Beruflich Dokumente
Kultur Dokumente
INTRODUCTION TO
CRYPTOGRAPHY
Chapter 3: Cryptography
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Encryption Terminology
Sender
Recipient
Transmission medium
Interceptor/intruder
Encrypt, encode, or encipher
Decrypt, decode, or decipher
Cryptosystem
Plaintext : material in intelligible form
Ciphertext : encrypted material
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Encryption/Decryption Process
Key
(Optional)
Plaintext
Encryption
Key
(Optional)
Ciphertext
Decryption
Original
Plaintext
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Key
Plaintext
Encryption
Ciphertext
Decryption
Original
Plaintext
Plaintext
Encryption
Decryption
Key
Ciphertext
Decryption
One key
encrypts and
one key decrypts
Original
Plaintext
Stream Ciphers
Key
(Optional)
ISSOPMI
Plaintext
wdhuw
Encryption
Ciphertext
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Block Ciphers
Key
(Optional)
.. XN OI TP ES
Plaintext
IH
Ciphertext
Encryption
po
ba
qc
kd
em
..
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Block
Advantages
Speed of
transformation
Low error
propagation
High diffusion
Immunity to
insertion of
symbol
Disadvantages
Low diffusion
Susceptibility to
malicious
insertions and
modifications
Slowness of
encryption
Padding
Error
propagation
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
10
independent Dutch
cryptographers
Still in common use
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
11
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
12
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
13
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
14
4. ,
a bc
de
4h
3d e f
tu v
5k l
pq
7r
pq r s
8uv
wxyz
mn
6
o
9y
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
15
1,
.,
ab
4g
ef
6d
ab c
h
i
7q
rs
t uv
xy z
6o
8t u
3 de f
5j k l
pq r
9x
y
z
Bill, give me
your public key
1a No, give it to me
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
16
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
17
Parity Check
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
18
Hash
function
Message
digest
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
19
Digital Signature
Mark fixed
to
document
Mark only
the sender
can make
Authentic
Unforgeable
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
20
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
21
Name: Diana
Position: Division Manager
Public key: 17EF83CA ...
Name: Delwyn
Position: Dept Manager
Public key: 3AB3882C ...
Edward adds:
Name: Diana
Position: Division Manager
Public key: 17EF83CA ...
Diana adds:
hash value
128C4
Name: Delwyn
Position: Dept Manager
Public key: 3AB3882C ...
hash value
48CFA
Name: Delwyn
Position: Dept Manager
Public key: 3AB3882C ...
hash value
48CFA
hash value
48CFA
Name: Diana
Position: Division Manager
Public key: 17EF83CA ...
hash value
128C4
22
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
23
Summary
Encryption helps prevent attackers from revealing,
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.