Introduction To Cryptography
Introduction To Cryptography
CRY1PTOGRAPHY
Objectives
Cryptography
• Comes from Greek word meaning “secret writing”
• It refers to the science of transforming information into a
secure form while it is being transmitted or stored so that
unauthorized users cannot access it [3].
What is Cryptography? (cont.)
Intruder
?
“ajhsfrjimnfuplkmzwvtbkl
giofqwgpklotfgyklooyrf”
Alice Bob
Steganography [1, 3]
• Hides the existence of the data
• What appears to be a harmless image can contain hidden
data embedded within the image
• Can use image files, audio files, or even video files to
contain hidden information
Steganography (cont.)
Reference [3]
Cryptography vs Steganography
Cryptography [1]
• “Hidden writing”
• Hides the meaning of a message
Steganography [1]
• “Covered writing”
• Hides the existence of a message
Security Attack
any action that compromises the security of
information owned by an organization
information security is about how to prevent
attacks, or failing that, to detect attacks on
information-based systems
often threat & attack used to mean same thing
have a wide range of attacks
can focus of generic types of attacks
passive
active
Passive Attacks
Passive Attack - Interception
Passive Attack: Traffic Analysis
Fabricate message
Active Attack: Replay
Active Attack: Modification
Modify message
Handling Attacks
Passive attacks – focus on Prevention
• Easy to stop
• Hard to detect
Active attacks – focus on Detection and
Recovery
• Hard to stop
• Easy to detect
Goals of Cryptography
Goal Descrip-on
Reference [2]
Cryptography Terminology
Reference [2]
Symmetric-key Cryptography
Reference [2]
Symmetric-key Cryptography (cont.)
Reference [2]
Asymmetric-key Cryptography
Reference [2]
Aymmetric-key Cryptography (cont.)
Reference [2]
Comparison Symmetric/Asymmetric
Cyptography
Reference [2]
Kerckhoff’s Principle
Reference [1]
Cryptanalysis (Cont.)
Ciphertext-Only Attack
Reference [1]
Cryptanalysis (Cont.)
Reference [1]
Cryptanalysis (Cont.)
Known-Plaintext Attack
Reference [1]
Cryptanalysis (Cont.)
Chosen-Plaintext Attack
Reference [1]
Cryptanalysis (Cont.)
Chosen-Ciphertext Attack
Reference [1]
References