Symmetric-key cryptography

sunflowerplateΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 9 μήνες)

79 εμφανίσεις

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Security

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Security Topics

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Cryptography

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004


Cryptography components

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004


Encryption and decryption

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

In cryptography,

the encryption/decryption algorithms
are public; the keys are secret.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Symmetric
-
Key Cryptography

Traditional Cipher

Block Cipher

Operation Modes

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004


Symmetric
-
key cryptography

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

In symmetric
-
key cryptography, the
same key is used by the sender (for
encryption) and the receiver (for
decryption). The key is shared.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

In symmetric
-
key cryptography, the
same key is used in both directions.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Symmetric
-
key cryptography is often
used for long messages.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Caesar cipher

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Example of monoalphabetic substitution

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

In monoalphabetic substitution, the
relationship between a character in the
plaintext to the character in the
ciphertext is always one
-
to
-
one.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Vigenere cipher

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

In polyalphabetic substitution, the
relationship between a character in the
plaintext and a character in the
ciphertext is one
-
to
-
many.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Transpositional cipher

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Block cipher

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

P
-
box

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004


S
-
box

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Product block

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

DES

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

General scheme of DES

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004


Iteration block

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Triple DES

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

The DES cipher uses the same concept
as the Caesar cipher, but the
encryption/decryption algorithm is
much more complex due to the sixteen
48
-
bit keys derived from a 56
-
bit key.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

ECB mode

Electronic Code Book Mode

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

CBC mode

Cipher Block Chaining Mode

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

CFM

Cipher Feedback Mode

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

CSM

Stream Cipher Mode

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Cryptanalysis


Some common symmetric
-
key
cryptographic algorithms.

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Public
-
Key Cryptography

RSA

Choosing Public and Private Keys

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Public
-
key cryptography

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

Public
-
key algorithms are more
efficient for short messages.

Note
:

McGraw
-
Hill

©
The McGraw
-
Hill Companies, Inc., 2004

RSA

Public Key 5 , 119 Private Key 77 , 199