0% found this document useful (0 votes)
58 views13 pages

Intro To Crypto Graphy

This document provides an overview and introduction to a lecture on cryptography. It discusses the goals of cryptography as providing confidentiality, integrity and availability of data. It introduces how encryption works to provide secure communication between two parties, and how message authentication codes and digital signatures can provide authentication and integrity. It also outlines some common attacks against cryptosystems, such as ciphertext-only, known-plaintext and chosen-plaintext attacks.

Uploaded by

samuelchimwendo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views13 pages

Intro To Crypto Graphy

This document provides an overview and introduction to a lecture on cryptography. It discusses the goals of cryptography as providing confidentiality, integrity and availability of data. It introduces how encryption works to provide secure communication between two parties, and how message authentication codes and digital signatures can provide authentication and integrity. It also outlines some common attacks against cryptosystems, such as ciphertext-only, known-plaintext and chosen-plaintext attacks.

Uploaded by

samuelchimwendo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Introduction to Cryptography

Lecture 1 - Introduction

NET 311 September 23, 2019 1 / 13


Overview

1 Administrivia

2 Course Overview

3 Lecture 1 - Introduction
Use of Cryptography
Attacks on Cryptosystems

NET 311 September 23, 2019 2 / 13


Administrivia

Course details

1 Four hours a week (sometimes 1 hour for tutorials)


2 Continuous assessment - 40% & 60% End Of Semester exams
3 3 tests, 2 assignments
4 1 hour of office time (schedule to be communicated)
5 assignments to be written in Latex
6 programming assignments can be written in Java, Python or C++

NET 311 September 23, 2019 3 / 13


Course Overview

Course Overview

1 Lesson 1 - Introduction & classical cryptography


2 Lesson 2 - Stream ciphers
3 Lesson 3 - Block ciphers
4 Lesson 4 - Message Authentication Codes & Hash functions
5 Lesson 5 - Key negotiation
6 Lesson 6 - Public-Key Encryption Algorithms
7 Lesson 7 - Key management

NET 311 September 23, 2019 4 / 13


Lecture 1 - Introduction

What is Cryptography about?

Goal of Cryptography
The original goal is encryption.

Goals of Security
1 Confidentiality - prevent sensitive information from reaching wrong
person
2 Integrity - prevent message from being tampered with in transit
3 Availability - make sure authorized users have access to data on
demand

How secure communication achieved?


1 Secure key establishment

2 Secure communication

NET 311 September 23, 2019 5 / 13


Lecture 1 - Introduction Use of Cryptography

Secure communication - Encryption

Secure communication - Problem


Alice and Bob want to communicate with each other
The communication channel is not secure
How to prevent Eve from listening on the channel?

NET 311 September 23, 2019 6 / 13


Lecture 1 - Introduction Use of Cryptography

Secure communication - Encryption

Secure communication - Solution


m is called the plaintext
c is called the ciphertext
E (Ke , m) is the encryption function
D(Ke , c) is the decryption function

NET 311 September 23, 2019 7 / 13


Lecture 1 - Introduction Use of Cryptography

Authentication

Authentication - Problem
Alice and Bob have another problem
Suppose Eve can do more than eavesdrop (delete, alter, delay the
message, alter the order)
How can Bob know that the message came from Alice?

NET 311 September 23, 2019 8 / 13


Lecture 1 - Introduction Use of Cryptography

Authentication

Authentication - Solution
Alice computes a Message Authentication Code (MAC) - a
Ka is the authentication key and h the MAC function
When Bob receives the message, he recomputes the MAC to see if it
matches
What attacks can Eve still do?

NET 311 September 23, 2019 9 / 13


Lecture 1 - Introduction Use of Cryptography

Digital Signatures

Uses of Digital Signatures


Public-key equivalent of MACs
Alice generates some key pair (SAlice , PAlice ) and publishes her public
keyPAlice
When Bob receives the message, he checks the signature using Alice’s
public key
What attacks can Eve still do?

NET 311 September 23, 2019 10 / 13


Lecture 1 - Introduction Use of Cryptography

Other Uses of Cryptography

Anonymous communication
Anonymous digital currency

NET 311 September 23, 2019 11 / 13


Lecture 1 - Introduction Attacks on Cryptosystems

Attacks against encryption schemes

Some common attacks include:


1 Ciphertext-Only Model

encryption broken only using ciphertext


most difficult attack
2 Known-Plaintext Model
know both plaintext and ciphertext
goal : find the decryption key
have to find the plaintext in some way
more powerful attack than ciphertext only
3 Chosen-Plaintext Model
4 Chosen-Ciphertext Model
5 Distinguishing Goal Attack

NET 311 September 23, 2019 12 / 13


Lecture 1 - Introduction Attacks on Cryptosystems

Questions?
Next we look at Classical Cryptographical algorithms.

NET 311 September 23, 2019 13 / 13

You might also like