Cryptography
Cryptography
Example:
Alice and Bob wish to perform some form of communication while Eve is an eavesdropper
who wishes to spy on or tamper with the communications between Alice and Bob.
Confidentiality
A message sent from Alice to Bob cannot be read by anyone else.
Authenticity
Bob knows that only Alice could have sent the message he has just received.
Integrity
Bob knows that the message from Alice has not been tampered with in transit.
Non-Repudiation
It is impossible for Alice to turn around later and say she did not send the message.
Model of Cryptography
Plaintext : Cleartext or original message
Ciphertext : Message in encrypted form
Cipher - Algorithm for transforming plaintext to ciphertext
Key - Info used in cipher known only to sender/receiver
Encryption : Process of converting Plaintext to ciphered text
Decryption : Process of converting ciphered to Plaintext text
Cryptosystem : System for encryption and decryption of information
Symmetric Cryptography : If the key is same for both encryption and decryption
Asymmetric Cryptography : If the key is not same for both encryption and decryption
Requirements
There are two requirements for secure use of conventional encryption that
mean we assume that it is impractical to decrypt a message on the basis of
the cipher- text plus knowledge of the encryption/decryption algorithm, and
hence do not need to keep the algorithm secret; rather we only need to keep
the key secret. This feature of symmetric encryption is what makes it feasible
for widespread use. It allows easy distribution of s/w and h/w implementations.
Mathematically have:
Y = E(K, X)
X = D(K, Y)
Where Xplaintext
Y ciphertext
Kkey
E encryption algorithm
D decryption algorithm
Symmetric Encryptionpri
It remains by far the most widely used of the two types of encryption.
All traditional schemes are symmetric / single key / private-key encryption algorithms, with a
single key, used for both encryption and decryption. Since both sender and receiver are
equivalent, either can encrypt or decrypt messages using that common key.
Cryptanalytic attack (knowledge): Relies on the nature of the algorithm plus perhaps
some knowledge of the general characteristics of the plaintext or even some sample plaintext-
ciphertext pairs. This type of attack exploits the characteristics of the algorithm to attempt to
deduce a specific plaintext or to deduce the key being used.
Brute-force attack (every possible key) : Try every possible key on a piece of
ciphertext until an intelligible translation into plaintext is obtained. On average, half of all
possible keys must be tried to achieve success.
If either type of attack succeeds in deducing the key, the effect is catastrophic: All future and past
messages encrypted with that key are compromised.
5. Man-in-the-middle attacks
Cryptographic communications and key exchange protocols are susceptible to an attack in which
the attacker is able to place himself on the communication line between two parties.
In this "man-in-the-middle attack" the attacker is able to position himself to intercept the key
exchange between two parties. He performs his own key exchange with each. Then, with both
parties thinking they have set up a secure channel, the attacker decrypts any communications
with the proper key, and encrypts them with the other key for sending to the other party. The
parties think that they are communicating securely, but in fact the adversary is reading everything.
Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption;
also called symmetric encryption. Primarily used for privacy and confidentiality.
Public Key Cryptography (PKC): Uses one key for encryption and another for decryption;
also called asymmetric encryption. Primarily used for authentication, non-repudiation, and
key exchange.