Secure Communication
Secure Communication
Secure Communication
Secure Communication
In this subject, the requirement is to send the information
from one point to another without allowing anyone (called
third parity) to listen or change this information. The third
parity receives the signal, demodulates it but he can not
understand or change it’s content.
The titles if this subject include the names ‘cryptography’,
‘scrambling’, or ‘ciphering’
Cryptography (Ciphering)Cryptography is the science of using
mathematics to encrypt and decrypt data. I.e. cryptography is the
study of secret (crypto-) writing (-graphy) (cryptography comes
from Greek words crypto and graphy). Cryptography enables you
to store sensitive information or transmit it across insecure
channels or networks (like the Internet) so that it cannot be read
by anyone except the intended recipient. While cryptography is
the science of securing data, cryptanalysis is the science of
analyzing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical
reasoning, application of mathematical tools, pattern finding,
patience, determination, and luck. Cryptanalysts are also called
attackers.
How does cryptography work?
A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and
decryption process. A cryptographic algorithm works in combination with a key — a word,
number, or phrase to encrypt the plaintext. The same plaintext encrypts to different ciphertext
with different keys. The security of encrypted data is entirely dependent on two things: the
strength of the cryptographic algorithm and the secrecy of the key. A cryptographic algorithm,
plus all possible keys and all the protocols that make it work comprise a cryptosystem.
Privacy Problem
Which is preventing the 3rd Parity from extracting information from the
communication channel
Authentication Problem
Which is preventing the 3rd Parity from injecting false information into the
channel or altering the messages so that their meaning is changed
Eavesdropper
Encryption Decryption
Tx E D Rx
P C P
Plaintext Ciphertext Plaintext
K (Key)
K (Key)