IS364 - Lecture 09 - Symmetric Encryption
IS364 - Lecture 09 - Symmetric Encryption
Algorithms
Contents
History
Conventional Encryption
Hash Function
History
Caesar Cipher
plain: abcdefghijklmnopqrstuvwxyz
key: defghijklmnopqrstuvwxyzabc
“Rail-Fence” Cipher
DISGRUNTLED EMPLOYEE
D R L E O
I G U T E M L Y E
S N D P E
DRLEOIGUTE MLYESNDPE
History
Encryption Methods
The essential technology underlying
virtually all automated network and
computer security applications is
cryptography
Two fundamental approaches are in
use:
Conventional Encryption, also known as
symmetric encryption
Public-key Encryption, also known as
asymmetric encryption
Conventional
Encryption Model
Conventional
Encryption
The only form of encryption prior to late
1970s
Long history
Most widely used
Conventional
Encryption
Five components to the algorithm
Plaintext: The original message or data
Encryption algorithm: Performs various
substitutions and transformations on the
plaintext
Secret key: Input to the encryption algorithm.
Substitutions and transformations performed
depend on this key
Ciphertext: Scrambled message produced as
output. depends on the plaintext and the secret
key
Decryption algorithm: Encryption algorithm
run in reverse. Uses ciphertext and the secret
key to produce the original plaintext
Conventional
Encryption
More rigorous definition
Five components to the algorithm
A Plaintext message space, M
A family of enciphering transformations, EK:M →
C, where K∈K
A key space, K
A ciphertext message space, C
A family of deciphering transformations, DK: C →
M, where K∈K
Conventional
Encryption
M EK C DK M
1. Decryption of monoalphabetic
substitution ciphers by using frequency
analysis
2. Double DES encryption