Lecture 5: Classical Encryption Part 1 (introduction, transposition ciphers, simple substitution ciphers, Caesar cipher, random simple substitution cipher) Flashcards
What are the two facets of cryptology?
- cryptography
2. cryptanalysis
What is cryptography?
study of designing cryptosystems
science of secret writing
transformations of data depending on a secret (key)
What is cryptanalysis?
study of breaking cryptosystems
What is cryptography used to provide?
- confidentiality
2. authentication (or integrity)
What is confidentiality in terms of cryptography?
key is needed to read mesage
What is authentication in terms of cryptography?
key is needed to write message (with digital signature)
What does a cryptosystem consist of?
- Set of plaintexts (holding original message)
- Set of ciphertexts (holding encrypted message)
- Set of keys
- Function → encryption/encipherment → transforms plaintext into ciphertext
- Inverse function → decryption/decipherment → transforms ciphertext back into plaintext
What is another name for ciphertext?
cryptogram
What are the main characteristics of a symmetric key cipher?
- Encryption and decryption keys knowing ONLY to sender & receiver
- Secure channel for transmission of keys
What are main characteristics of an asymmetric key cipher?
- Each participant has public key & private key
* Possibly working for both encryption of messages and creation of digital signatures
What is another name for a symmetric key cipher?
secret key cipher
What is another name of an asymmetric key cipher?
public key cipher
What is the notation for an encryption function for a symmetric encryption algorithm?
E
What is the notation for an decryption function for a symmetric encryption algorithm?
D
What is the notation for a message/plaintext for a symmetric encryption algorithm?
M
What is the notation for a cryptogram/ciphertext for a symmetric encryption algorithm?
C
What is the notation for a shared secret key for a symmetric encryption algorithm?
K
How is encryption denoted as for a symmetric encryption algorithm?
C = E(M,K)
How is decryption denoted as for a symmetric encryption algorithm?
M = D(C,K)
What are some resources available to an adversary?
- computational capability
* system inputs/outputs
What may the adversary’s goal be?
- retrieving whole secret key
- distinguishing two messages (e.g. YES and NO) → may want to send message rather than control system and this may be enough info
What is exhaustive key search?
Try all possible keys
Can you prevent exhaustive key search?
No, so all cryptosystems must have enough keys to make search too difficult computationally
Is it possible that an adversary finds key without trying exhaustive key search?
Yes