Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
b) Description
recipient.
While cryptography is the science of securing data, cryptanalysis is the science
of analysing and breaking secure communication. Classical cryptanalysis
involves an interesting combination of analytical reasoning, application of
mathematical tools, pattern finding, patience, determination, and luck.
Cryptanalysts are also called attackers. Cryptology embraces both
purpose
Encryption is the process by which one changes a message (called plaintext) in
order to render it unreadable to all but those possessing the decryption key.
The sender uses the key (or some set of rules) to encrypt the plaintext and
sends the cipher text to the receiver .The receiver applies the same key (or
rule set) to decrypt the message and recover the plaintext. Because a single
key is used for both functions, secret key cryptography is also called
Symmetric encryption.
Each pair of users must have a unique key, so N users need N (N-1)/2 keys.
Stream ciphers operate on a single bit at a time and implement some form
of feedback mechanism so that the key is constantly changing. A block
cipher is so- called because the scheme encrypts one block of data at a time
using the same key on each block.
one key is kept secret and other is kept public but both are unique.
One key is used to encrypt the plaintext and the other key is
used to decrypt the cipher text.
The important point here is that it does not matter which key is
applied first, but that both keys are required for the process to work.
ALGORITHMS
AES
DES
3DES
Key size
128,192,256
56 bits
112/168 bits
bits
Fast
Yes
Slow
Yes
Very slow
No
Slow
Very slow
Speed
Speed depends On keys?
Hardware
Very fast
implementations
Rounds
Developed
Encryption software
Security
Cipher type
Key distribution
Security
9,11,13
2000
Medium
Strong
Symmetric
Easy
Most secure
16
1978
Fast
Weak
Symmetric
Difficult
Insecure
48
1977
Slow
Inadequate
Symmetric
Moderate
More secure
Than DES
Block size
16
Conclusion:
In this assignment (analysis) we understood about the cryptography and
Many concepts of the cryptography like encryption and decryption,
Cryptonalysis, types of cryptography, etc.
We also understood and studied about algorithms like AES, DES AND
DES.how they work? What are their differences? What are the
advantages and disadvantages? which one is the better or more secure?
Few important concepts that we learnt by doing this analysis are as
follows:
Triple DES was the answer to many of the shortcomings of DES. Since it is
based on the DES algorithm, it is very easy to modify existing software to use
Triple DES.
Reference list:
Master of science thesis - Joseph Sterling Grah (book).
Cryptography and network security principles and practices
4th edition (book) by Willam Stallings.
Internet(Wikipediahttps://en.wikipedia.org/wiki/Cryptography).