7 Cryptography
7 Cryptography
Cryptography
Secure Communication
Needs and Requirements
• Well established needs for secure communication
– War time communication
– Business transactions
Unique value preposition
1. Secrecy
– Only intended receiver understands the message
2. Authentication
– Sender and receiver need to confirm each others identity
3. Message
– Ensure that their communication has not been altered, either
maliciously or by accident during transmission
Cryptography
Basics
• Cryptography is the science of secret, or hidden
writing
• It has two main Components:
1. Encryption
– Practice of hiding messages so that they can not be read by
anyone other than the intended recipient
2. Authentication & Integrity
– Ensuring that users of data/resources are the persons they claim
to be and that a message has not been surreptitiously altered
Encryption
Cipher
• Cipher is a method for encrypting messages
Key A Key B
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Key (3)
Decryption
Cipher Text Plain Text
Cipher:
Message: Caesar Cipher Message:
Dwwdfn Dw Gdyq Algorithm Attack at Dawn
Key (3)
Bob’s Cipher
Public Key (DES) Alice and Bob
Bob’s Session Key Generate Same
Private Key
Session Key!
Alice’s Cipher
Public Key
(DES)
Authentication
Iris Recognition
The scanning process takes advantage of the
natural patterns in people's irises, digitizing them
for identification purposes
Facts
• Probability of two irises producing exactly the
same code: 1 in 10 to the 78th powerIndependent
variables (degrees of freedom) extracted: 266
• IrisCode record size: 512 bytes
• Average identification speed (database of 100,000
IrisCode records): one to two seconds