Chap 3 Cryptography
Chap 3 Cryptography
CRYPTOGRAPHY
What is Cryptology ?
Cryptography
Cryptography is the science that uses (mathematics) algorithms to ensure computer
security objectives.i.e. mainly to ensure confidentiality, authenticity, integrity and
non repudiation of data/users/information exchange.
Cryptanalysis
Cryptography is the study of weaknessess of cryptographic algorithm
Cryptology
Cryptology= Cryptography + Cryptanalysis
A cryptosystem
A cryptosystem is a 5-tuple (P, C, K, E, D) where
P is the space of plaintext.
C is the space of ciphertext.
K is the space of keys.
E = {E k , k ∈ K } with Ek : P → C (enciphering/encryption functions).
D = {D k , k ∈ K } avec Dk : C → P (decryption functions).
For each key e of K is associated d of K such that Dd (E e (p)) = p for all p in P.
Example/exercise
Construct a simple cryptosystem
characteristics
All cryptography from ancient times until 1976 was exclusively based on
symmetric methods. Symmetric ciphers are still in widespread use, especially
for data encryption and integrity check of messages
Common problems are key exchange and key management ( solve with
asymmetric cryptography)
very fast, good for encryption of bid quantity of data
Examples include DES, AES,....
characteristics
Introduced in 1976 by Whitfield Diffie, Martin Hellman and Ralph Merkle. In
public-key cryptography, a user possesses a secret key as in symmetric
cryptography but also a public key. Asymmetric algorithms can be used for
applications such as digital signatures and key establishment, and also for
classical data encryption.
Common problem is slowness in encryption, not suitable for encryption of big
quantity of datas
ease key management
Examples include RSA, El Gamal, ECC.....
Mr. Asoh Christian M. Computer Network Security: Generalities 8/25
A note on Cryptanalysis
Typically, the objective of attacking an encryption system is to recover the key in use
rather than simply to recover the plaintext of a single ciphertext. There are two
general approaches to attacking a conventional encryption scheme:
Cryptanalysis
Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some
knowledge of the general characteristics of the plaintext or even some sample
plaintext–ciphertext pairs. This type of attack exploits the characteristics of the
algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Brute-Force attack
The attacker tries every possible key on a piece of ciphertext until an intelligible
translation into plaintext is obtained. On average, half of all possible keys must be
tried to achieve success.
Internet
TV cables, DVD,
Health cards, Electonic voting
Telecommunication networks: Phones,......
steganography
steganography is the practice of concealing a file, message, image, or video within
another file, message, image, or video.
Whereas cryptography is the practice of protecting the contents of a message alone,
steganography is concerned with concealing the fact that a secret message is being
sent as well as concealing the contents of the message.
Example/Exercise: Find the main message ( in French) in the following text sent by
George Sand to Alfred de Musset
Je suis très émue de vous dire que j’ai Je vous prouverai que je suis la femme
bien compris, l’autre jour, que vous avez since`re capable de vous offrir l’affection
toujours une envie folle de me faire la plus profonde et la plus e´troite
danser. Je garde un souvenir de votre Amitie´, en un mot, la meilleure amie
baiser et je voudrais que ce soit que vous puissiez reˆver. Puisque votre
là une preuve que je puisse être aimée aˆme est libre, alors que l’abandon ou` je
par vous. Je suis preˆte a`vous montrer mon vis est bien long, bien dur et bien souvent
Affection toute désintéressée et sans cal- pénible, ami très cher, j’ai le coeur
cul. Si vous voulez me voir ainsi gros, accourez vite et venez me le
de´voiler, sans aucun artifice mon aˆme faire oublier. A l’amour, je veux me sou-
toute nue, daignez donc me faire une visite mettre.
Et nous causerons en amis et en chemin.