Cryptography: Keamanan Jaringan - 2019
Cryptography: Keamanan Jaringan - 2019
Cryptography is the science of secret writing with the goal of hiding the meaning of a message.
Cryptanalysis is the science and sometimes art of breaking cryptosystems.
Relation >> cryptanalysis is the only way to assure that a cryptosystem is secure
Symmetric Cryptography
• Symmetric cryptographic schemes are also referred to as symmetric-
key, secret-key, and single-key schemes or algorithms.
Symmetric Cryptography
• In this situation, symmetric cryptography offers a powerful solution:
Alice encrypts her message x using a symmetric algorithm, yielding
the ciphertext y. Bob receives the ciphertext and decrypts the
message.
Symmetric Cryptography
• Simple Symmetric Encryption: The Substitution Cipher
The goal of the substitution cipher is the encryption of text (as opposed
to bits in modern digital systems). The idea is very simple: We
substitute each letter of the alphabet with another one.
Symmetric Cryptography
• Shift Cipher (or Caesar Cipher) : We simply shift every plaintext letter by
a fixed number of positions in the alphabet.
Symmetric Cryptography
• The symmetric ciphers can be divided into stream ciphers and block
ciphers
Stream Ciphers vs. Block Ciphers
• Symmetric cryptography is split into block ciphers and stream ciphers,
which are easy to distinguish.
• Figure 2.2 depicts the operational differences between stream (Fig.
2.2a) and block (Fig. 2.2b) ciphers when we want to encrypt b bits at a
time, where b is the width of the block cipher.
Stream Ciphers vs. Block Ciphers
• Stream ciphers encrypt bits individually. This is achieved by adding a
bit from a key stream to a plaintext bit.
• Block ciphers encrypt an entire block of plaintext bits at a time with
the same key. This means that the encryption of any plaintext bit in a
given block depends on every other plaintext bit in the same block
Asymmetric Cryptography
• Asymmetric cryptography, also known as public key cryptography,
uses public and private keys to encrypt and decrypt data.
• The keys are simply large numbers that have been paired together but
are not identical (asymmetric).
• One key in the pair can be shared with everyone; it is called the public
key.
• The other key in the pair is kept secret; it is called the private key.
Either of the keys can be used to encrypt a message; the opposite key
from the one used to encrypt the message is used for decryption.
Asymmetric vs. Symmetric Cryptography
• The main difference between these two methods of encryption is that
asymmetric encryption algorithms makes use of two different but
related keys -- one key to encrypt the data and another key to decrypt
it -- while symmetric encryption uses the same key to perform both
the encryption and decryption functions.
• Another difference between asymmetric and symmetric encryption is
the length of the keys. In symmetric cryptography, the length of the
keys -- which is randomly selected -- are typically set at 128-bits or
256-bits, depending on the level of security that's needed.
Asymmetric vs. Symmetric Cryptography