0% found this document useful (0 votes)
68 views

Cryptography and Cryptanalysis

This document discusses cryptography and cryptanalysis. It defines key terms like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It describes symmetric cryptographic systems that use a single secret key. It also discusses different types of cryptanalytic attacks like ciphertext-only, known plaintext, chosen plaintext, and chosen ciphertext attacks. Brute-force attacks are defined as trying every possible key until intelligible plaintext is obtained. On average, half of all keys must be tried for success.

Uploaded by

Dharma Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Cryptography and Cryptanalysis

This document discusses cryptography and cryptanalysis. It defines key terms like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It describes symmetric cryptographic systems that use a single secret key. It also discusses different types of cryptanalytic attacks like ciphertext-only, known plaintext, chosen plaintext, and chosen ciphertext attacks. Brute-force attacks are defined as trying every possible key until intelligible plaintext is obtained. On average, half of all keys must be tried for success.

Uploaded by

Dharma Reddy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SWE3002 Information and Systems

Security
Prof. Selva Rani B
Module-II
Elementary Cryptography
Cryptography and Cryptanalysis-Definitions
 Plain Text
 An original message
 Cipher Text
 The coded message
 Enciphering/encryption
 The process of converting from plaintext to ciphertext
 Deciphering/decryption
 Restoring the plaintext from the ciphertext
 Cryptography
 The area of study of the many schemes used for encryption
Cryptography and Cryptanalysis-Definitions
 Cryptographic system/cipher
 A scheme
 Cryptanalysis
 Techniques used for deciphering a message without any knowledge
of the enciphering details
 Cryptology
 The areas of cryptography and cryptanalysis
Model of Symmetric Encryption
Symmetric Crypto System
Cryptographic Systems
 Characterized along three independent dimensions:
 The type of operations used for transforming plaintext to
ciphertext
 Substitution
 Transposition
 The number of keys used
 Symmetric, single-key, secret-key, conventional encryption
 Asymmetric, two-key, or public-key encryption
 The way in which the plaintext is processed
 Block cipher
 Stream cipher
Cryptanalysis and Brute-Force Attack
 Cryptanalysis
 Attack relies on the nature of the algorithm plus some knowledge
of the general characteristics of the plaintext
 Attack exploits the characteristics of the algorithm to attempt to
deduce a specific plaintext or to deduce the key being used
 Brute-Force Attack
 Attacker tries every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained
 On average, half of all possible keys must be tried to achieve
success
Types of Attacks
Type of Attack Known to Cryptanalyst
Ciphertext Only • Encryption algorithm
• Ciphertext
Known Plaintext • Encryption algorithm
• Ciphertext
• One or more plaintext-ciphertext pairs formed with the Secret
key
Chosen Plaintext Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
Chosen Ciphertext Encryption algorithm
• Ciphertext
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the Secret
key
Chosen Text • Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the secret
key
Brute-Force Attack
 Involves trying every possible key until an intelligible
translation of the ciphertext into plaintext is obtained
 On average, half of all possible keys must be tried to
achieve success
 To supplement the brute-force approach, some
degree of knowledge about the expected plaintext is
needed, and some means of automatically
distinguishing plaintext from garble is also needed

You might also like