Cryptography Basics, Methods and Standards: ICT640 - Advanced Information Security
Cryptography Basics, Methods and Standards: ICT640 - Advanced Information Security
Security
The hash value of the example in Figure 2.1 is computed by multiplying each character by 2,
adding those results together, and then dividing the sum by 10.
Cryptography
• Let’s say there is a smart guy called Eaves who
secretly got access to your communication
channel.
• Since this guy has access to your
communication, he can do much more than
just eavesdropping, for example, he can try to
change the message.
• Now, this is just a small example. What
if Eave gets access to your private
information? The result could be
catastrophic.
Encryption Algorithm
• Cryptography is broadly classified into
two categories:
A. Symmetric key Cryptography (Classical)
B. Asymmetric key Cryptography
(popularly known as public key
cryptography).
Encryption
Algorithm
Symmetric Key
Cryptography
• An encryption system in which the sender
and receiver of a message share a single,
common key that is used to encrypt and
decrypt the message.
• The most popular symmetric–key system is the
Data Encryption Standard (DES)
Symmetric Key
Cryptography
Transposition Ciphers
• In Cryptography, a transposition cipher is a
method of encryption by which the positions
held by units of plaintext (which are
commonly characters or groups of characters)
are shifted according to a regular system
Subsstitution Cipher
Method of encryption by which units of
plaintext are replaced with ciphertext, according
to a fixed system; the “units” may be single
letters (the most common), pairs of letters,
triplets of letters, mixtures of the above, and so
forth.
Stream Cipher
Symmetric or secret-key encryption algorithm
that encrypts a single bit at a time.
With a Stream Cipher, the same plaintext
bit or byte will encrypt to a different bit or
byte every time it is encrypted
Block Cipher
A block cipher takes a block of plaintext
bits and generates a block of ciphertext
bits, generally of same size.
The size of block is fixed in the given
scheme.
The choice of block size does not directly
affect to the strength of encryption
scheme.
Public Key Cryptography
Symmetric Key Crypto Public Key Cryptography
Requires sender, • Radically different
receiver know shared approach [Diffie-
secret key Hellman76, RSA78]
Q: How to agree on • Sender, receiver do
key in first place not share secret
(particularly if never key
“met”)? • Public encryption key
known to all
• Private decryption key
known only to
receiver
Public Key Cryptography
Bob’s public
K+B
key
- Bob’s private
K B key
Stream
Cipher
Application
References