Click here to load reader
May 15, 2015
2.
3.
4. Encryption Model,E Channel Decryption Model,D Introduction to Cryptography Ek DK Intruder p L A I N T E XT P L A I N T E X T CIPHERTEXT Active Intruder PassiveIntruder FIG.THE ENCRYPTION MODEL(For a Symmetric-Key Cipher) 5.
Cryptography 6. Cryptography
CRYPTOLOGY CRYPTANALYSIS CRYPTOGRAPHY = + 7.
Notation: 8.
Notation:Contd.. 9.
Notation:Contd. Y = Ek (X) X = Dk (Y) X = Dk(Ek(X)) 10.
11.
12.
13. Transposition Ciphers
14. Some simple cipher systems
15. Codes
16. Codescontd.
17.