L7 Comp1806 2024
L7 Comp1806 2024
Dr Sakshyam Panda
Centre for Sustainable Cyber Security
s.panda@greenwich.ac.uk
Alice Bob
channel data, control
messages
Eve
COMP1806: Information Security 9
The language of cryptography
Alice’s Bob’s
K encryption K decryption
A
key B key
P encrypt C decrypt P
K K
COMP1806: Information Security 13
Basics
◉ Notation
➢ Secret key K
◉ Consistency
➢ Decrypting the ciphertext yields the plaintext
➢ DK(EK(P)) = P
Key
1. Host sends packet requesting connection. distribution
2. Security service buffers packet; asks center
KDC for session key.
3. KDC distributes session key to both hosts.
4. Buffered packet transmitted.
Application Application
2
1
Security Security
service service
4
HOST HOST
Network
collection of ciphertexts
(a) Don’t
a) invite
Eve to key
(ciphertext only attack)
the
party!
Love,
Alice Eve
b) collection of plaintext/ciphertext Plaintext Encryption Ciphertext
Hi, Algorithm
pairs (known plaintext attack) (b)
Bob.
Don’t
invite
key
c) collection of plaintext/ciphertext Eve to
the
party!
Eve
Eve
◉ Example: “HELLOWORLD”
HLOOL
ELWRD
ciphertext: HLOOLELWRD
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Plain text: I a t t a c k
Key: 2342342 (key is “234”)
Cipher text: K d x v d g m
◉ In a block cipher:
➢ Plaintext and ciphertext have fixed length b (e.g., 128 bits)
➢ A plaintext of length n is partitioned into a sequence of m
blocks, P[0], …, P[m-1], where n = bm
◉ Each message is divided into a sequence of blocks and
encrypted or decrypted in terms of its blocks.
Requires padding
with extra bits.
Plaintext
Blocks of
plaintext
25
Thank You