L1_cyb312_24_25.2pdf
L1_cyb312_24_25.2pdf
Key References:
1. Understanding Cryptography_Christof Paar · Jan Pelzl
8 CA1
9 Cryptographic SSL, and VPN
protocols
10 Hash Functions
and MACs
11 Digital
Signature
Schemes and
Certificate
Authorities
12 Application of WLAN security requirements
Cryptography1 WEP and Attacks on WEP
WPA and WPA2
Cryptography for secure payment card transactions
Background to payment card services
Magnetic stripe cards EMV cards
Using EMV cards for internet transactions
Using EMV cards for authentication
Using EMV cards for mobile payments
Payment card key management
Payment card security issues Payment card cryptographic
design considerations
14 CA 2
15 Revision
Cryptology: This is the science that deals with hidden, disguised, or encrypted
communication. It covers the fields of cryptography and crptooanalysis. That is the scientific
study of hidden writing-- design, use and analysis. The diagram below shows an overview of
the field of cryptology.
Cryptography: This is from the Greek word Kryptos, which means hidden. Cryptography can
be defined as the science ( sometimes the art) of hiding information to keep them from being
accessed by unauthorized parties. It can be seen as the study of mathematical techniques for
keeping information secret over a communication channel or when stored in a system.
Cryptanalysis: is the science and sometimes art of breaking cryptosystems. That is, the
study of the different techniques or ways that can be used to defeat or unlock a
cryptographic system. It is the only way to assure that a cryptosystem is secure.
Encryption: This is the process of converting plain-text to cipher text. It can also be viewed
as the changing of a message from a readable format into another format that is not
readable except when decoded beck to its original format, using a function called a cipher.
Decryption: This is also known as deciphering. This is the process of converting a cipher text
back into a plain-text. It is the changing of an encoded message from its non readable format
back to the original readable message using cipher or message decoder.
Plaintext (or clear text): This is a message in its original readable format.
Cyphertext or cryptogram: this is the altered from of a plain-text that cannot be easily
read except after decryption or decoding.
Key or cryptotovariable: This is the input in the cipher or encoding function that controls
the operation of the cipher or encoder or cryptographic algorithm. It can be viewed as a key
that locks the message so it cannot be read. It is needed at the other end to unlock the
message so it can be read again.
Keyspace: This represents the set of all keys for a given cryptographic system. This is, the
total values of keys in a cryptographic algorithm.
I. e K={k1, k2,k3…}
Work factor: In cryptoanalysis, work factor is concerned with the effort and computer
resources it takes to defeat a Cryptogrophic system. It is a measure of how strong a
cryptographic system is. A system with a high work factor cannot be easily defeated while
one with a low work factor can be easily cracked.
Substitution: This is a process of exchanging one letter or byte of the plain-text or message
with another letter or byte to form the cipher text
Diffusion: This is carried out by mixing up the location of the plain-text throughout the
ciphertext.
Cipher or cryptographic algorithm : This is the code that transforms the plain-text into a
cipher text or cipher text back into a plain text . The cipher can be viewed as a mathematical
function used for encoding and decoding. In most cases two related functions are used at
both ends.
Classical Cryptanalysis: concerned with the scientific recovery of the plain-text x from the
cipher-text y, or, recovering the key k from the ciphertext y. it is divided into analytic and
brute force attacks.
Social Engineering Attacks: involves humans and societal systems were bribing,
blackmailing, tricking or classical espionage is used to obtain the secret key.
Kerckhoffs’ Principle :Sound systems should adhere to this principle. It states that a
cryptosystem should be secure even if the attacker knows all details about the system, with
the exception of the secret key. That is, the system should be secure though the attacker
knows the encryption and decryption algorithms.
From the diagram, the plain-text ( PT) is passed or inputted into a cipher. The key is added to
the PT and both are transformed into the coded message or cipher text (CT). The
communication channel transmits the CT to the receiving end where a related function
decodes the CT back into the original message using the same key.
An important feature of the symmetric system is that single key is used for the encoding and
decoding process. The key is transmitted in a secondary channel called an out- of- bound
channel. This can be by post or any secret means. One weakness of this system is with the
key. Once the key is discovered by a third party, the system is exposed. Examples of
symmetric is the Caesar cipher and Data encryption standard (DES)
From the diagram, the PT is inputted into the cipher or encoder, and the public key of the
planned receiver of the message is added to the message and encoded to create the CT. At
the other end of the cryptographic system of the transmission channel, the decoder
transforms the CT Back to the original message using the receiver’s private key as input to
the decoder.
One important problem with this system is that it is very slow. However its advantage over
the symmetric system is that key management is affective.
Symmetric Asymmetric
Uses a single private key Uses two keys. Private and public
The system, as above, can be considered as two fused systems. The symmetric system
basically is used to send the required message. The process for symmetric transfer and
encoding holds, except in this case, the out -of -bound channel is replaced by the asymmetric
system which is used to safely distribute the secret key for the symmetric system. Notice
that the secret key in the symmetric system is used as the message in the asymmetric part
of the Hybrid system, while the public key of the Asymmetric is used to encode it. At the other
end, the secret key (SK) is first decoded using the private key in the asymmetry half of the
system, and then the decoded SK can be used to unlock the main message PT, in the
symmetric half of the Hybrid system.
Encryption and Decryption modes /methods: there are basically two modes for encrypting
and decrypting messages. We have the stream-based and the block- based encoding and
decoding modes.
Stream-based Encrypting /Decryption modes
This is when a cryptographic system performs its encryption one bit at a time. A bit (short for
binary digit) is the smallest representation of data or information in a computer system and
it has a binary value of either o or I. The stream-based encryption is achieved by adding a bit
from a key stream to a bit from the plain-text.
The diagram below illustrates the above cryptographic mode of operation
And given that letter A in binary = 010000012 and the key stream to a stream –based cipher is
ks =k1.…kn = 001011002
Find the output of cipher when the letter A is passed through it.
Solution
A=x1…xn = 01000001
+
K1 = (K0…Kn) = 00101100
01101101
y1 = 01101101
Block- based Encryption Mode: in this encryption mode, the cipher text is encrypted in
blocks of bytes. The block length can be 128bits or 16 bytes, 64bits or 8bytes. Examples of
block ciphers are DES, AES etc