Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Encryption:
It is the process of locking up information using cryptography.
Information that has been locked this way is encrypted.
Decryption:
The process of unlocking the encrypted information using
cryptographic techniques.
Key:
A secret like a password used to encrypt and decrypt information.
There are a few different types of keys used in cryptography.
Public-key :
It refers to a cryptographic mechanism. Public-key introduces a
concept involving key pairs: one for encrypting, the other for
decrypting.
Characteristics:
• Simplified key distribution • Digital Signature • Long-term
encryption.
2. ) Message encryption.
Encryption includes the following 3 steps:
a) Creation of a one time symmetric encryption/decryption key.
b) Message encryption. The whole message (the message itself and
the signature) is encrypted using SymK, the symmetric-key
evaluated above.
c) Symmetric-key encryption. SymK is also used by the recipient to
decrypt the message. SymK must therefore be available to the
recipient (Bob) only. The way to hide the Symk from everybody
except the recipient is to encrypt it using the recipient’s public-key.
Since SymK is a small piece of information compared to a message
(that could be very long), the performance penalty associated with
the relative inefficiency of asymmetric-key algorithms is acceptable.
1.Message decryption.
The decryption includes the following steps:
a)Symmetric-key decryption.
The one time symmetric-key has been used to encrypt the message.
This key (SymK) has been encrypted using the recipient’s (Bob)
public-key. Only Bob can decrypt SymK and use it to decrypt the
message9.
b) Message decryption. The message (which includes the message
itself and the signature) is decrypted using SymK.
2. Signature verification.
The signature verification includes the following 3 steps:
a) Message digest decryption. The digest has been encrypted using
the issuer’s (Alice) private-key. The digest is now decrypted using
the issuer’s public-key included in the message.
b) Digest evaluation. Since hashing is a one-way process i.e. the
message cannot be derived from the digest itself, the recipient must
re-evaluate the digest using the exact same hashing algorithm the
issuer used.
c) Digests comparison. The digest decrypted in a) and the digest
evaluated in b) are compared. If there is a match, the signature has
been verified, and the recipient can accept the message as coming
unaltered from the issuer. If there is a mismatch this could mean
that: i) The message has not been signed by the issuer or ii) The
message has been altered. iii) In both cases, the message should be
rejected.
Diagram:
Private key encryption
Des standards:
Round function
Key schedule
Any additional processing − Initial and final permutation
How DES Works in Detail
M = 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010
1011 1100 1101 1110 1111
L = 0000 0001 0010 0011 0100 0101 0110 0111
R = 1000 1001 1010 1011 1100 1101 1110 1111
The first bit of M is "0". The last bit is "1". We read from left to right.
DES operates on the 64-bit blocks using key sizes of 56- bits. The
keys are actually stored as being 64 bits long, but every 8th bit in the
key is not used (i.e. bits numbered 8, 16, 24, 32, 40, 48, 56, and 64).
However, we will nevertheless number the bits from 1 to 64, going
left to right, in the following calculations. But, as you will see, the
eight bits just mentioned get eliminated when we create subkeys.