Cryptography and Cryptanalysis

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

SWE3002 Information and Systems

Security
Prof. Selva Rani B
Module-II
Elementary Cryptography
Cryptography and Cryptanalysis-Definitions
 Plain Text
 An original message
 Cipher Text
 The coded message
 Enciphering/encryption
 The process of converting from plaintext to ciphertext
 Deciphering/decryption
 Restoring the plaintext from the ciphertext
 Cryptography
 The area of study of the many schemes used for encryption
Cryptography and Cryptanalysis-Definitions
 Cryptographic system/cipher
 A scheme
 Cryptanalysis
 Techniques used for deciphering a message without any knowledge
of the enciphering details
 Cryptology
 The areas of cryptography and cryptanalysis
Model of Symmetric Encryption
Symmetric Crypto System
Cryptographic Systems
 Characterized along three independent dimensions:
 The type of operations used for transforming plaintext to
ciphertext
 Substitution
 Transposition
 The number of keys used
 Symmetric, single-key, secret-key, conventional encryption
 Asymmetric, two-key, or public-key encryption
 The way in which the plaintext is processed
 Block cipher
 Stream cipher
Cryptanalysis and Brute-Force Attack
 Cryptanalysis
 Attack relies on the nature of the algorithm plus some knowledge
of the general characteristics of the plaintext
 Attack exploits the characteristics of the algorithm to attempt to
deduce a specific plaintext or to deduce the key being used
 Brute-Force Attack
 Attacker tries every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained
 On average, half of all possible keys must be tried to achieve
success
Types of Attacks
Type of Attack Known to Cryptanalyst
Ciphertext Only • Encryption algorithm
• Ciphertext
Known Plaintext • Encryption algorithm
• Ciphertext
• One or more plaintext-ciphertext pairs formed with the Secret
key
Chosen Plaintext Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
Chosen Ciphertext Encryption algorithm
• Ciphertext
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the Secret
key
Chosen Text • Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the secret
key
Brute-Force Attack
 Involves trying every possible key until an intelligible
translation of the ciphertext into plaintext is obtained
 On average, half of all possible keys must be tried to
achieve success
 To supplement the brute-force approach, some
degree of knowledge about the expected plaintext is
needed, and some means of automatically
distinguishing plaintext from garble is also needed

You might also like