Encryption
Encryption
MACHINE
https://www.youtube.com/watch?
v=nuPZUUED5uk
3-1
Copyright © 2015 Pearson Education,
Inc.
WORLD’S FIRST:
ELECTRONIC DIGITAL
PROGRAMMABLE
COMPUTER
???
• Substitution is circular
K=19
• The person encrypting the messages
chooses key, “k”.
Copyright © 2015 Pearson Education,
Inc.
EXAMPLES
SYMMETRIC
KEY
ENCRYPTION • Integrity
FOR:
• Non-repudiation
5
Copyright © 2015 Pearson Education,
Source of the diagram: https://en.wikipedia.org/wiki/Cryptographic_hash_function Inc.
HASHING (4)
Characteristic Encryption Hashing
Result length About the Short fixed
Hashing same length length
versus as the
plaintext
regardless of
message length
Encryption
Reversible? Yes. No. There is
Decryption no way to get
from the short
hash back to
the long
original
message
Solution:
1970 James Ellis a British cryptographer
1973 Clifford Cocks implemented
gave the idea of non secret encryption.
Asymmetric Copyright
cryptosystem (RSA)
But how? Inc.
© 2015 Pearson Education,
ASYMMETRIC
CRYPTOSYSTEM
‒ PRA PUA
‒PRB PUB
Characteristics of Keys
ASYMMETRIC
KEY
ENCRYPTION • Integrity
FOR:
• Non-repudiation
Blackhat Message : I hate you Hash value= Pj9 ciphertext (DS)= 110010
I hate you Hash value = Pj9 ≠ 1@M6 =Hash value I love you
SUMMERY