encryption and decryption

Basic Terminologies
Symmetric key methods
DES 56-bit Triple DES 128-bit AES 128-bit and higher Blowfish 128-bit and higher

Asymmetric key methods


Basic Terminologies
Plaintext is text that is in readable form Ciphertext results from plaintext by applying the encryption key Notations:
M message, C ciphertext, D decryption, E(M) = C E(M, k) = C E encryption, k key

Fact: D(C) = M, D(C, k) = M


Cryptographic Methods
Same key for encryption and decryption Key distribution problem

Mathematically related key pairs for encryption and decryption Public and private keys

Cryptographic Methods
Combines strengths of both methods Asymmetric distributes symmetric key
Also known as a session key

Symmetric provides bulk encryption Example:

SSL negotiates a hybrid method

Types of Secret Writing

Secret writing



Basic Terminologies
Steganography is the method of hiding secret messages in an ordinary document Steganography does not use encryption Steganography does not increase file size for hidden messages Example: select the bit patterns in pixel colors to hide the message


Hiding a message within another medium, such as an image No key is required Example
Modify color map of JPEG image


Steganography covered writing is an art of hiding information Popular contemporary steganographic technologies hide New York Times, August 3rd, 2001 information in http://www.nytimes.com/images/2001/10/30/sci ence/sci_STEGO_011030_00.jpg images

Hiding information in pictures

Image in which to hide another image

Image to hide within the other image



Types of Cryptography
Stream-based Ciphers
One at a time, please Mixes plaintext with key stream Good for real-time services

Block Ciphers
Amusement Park Ride Substitution and transposition


Types of Secret Writing

Secret writing

Steganography Substitution

Cryptography Transposition Mon alphabetic


Encryption Systems
Substitution Cipher
Convert one letter to another Cryptoquip Change position of letter in text Word Jumble

Transposition Cipher

Monoalphabetic Cipher Caesar

Polyalphabetic Cipher


Public Key Cryptography

Private (symmetric, secret) key the same key used for encryption/decryption Problem of key distribution Public (asymmetric) key cryptography a public key used for encryption and private key for decryption Key distribution problem solved

Currently Available Crypto Algorithms (private key)

DES (Data Encryption Standard) and derivatives: double DES and triple DES IDEA (International Data Encryption Standard) Blowfish RC5 (Rivest Cipher #5) AES (Advance Encryption Standard)

Currently Available Crypto Algorithms (public key)

RSA (Rivest, Shamir, Adleman) DH (Diffie-Hellman Key Agreement Algorithm)

Hashing Algorithms
Computes 128-bit hash value Widely used for file integrity checking

Computes 160-bit hash value