Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction to Cryptography
Dalilah Abdullah
Information Systems Section
Malaysian Institute of Information Technology
Universiti Kuala Lumpur
dalilah@miit.unikl.edu.my
Owned by : Dr Shamsul Anuar Mokhtar
Introduction
Basic Concept
P = D(E(P))
Slide no. 3
Introduction
Slide no. 4
Introduction
Cryptography
Slide no. 5
Introduction
Cryptography
Slide no. 6
Introduction
Cryptography
Slide no. 7
Introduction
Cryptography
Slide no. 8
Introduction
Cryptography
Slide no. 9
Classical ciphers
The main classical cipher types are:
Slide no. 10
Slide no. 11
Slide no. 12
5
D
E
E
C
U
Slide no. 13
Slide no. 14
Slide no. 15
Plaintext:
ATTACKATDAWN
Key:
LEMONLEMONLE
Ciphertext:
LXFOPVEFRNHR
Slide no. 16
Slide no. 17
Slide no. 18
Slide no. 19
Numeric Eq.
21
17 13
12
15
17
+ Random Num. 76
48
16
82
44
03
58
11 60
05 48 88
= Sum
97
52
33
95
44
15
60
19 75
12 52 105
= mod 26
19
17
18
15
19
23 12
Ciphertext
Slide no. 20
Cryptanalysis
Typically, this involves finding the secret key. In nontechnical language, this is the practice of
codebreaking or cracking the code, although these
phrases also have a specialised technical meaning.
Slide no. 21
Cryptanalysis (contd.)
Deciphering Cryptographic
Messages.
Slide no. 22
Cryptanalysis (contd.)
A cryptanalysis can do any or all of six different things:
Slide no. 23
Cryptanalysis (contd.)
Slide no. 24
Slide no. 25
Slide no. 26
Slide no. 27
Slide no. 28
Stream Cipher:
Converting one symbol of plaintext immediately
into a symbol of ciphertext
The transformation depends only on the symbol,
the key and the control information of the
encipherment algorithm
Example: All substitution cipher algorithms
Block Cipher:
Encrypts a group of plaintext symbols as one block
In columnar transposition, the entire message is
translated as one block
Cryptography
Slide no. 29
Slide no. 30
Slide no. 31
Slide no. 32
Block ciphers
Dr. Shamsul Anuar Mokhtar
Slide no. 33
Slide no. 34
Advantages
Disadvantages
Stream Encryption
Algorithms
Speed of
transformation
Low error
propagation
Low diffusion
Susceptibility to
malicious insertions
and modifications
Block Encryption
Algorithms
High diffusion
Immunity to
insertion of
symbols
Slowness of
encryption
Error
propagation
Slide no. 35
Slide no. 36
Slide no. 37
Slide no. 38
Cryptography
Slide no. 39
Cryptography
Slide no. 40
Cryptography
Slide no. 41
Cryptography
Slide no. 42
Cryptography
Slide no. 43
Next chapter
Symmetric-Key Cryptography