Top Banner
48

Cryptography

Feb 04, 2016

Download

Documents

TerriS

Cryptography. Contact Information. Introduction. Cryptology. A form of communication which is primarily concerned with the secure transmission (through encryption ) of a secret message over an insecure channel. Cryptography. +. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography
Page 2: Cryptography

Contact Information

Cryptography 22/04/23 | pag. 2

Professor

Assistant

Office

Webpage

Course Text

Ann [email protected]

Adriaan [email protected]

Pleinlaan 9, 2.29

http://homepages.vub.ac.be/~andooms (Education)

• Johanes A. Buchmann. Introduction to Cryptography, Springer, 2000.• Richard Mollin, Codes: The Guide to Secrecy From Ancient to Modern Times, Chapman & Hall, 2005. • Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone Handbook of Applied Cryptography, CRC Press, 1996.

Page 3: Cryptography

Introduction

Introduction22/04/23 | pag. 3

Page 4: Cryptography

Cryptology

Introduction22/04/23 | pag. 4

Cryptology

+

A form of communication which is primarily concerned with the secure transmission (through encryption) of a secret message over an insecure channel.

Deals with attacks on encrypted intercepted messages to recover the secret message.

=

Cryptography

Cryptanalysis

Page 5: Cryptography

Cryptosystem

Introduction22/04/23 | pag. 5

Page 6: Cryptography

Example: Ceasar Cipher

Cryptography 22/04/23 | pag. 6

Page 7: Cryptography

Example: Ceasar Cipher

Introduction22/04/23 | pag. 7

Hence the number of keys should be large!

Page 8: Cryptography

Basic Concepts

Introduction22/04/23 | pag. 8

Page 9: Cryptography

Symmetric vs AsymmetricCryptosystems

Introduction22/04/23 | pag. 9

Page 10: Cryptography

Cryptanalysis

Introduction22/04/23 | pag. 10

Kerckhoff’s principle

Page 11: Cryptography

Attacks

Introduction22/04/23 | pag. 11

Page 12: Cryptography

Example: Attacks

Introduction22/04/23 | pag. 12

Page 13: Cryptography

Alphabet

Introduction22/04/23 | pag. 13

Page 14: Cryptography

Alphabet

Introduction22/04/23 | pag. 14

Page 15: Cryptography

Words

Introduction22/04/23 | pag. 15

Page 16: Cryptography

Permutations

Introduction22/04/23 | pag. 16

Page 17: Cryptography

Permutations

Cryptography 22/04/23 | pag. 17

Page 18: Cryptography

Symmetric Cryptosystems

Symmetric Cryptosystems22/04/23 | pag. 18

Page 19: Cryptography

Block Ciphers

Symmetric Cryptosystems22/04/23 | pag. 19

Page 20: Cryptography

Block Ciphers

Symmetric Cryptosystems22/04/23 | pag. 20

Page 21: Cryptography

Block Ciphers:Permutation Cipher

Symmetric Cryptosystems22/04/23 | pag. 21

Page 22: Cryptography

Block Ciphers:Multiple Encryption

Symmetric Cryptosystems22/04/23 | pag. 22

Page 23: Cryptography

Block Ciphers:Modes of Use

Cryptography 22/04/23 | pag. 23

• ECB: Electronic Codebook

• CBC: Cipherblock Chaining

• CFB: Cipher Feedback

• OFB: Output Feedback

Page 24: Cryptography

Block Ciphers – ECB:Electronic Codebook Mode

Cryptography 22/04/23 | pag. 24

Page 25: Cryptography

Block Ciphers – ECB:Electronic Codebook Mode

Cryptography 22/04/23 | pag. 25

Page 26: Cryptography

Block Ciphers – ECB:Electronic Codebook Mode

Cryptography 22/04/23 | pag. 26

Page 27: Cryptography

Example:Block Ciphers – ECB

Cryptography 22/04/23 | pag. 27

Page 28: Cryptography

Drawback:Block Ciphers – ECB

Cryptography 22/04/23 | pag. 28

Page 29: Cryptography

Example:Block Ciphers – ECB

Cryptography 22/04/23 | pag. 29

Page 30: Cryptography

Block Ciphers – CBC:Cipherblock Chaining Mode

Cryptography 22/04/23 | pag. 30

Page 31: Cryptography

Block Ciphers – CBC:XOR

Cryptography 22/04/23 | pag. 31

Page 32: Cryptography

Block Ciphers – CBC:Cipherblock Chaining Mode

Cryptography 22/04/23 | pag. 32

Page 33: Cryptography

Block Ciphers – CBC:Cipherblock Chaining Mode

Cryptography 22/04/23 | pag. 33

Page 34: Cryptography

Block Ciphers – CBC:Cipherblock Chaining Mode

Cryptography 22/04/23 | pag. 34

Page 35: Cryptography

Example:Block Ciphers – CBC

Cryptography 22/04/23 | pag. 35

Page 36: Cryptography

Block Ciphers – CBC:Cipherblock Chaining Mode

Cryptography 22/04/23 | pag. 36

Page 37: Cryptography

Example:Block Ciphers – CBC

Cryptography 22/04/23 | pag. 37

Page 38: Cryptography

Drawback:Block Ciphers – CBC

Cryptography 22/04/23 | pag. 38

Page 39: Cryptography

Block Ciphers – CFB:Cipher Feedback Mode

Cryptography 22/04/23 | pag. 39

Page 40: Cryptography

Block Ciphers – CFB:Cipher Feedback Mode

Cryptography 22/04/23 | pag. 40

Page 41: Cryptography

Block Ciphers – CFB:Cipher Feedback Mode

Cryptography 22/04/23 | pag. 41

Page 42: Cryptography

Example:Block Ciphers – CFB

Cryptography 22/04/23 | pag. 42

Page 43: Cryptography

Drawback:Block Ciphers – CFB

Cryptography 22/04/23 | pag. 43

The smaller the block length r, the shorter the ciphertext blocks. This means on the hand that transmission is faster, but on the other hand that the block encryption function must be applied more frequently. The optimal choice of r depends on a tradeoff between transmission and computation speed.

Page 44: Cryptography

Block Ciphers – OFB:Output Feedback Mode

Cryptography 22/04/23 | pag. 44

Page 45: Cryptography

Block Ciphers – OFB:Output Feedback Mode

Cryptography 22/04/23 | pag. 45

Page 46: Cryptography

Block Ciphers – OFB:Output Feedback Mode

Cryptography 22/04/23 | pag. 46

Page 47: Cryptography

Example:Block Ciphers – OFB

Cryptography 22/04/23 | pag. 47

Page 48: Cryptography

Drawback:Block Ciphers – OFB

Cryptography 22/04/23 | pag. 48