Chapter 2: Cryptology Overviews: NT219-Cryptography
Chapter 2: Cryptology Overviews: NT219-Cryptography
Why? How?
Authentication Availability
Integrity Privacy
“Hard” to compute
“One-way function”
“Readable data” “Unreadable data”
Plaintext Ciphertext
Easy to compute
https://emn178.github.io/online-tools/sha3_512.html
Decryption
Hard if user don’t know some special values
Easy if user know the special values (secret values)
https://codebeautify.org/encrypt-decrypt
https://www.cryptool.org/en/cto/aes-step-by-step
09-2020 NT133–System architecture security Chapter 2: 8
What is cryptograph?
Digital signature systems
Message Signature
HMAC, Signature
Secret values
= secret keys
Cipher Authentication
Plaintext
An original message
Ciphertext
The coded message
Enciphering/encryption
The process of converting from plaintext to
ciphertext
Deciphering/decryption
Restoring the plaintext from the ciphertext
Cryptanalysis
Attack relies on the nature of the algorithm plus some
knowledge of the general characteristics of the plaintext
Attack exploits the characteristics of the algorithm to
attempt to deduce a specific plaintext or to deduce the
key being used
Brute-force attack
Attacker tries every possible key on a piece of
ciphertext until an intelligible translation into plaintext is
obtained
On average, half of all possible keys must be tried to
achieve success
Substitution Technique
(1) Caesar Cipher
Simplest and earliest known use of a substitution cipher
Used by Julius Caesar
Key
Need large
number
of keys!
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA
Even this scheme is vulnerable to cryptanalysis
Because the key and the plaintext share the same
frequency distribution of letters, a statistical technique
can be applied