Cryptography and Public Key Infrastructure
Cryptography and Public Key Infrastructure
Infrastructure
Cryptology
• Cryptography
The area of study containing the principles and methods of
transforming an intelligible message in to one that is
unintelligible, and then retransforming that message back
to its original form.
• Cryptanalysis(Hacking)
is art and science of decoding non readable data without
knowing techniques of encoding.
• Cryptology
Both Cryptography and Cryptanalysis Known as Cryptology
Symmetric Key Encryption
• Encryption and Decryption is done with single
key
• A symmetric encryption scheme has five
ingredients
– Plain Text
– Encryption algorithm
– Secret Key
– Cypher Text
– Decryption algorithm
Simplified Model of Conventional Encryption
Basic Requirement
1. Strong encryption algorithm:
The opponent should be unable to decrypt cipher text or discover
the key even if he or she is in possession of a number of cipher
texts together with the plaintext that produced each cipher text.
Y = E(PUb, X)
X = D(PRb, Y)
Public-Key Cryptosystem:
Authentication
Y = E(PRa, X) X = D(PUa, Y)
Public-Key Cryptosystem:
Authentication and Secrecy
Z = E(PUb, E(PRa, X))
• Adj(Key):
– Transpose(KEY)
– Find Minor
– Find co factor
• TEXT Matrix is:
SHA-1