Comp-security-chapter 3Part1
Comp-security-chapter 3Part1
Chapter Three
Cryptography Fundamentals
– c = Ek(p ) = (p + k) mod 26
– p = Dk(c ) = (c - k) mod 26
• In these formulas
– ‘k’ is the secret key. The symbols ’E’ and ’D’ stand for Encryption and
Decryption respectively, and p and c are characters in the plain and
cipher text respectively.
achieve success.
secrecy.
cannot deny the transmission of the said data to a recipient or third party.
• Each user has two keys: Public Key and Private Key and Both keys are
mathematically related (both keys together are called the key pair).
• The public key is made available to anyone and the private key is Kept
Secret.
• Data encrypted with the Public Key is unencrypted with the Private Key.
• Encrypting data with the private key creates a digital signature and this
ensures the message has come from the stated sender (because only the
sender has access to the private key to be able to create the signature).
• In the case of a key exchange, one party creates the secret key and
encrypts it with the public key of the recipient.
• The receiver would then decrypt it with their private key and the
remaining communication would be done with the secret key being the
encryption key.
Encryption Decryption
Symmetric key
Original
plaintext ciphertext plaintext
Encryption Decryption
Asymmetric key
Original
plaintext ciphertext plaintext
Encryption Decryption
Mekdela Amba University
61
By Leweyehu Y.
Classical Encryption Techniques
There are two basic building block of all
encryption techniques:
The matrix used for encryption is the cipher key, and it should be
chosen randomly from the set of invertible n x n matrices (modulo
26).
It is an unbreakable cipher.
As the name suggests, the key is used one time only and
never used again for any other message to be encrypted.