Cryptography - Ps
Cryptography - Ps
Course Objectives
Cryptographic Basic. Modern Cryptographic
Key. Symmetric and Asymmetric Key. Hashing Algorithm.
Symmetric Cryptography.
DES, Triple DES, Blowfish, etc. Key Distribution.
Goals of Cryptography
Security practitioners utilize cryptographic systems to meet Four Fundamental Goals:
Condentiality. Integrity. Authentication. Non-Repudiation.
Cryptography Concept
Cryptography Basic
Cryptography Concept
Term Details
A message in its natural format readable by an attacker. Message altered to be unreadable by anyone except the intended recipients. Sequence that controls the operation and behavior of the cryptographic algorithm. Total number of possible values of keys in a crypto algorithm.
Plaintext
Chipertext
Key Keyspace
Cryptography Concept
All cryptographic algorithms rely on keys to maintain their security. Every algorithm has a specic key space.
The key space is the range of values that are valid for use as a key for a specic algorithm. A key space is dened by its bit size.
Cryptography Concept
The key space is the range between the key that has all 0s and the key that has all 1s. Or to state it another way, the key space is the range of numbers from 0 to 2n, where n is the bit size of the key. Thus, a 128-bit key can have a value from 0 to 2128.
Cryptography Concept
Different Types of Key In private key cryptosystems, all
participants use a single shared key. In public key cryptosystems, each participant has their own pair of keys.
Nonce
One of the more recognizable examples of a nonce is an Initialization Vector (IV), a random bit string that is the same length as the block size and is XORed with the message. IVs are used to create Unique Cipher Text every time the same message is encrypted using the same key.
Zero-Knowledge Proof
Work Function
Measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time using a Work Function. Spend no more effort to protect an asset than it warrants, but Be Sure To Provide Sufcient Protection.
Thus, if information loses its value over time, the work function needs to be only large enough to ensure protection until the value of the data is gone.
Chiper
Ciphers are always meant to Hide The True Meaning Of A Message. They use a variety of techniques to alter and/or re-arrange the characters or bits of a message to achieve condentiality. Ciphers Convert messages from plain text
to cipher text on a bit basis, character basis,or block basis.
Chiper: Transposition
Transposition ciphers use an encryption algorithm to rearrange the letters of a plain-text message, forming the cipher-text message. The decryption algorithm simply reverses the encryption transformation to retrieve the original message.
Chiper: Transposition
In this example, were attempting to encrypt the message The ghters will strike the enemy bases at noon using the secret key attacker.
Chipertext
Chiper: Substitution
Substitution ciphers use the encryption algorithm to replace each character or bit of the plain-text message with a different character.
Chiper: Substitution