Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Essential Terms
Cryptography Encryption
Plain text Cipher text
Decryption
Cipher text Plain text
Cryptanalysis Cryptology
Source: http://www.unmuseum.org/enigma.j
Basic Terminologies
Cryptography deals with creating documents that can be shared secretly over public communication channels Cryptographic documents are decrypted with the key associated with encryption, with the knowledge of the encryptor The word cryptography comes from the Greek words: Krypto (secret) and graphein (write) Cryptanalysis deals with finding the encryption key without the knowledge of the encryptor Cryptology deals with cryptography and cryptanalysis Cryptosystems are computer systems used to encrypt data for secure transmission and storage
Basic Terminologies
Keys are rules used in algorithms to convert a document into a secret document Keys are of two types:
Symmetric Asymmetric
A key is symmetric if the same key is used both for encryption and decryption A key is asymmetric if different keys are used for encryption and decryption
4
Basic Terminologies
Examples:
Symmetric key methods
DES 56-bit Triple DES 128-bit AES 128-bit and higher Blowfish 128-bit and higher
Basic Terminologies
Plaintext is text that is in readable form Ciphertext results from plaintext by applying the encryption key Notations:
M message, C ciphertext, D decryption, E(M) = C E(M, k) = C E encryption, k key
Cryptographic Methods
Symmetric
Same key for encryption and decryption Key distribution problem
Asymmetric
Mathematically related key pairs for encryption and decryption Public and private keys
Cryptographic Methods
Hybrid
Combines strengths of both methods Asymmetric distributes symmetric key
Also known as a session key
Steganography
Cryptography
Basic Terminologies
Steganography is the method of hiding secret messages in an ordinary document Steganography does not use encryption Steganography does not increase file size for hidden messages Example: select the bit patterns in pixel colors to hide the message
10
Steganography
Hiding a message within another medium, such as an image No key is required Example
Modify color map of JPEG image
11
Steganography
Steganography covered writing is an art of hiding information Popular contemporary steganographic technologies hide New York Times, August 3rd, 2001 information in http://www.nytimes.com/images/2001/10/30/sci ence/sci_STEGO_011030_00.jpg images
http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading
Types of Cryptography
Stream-based Ciphers
One at a time, please Mixes plaintext with key stream Good for real-time services
Block Ciphers
Amusement Park Ride Substitution and transposition
14
Steganography Substitution
Polyalphabetic
Encryption Systems
Substitution Cipher
Convert one letter to another Cryptoquip Change position of letter in text Word Jumble
Transposition Cipher
16
Hashing Algorithms
MD5
Computes 128-bit hash value Widely used for file integrity checking
SHA-1
Computes 160-bit hash value
20