0% found this document useful (0 votes)
11 views9 pages

Secure Communication

Uploaded by

vishnuelano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views9 pages

Secure Communication

Uploaded by

vishnuelano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Chapter One

Secure Communication

Secure Communication
In this subject, the requirement is to send the information
from one point to another without allowing anyone (called
third parity) to listen or change this information. The third
parity receives the signal, demodulates it but he can not
understand or change it’s content.
The titles if this subject include the names ‘cryptography’,
‘scrambling’, or ‘ciphering’
Cryptography (Ciphering)Cryptography is the science of using
mathematics to encrypt and decrypt data. I.e. cryptography is the
study of secret (crypto-) writing (-graphy) (cryptography comes
from Greek words crypto and graphy). Cryptography enables you
to store sensitive information or transmit it across insecure
channels or networks (like the Internet) so that it cannot be read
by anyone except the intended recipient. While cryptography is
the science of securing data, cryptanalysis is the science of
analyzing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical
reasoning, application of mathematical tools, pattern finding,
patience, determination, and luck. Cryptanalysts are also called
attackers.
How does cryptography work?
A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and
decryption process. A cryptographic algorithm works in combination with a key — a word,
number, or phrase to encrypt the plaintext. The same plaintext encrypts to different ciphertext
with different keys. The security of encrypted data is entirely dependent on two things: the
strength of the cryptographic algorithm and the secrecy of the key. A cryptographic algorithm,
plus all possible keys and all the protocols that make it work comprise a cryptosystem.

Figure 1: How does cryptography work?


Cryptographic Fundamentals

The basic fundamental of cryptography is to use transformation of data


intended to be ciphered such that these data becomes useless to the third
parity. This technique solves two major problems of data security.

Privacy Problem
Which is preventing the 3rd Parity from extracting information from the
communication channel
Authentication Problem
Which is preventing the 3rd Parity from injecting false information into the
channel or altering the messages so that their meaning is changed
Eavesdropper
Encryption Decryption
Tx E D Rx
P C P
Plaintext Ciphertext Plaintext
K (Key)

Figure 2: The flow of information in a cryptographic privacy system


Eavesdropper
Encryption Decryption
Tx E D Rx
P C 𝐂ത ഥ
𝐏
Plaintext Ciphertext Ciphertext Plaintext

K (Key)

Figure 3: The flow of information in a cryptographic authentication system


The Tx generates a plaintext P to transmit to the Rx over an insecure channel monitored by
an eavesdropper (3rd parity).
To prevent the eavesdropper from knowing the context of P, the Tx enciphers or encrypts P
with an invertible transformation 𝐒𝐤 to produce the ciphertext C = 𝐒𝐤 (P).
When friendly Rx receives C he can get P with the inverse transformation 𝐒𝐤 −𝟏 to obtain:
P = 𝐒𝐤 −𝟏 (C) = 𝐒𝐤 −𝟏 (𝐒𝐤 (P)).
The transformation Sk is chosen from the family of transformations known as cryptographic
system.
The parameters that select the individual transformation is called the specific key or the key
In another meaning
C = 𝐄𝐤 (P), E = encryption
P = 𝐄𝐤 −𝟏 (C) = 𝐃𝐤 (C) = 𝐄𝐤 −𝟏 (𝐄𝐤 (P)) = P, D = decryption
Chapter One Basic Terminologies

Plaintext - the original message


Ciphertext - the coded message or the encrypted message
Enciphering or Encryption - the process of converting plaintext into ciphertext
using key
Deciphering or Decryption - recovering plaintext from the ciphertext using key
Encryption algorithm - performs encryption, two inputs: a plaintext and a secret
key
Decryption algorithm - performs decryption, two inputs: ciphertext and secret
key
Secret key - information used in encryption/decryption,
and known only to legitimate sender/receiver
Cipher or cryptographic system - a scheme for encryption
and decryption
Cryptography - science of studying ciphers or study of
encryption principles/methods/designs
Cryptanalysis - science of studying attacks against
cryptographic systems, Or called (code breaking) - the study
of principles/ methods of deciphering Ciphertext without
knowing key
Cryptanalyst - in which the 3rd parity that tries to know the
plaintext (P) from the Ciphertext (C) without having the Key
(K)
Cryptology - cryptography + cryptanalysis

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy