Introduction to Cryptography
Lecture 1 - Introduction
NET 311 September 23, 2019 1 / 13
Overview
1 Administrivia
2 Course Overview
3 Lecture 1 - Introduction
Use of Cryptography
Attacks on Cryptosystems
NET 311 September 23, 2019 2 / 13
Administrivia
Course details
1 Four hours a week (sometimes 1 hour for tutorials)
2 Continuous assessment - 40% & 60% End Of Semester exams
3 3 tests, 2 assignments
4 1 hour of office time (schedule to be communicated)
5 assignments to be written in Latex
6 programming assignments can be written in Java, Python or C++
NET 311 September 23, 2019 3 / 13
Course Overview
Course Overview
1 Lesson 1 - Introduction & classical cryptography
2 Lesson 2 - Stream ciphers
3 Lesson 3 - Block ciphers
4 Lesson 4 - Message Authentication Codes & Hash functions
5 Lesson 5 - Key negotiation
6 Lesson 6 - Public-Key Encryption Algorithms
7 Lesson 7 - Key management
NET 311 September 23, 2019 4 / 13
Lecture 1 - Introduction
What is Cryptography about?
Goal of Cryptography
The original goal is encryption.
Goals of Security
1 Confidentiality - prevent sensitive information from reaching wrong
person
2 Integrity - prevent message from being tampered with in transit
3 Availability - make sure authorized users have access to data on
demand
How secure communication achieved?
1 Secure key establishment
2 Secure communication
NET 311 September 23, 2019 5 / 13
Lecture 1 - Introduction Use of Cryptography
Secure communication - Encryption
Secure communication - Problem
Alice and Bob want to communicate with each other
The communication channel is not secure
How to prevent Eve from listening on the channel?
NET 311 September 23, 2019 6 / 13
Lecture 1 - Introduction Use of Cryptography
Secure communication - Encryption
Secure communication - Solution
m is called the plaintext
c is called the ciphertext
E (Ke , m) is the encryption function
D(Ke , c) is the decryption function
NET 311 September 23, 2019 7 / 13
Lecture 1 - Introduction Use of Cryptography
Authentication
Authentication - Problem
Alice and Bob have another problem
Suppose Eve can do more than eavesdrop (delete, alter, delay the
message, alter the order)
How can Bob know that the message came from Alice?
NET 311 September 23, 2019 8 / 13
Lecture 1 - Introduction Use of Cryptography
Authentication
Authentication - Solution
Alice computes a Message Authentication Code (MAC) - a
Ka is the authentication key and h the MAC function
When Bob receives the message, he recomputes the MAC to see if it
matches
What attacks can Eve still do?
NET 311 September 23, 2019 9 / 13
Lecture 1 - Introduction Use of Cryptography
Digital Signatures
Uses of Digital Signatures
Public-key equivalent of MACs
Alice generates some key pair (SAlice , PAlice ) and publishes her public
keyPAlice
When Bob receives the message, he checks the signature using Alice’s
public key
What attacks can Eve still do?
NET 311 September 23, 2019 10 / 13
Lecture 1 - Introduction Use of Cryptography
Other Uses of Cryptography
Anonymous communication
Anonymous digital currency
NET 311 September 23, 2019 11 / 13
Lecture 1 - Introduction Attacks on Cryptosystems
Attacks against encryption schemes
Some common attacks include:
1 Ciphertext-Only Model
encryption broken only using ciphertext
most difficult attack
2 Known-Plaintext Model
know both plaintext and ciphertext
goal : find the decryption key
have to find the plaintext in some way
more powerful attack than ciphertext only
3 Chosen-Plaintext Model
4 Chosen-Ciphertext Model
5 Distinguishing Goal Attack
NET 311 September 23, 2019 12 / 13
Lecture 1 - Introduction Attacks on Cryptosystems
Questions?
Next we look at Classical Cryptographical algorithms.
NET 311 September 23, 2019 13 / 13