Unit 2 - Cyrptography
Unit 2 - Cyrptography
Algorithms [LH 4]
Unit 2
Outlines
●
Cryptography
●
Data Encryption standard
●
Symmetric Key Crytography (Block and Stream Ciphers)
●
Asymmetric Key Cryptography
●
Public Key Cryptography (RSA)
●
Message Digest 5
●
Hash Function
●
Message Authentication Code (MAC)
Compiled by: Dinesh Ghemosu 2
Cryptography
● Cryptography, a word with Greek origins, means “secret writing.” and is the art
and science of concealing meaning.
● The Concise Oxford English Dictionary (9th ed.) defines cryptography as “the art
of writing or solving codes." This is historically accurate, but does not capture the
current breadth of the field or its modern scientific foundations. The definition
focuses solely on the codes that have been used for centuries to enable secret
communication.
● But cryptography nowadays encompasses much more than this: it deals with
mechanisms for ensuring integrity, techniques for exchanging secret keys,
protocols for authenticating users, electronic voting, cryptocurrency, and more.
● Modern cryptography involves the study of mathematical techniques for securing
digital information, systems, and distributed computations against adversarial
attacks.
● It involves three distinct mechanisms: symmetric-key encipherment,
asymmetric-key encipherment, and hashing.
Compiled by: Dinesh Ghemosu 3
Cryptography
●
It is the techniques of converting ordinary plain text into
unintelligible text and vice-versa.
●
It is the practice and study of techniques for secure
communication in the presence of third parties.
●
Techniques used for deciphering message without any
knowledge of the enciphering details fall into the area of
cryptanalysis. Cryptanalysis is what the layperson calls
“breaking the code”.
●
The area of cryptography and cryptanalysis together are
called cryptology.
Compiled by: Dinesh Ghemosu 4
Cryptography
● Before message is sent by the sender to the network , the
message the user entered (plain-text) will be encrypted
(converting plain-text to cipher-text) and after receiving the
cipher-text will be decrypted (converting cipher-text to plain-
text) and used by receiver.
● Encryption and decryption algorithms are referred as ciphers.
●
The keys for each round is separate which is just the result of left circular shift
operation of the original key.
●
The round key generator is the component which is responsible to generate 16
sub keys for 16 rounds.
●
The round operation is nothing but the XOR operation between the plain text
and the key.
●
The final key to the cipher text is the resulting key at the end of 16 rounds.
•
Typically, the input is padded
out to an integer multiple of
some fixed length (e.g., 1024
bits), and the padding
includes the value of the
length of the original message
in bits.
•
The length field is a security
measure to increase the
difficulty for an attacker to
produce an alternative
message with the same hash
value.
Figure: Cryptographic Hash Function; h=H(M)
Compiled by: Dinesh Ghemosu 46
Input-output property of Hash function
●
A “good” hash function produces evenly
distributed and apparently random outputs
as a result of applying the function to a large set
of inputs.
●
A change to any bit or bits in the message M most
probably results in a change to the hash code.