Foundations of Cryptography (CYS 602) : Lecture #1 Introduction To Cryptography and Data Security
Foundations of Cryptography (CYS 602) : Lecture #1 Introduction To Cryptography and Data Security
CRYPTOGRAPHY
(CYS 602)
LECTURE #1 INTRODUCTION TO CRYPTOGRAPHY AND DATA SECURITY
DEFINITIONS
1. Cryptography: is the science of secret writing with the goal of hiding the meaning of a
message.
2. Cryptanalysis: is the science and sometimes art of breaking cryptosystems.
DEFINITIONS (CONT’D)
• Symmetric Algorithms is two parties have an encryption and decryption method for
which they share a secret key.
They are used for data encryption and integrity check of messages
Fig.1. Cryptology
SYMMETRIC CRYPTOGRAPHY
• If there are two users, Alice and Bob, who want to communicate over an insecure
channel, the actual problem is, Oscar, who has access to the channel,, by hacking into an
Internet router or by listening to the radio signals of a Wi-Fi communication.
• This type of unauthorized listening is called eavesdropping.
• Symmetric cryptography offers a powerful solution
COMMUNICATION OVER AN INSECURE
CHANNEL
COMMUNICATION OVER A SECURE CHANNEL
• The major weakness of the substitution cipher is that each plaintext symbol always maps
to the same ciphertext symbol.
• That means that the statistical properties of the plaintext are preserved in the ciphertext.
• The substitution cipher is not secure at all! Let’s look at ways of breaking the cipher.
BRUTE-FORCE ATTACKS
• Brute-force attacks are based on a simple concept: the attacker, has the ciphertext from
eavesdropping on the channel and happens to have a short piece of plaintext, e.g., the
header of a file that was encrypted. The attacker now simply decrypts the first piece of
ciphertext with all possible keys. Again, the key for this cipher is the substitution table. If
the resulting plaintext matches the short piece of plaintext, he knows that he has found the
correct key
LETTER FREQUENCY ANALYSIS
• 1. Determine the frequency of every ciphertext letter. The frequency distribution, often
even of relatively short pieces of encrypted text, will be close to that of the given
language in general.
• The most frequent letters can often easily be spotted in ciphertexts. For instance, in
English E is the most frequent letter (about 13%), T is the second most frequent letter
(about 9%), A is the third most frequent letter (about 8%), and so on.
• 2. For instance, in English (and some other European languages), the letter Q is almost
always followed by a U. This behavior can be exploited to detect the substitution of the
letter Q and the letter U.
• 3. If we assume that word separators (blanks) have been found (which is only sometimes
the case), one can often detect frequent short words such as THE, AND, etc. Once we
have identified one of these words, we immediately know three letters (or whatever the
length of the word is) for the entire text.