Lecture 3
Lecture 3
Terminology
• Cryptography: Schemes for encryption and
decryption
• Encryption: The process by which plaintext is
converted into cipher text.
• Decryption: Recovering plaintext from the cipher text
CRYPTOGRAPHIC COMMUNICATION
Secret key: Used to set some or all of the various
parameters used by the encryption algorithm. In a
classical (symmetric key) cryptography, the same secret
key is used for encryption and decryption
Cryptanalysis: The study of “breaking the code”.
Cryptanalysts!
Cryptology: Cryptography and cryptanalysis together
constitute the area of cryptology.
CRYPTOGRAPHY
Cryptography has five ingredients:
Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm
CRYPTOGRAPHY
The input message, called plaintext, is
encrypted with a secret (encryption) key.
The encrypted message is called cipher text,
which moves through an unsecure
communication channel, the Internet
FOR EXAMPLE
Cryptography is an example of old and very simple based
on members theory julin Caesar , is also called Caesar
ciphering .
The idea was simple shifting of letters
Replace every letters in the plain text message by the
letter these letters to the right to get the coded message
To decode the coded message one needs to shift each
letters 3 unit to ware left
Caesar ciphering
O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25
Encryption
• Example: ‘ A ‘ corresponds to ‘ 0 ‘
Take the value of a = 3 , and b = 2
€ (m)= (am+b)mod 26
= (3(0)+2) mod 26
= 0 +2 mod 26
= 2 → produce ‘ C ‘
DECRYPT
•To decrypt the Message
∂(s) = x(s-b)mod 26
ax = 1 mod 1
3x = 1 mod 1
3x = 26 + 1
3x = 27
X=9
DECRYPT
• There fore
∂(s) = x(s-b)mod 26
9( 2 – 2) mod 26
9( 0 ) mod 26
0 → produce A
DECRYPT
S → Cross ponds to number ‘ 18 To decrypted the message
€ (m)= (am+b)mod 26
∂(s) = x(s-b) mod 26
= (3(18)+2 mod 26
= 9(4 -2 ) mod 26
= 54 + 2 mode 26
= 9( 2 ) mod 26
= 56 mod 26
= 4 → produce ‘ E ‘ = 18 →S
Exercise