0% found this document useful (0 votes)
100 views15 pages

CH 30

Uploaded by

Aini Ch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views15 pages

CH 30

Uploaded by

Aini Ch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

Chapter 30

Cryptography

30.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
30-1 INTRODUCTION

Let us introduce the issues involved in cryptography.


First, we need to define some terms; then we give some
taxonomies.

Topics discussed in this section:


Definitions
Two Categories

30.2
INTRODUCTION
 Cryptography is a Greek word means
“secret writing”.
 Cryptography is the science and art of
transforming messages to make them
secure and immune to attacks.
 The following figure describes the
components of a cryptographic system.

30.3
Figure 30.1 Cryptography components

30.4
Components:

1. Plain text and Cipher text


2. Cipher
3. Key
4. Alice, Bob, and Eve

30.5
Plain and Cipher text

 The original message is called “plain text”.


 The transformed message is called “cipher
text”.
 An “encryption algorithm” transforms the
plain text into cipher text.
 A “decryption algorithm” transforms the
cipher text into plain text.

30.6
Cipher

 We refer to encryption and decryption


algorithms as ciphers.
 The term “cipher” also refers to different
categories of algorithms in cryptography.
 Every pair of sender/receiver do not
require their own cipher.
 On cipher can serve millions of
communicating pairs.

30.7
Key

 A key is a number (or a set of numbers)


that the cipher, as an algorithm, operates
on.
 To encrypt a message, we need an
encryption algorithm, an encryption key,
and the plain text.
 To decrypt a message, we need a
decryption algorithm, a decryption key,
and the cipher text.
30.8
Alice, Bob and Eve

 In cryptography it is customary to use


three characters in an information
exchange scenario.
 Alice is the person who sends secure data.
 Bob is the recipient of data.
 Eve is the person who disturbs
communication between Alice and Bob.

30.9
Figure 30.2 Categories of cryptography

30.10
Figure 30.3 Symmetric-key cryptography

30.11
Note

In symmetric-key cryptography, the


same key is used by the sender
(for encryption)
and the receiver (for decryption).
The key is shared.

30.12
Figure 30.4 Asymmetric-key cryptography

30.13
Figure 30.5 Keys used in cryptography

30.14
Figure 30.6 Comparison between two categories of cryptography

30.15

You might also like