Chapter 3 Modified
Chapter 3 Modified
Introduction to
Cryptography
Outline
▪ What is Cryptography
▪ Applications of Cryptography
▪ Symmetric key Cryptography
Problem 1:Secure communication
▪ Quintuple(E, D, M, K, C)
▪ M:set of plaintexts
▪ K:set of keys
▪ C:set of ciphertexts
▪ E:set of encryption functions
▪ e: MxK→ C
▪ D:set of decryption functions
▪ d: CxK →M
Symmetric /Conventional Encryption
▪ The only form of encryption prior to late 1970s
▪ Plaintext: The original message or data
▪ Encryption algorithm: Performs various substitutions and
transformations on the plaintext.
▪ Substitutions: changing the plaintext one piece at a
time.
▪ Transformations: encrypt plaintext by moving small
pieces of the message around.
▪ Secret key: Input to the encryption algorithm.
▪ Ciphertext: Scrambled message produced as output.
▪ Depends on the plaintext and the secret key
▪ Decryption algorithm: Encryption algorithm run in reverse.
▪ Uses ciphertext and the secret key to produce the origin
al plaintext
Cont…
Cont…
Caesar Cipher
Cont…
CAESAR Algorithm
Cont…
▪ Example
CAESAR’s Problem
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Cont…
▪ The keyword is monarchy.
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Cont…
▪ Provably unbreakable
▪ Why?
columns.
to the algorithm.
Cont…
▪ For example: key=4312567
Cont…
data.