Please enable JavaScript.
Coggle requires JavaScript to display documents.
Concepts of Cryptography (Encryption (:lock: Process of transforming…
Concepts of Cryptography
Cryptography
:pencil2: Protecting information and communications through the use of codes so that only those for whom the information is intended can read and process Link Detail
-
Cryptographic
:pencil2: Use for important task such as data encryption, authentication, and digital signatures.
Cryptanalysis
:pencil2: Investigation of systems, ciphertext, and ciphers in order to reveal the hidden meaning or details of the system itself.
-
Type
Caesar Cipher :pencil2: shift cipher / Caesar's code /Caesar shift: simplest and most widely known encryption techniques :pencil2: each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet Link image
Text Characterization :unlock: :pencil2: find the key to solving a certain text. :pencil2: Technique used counting frequency, identifying patterns, and using CRANK :pencil2: complicated method is called Quad-gram Statistics Link text
-
Asymmetric key
:lock: Pair public key+ private key to encrypt and decrypt a message and protect it from unauthorized access or use
-
Hash function
-
:pencil2: Combines message-passing capabilities of hash functions with security Link Detail
-
Block cipher
:pencil2: Encryption method applies an algorithm with symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers.
Stream cipher
:lock: Symmetric key cipher, plaintext digits+ pseudorandom cipher digit stream (keystream) Link Detail
Confidentiality
:pencil2: Nobody in between site A and B is able to read what data or information is sent between the to sites
Data integrity
:pencil2: Information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected
Authentication
:pencil2: The sender and receiver can confirm each other's identity and the origin/destination of the information
-
Cryptosystems
:star: Consists of three algorithms: key generation, encryption, and decryption.
-
-
Substitution function
:pencil2: Substituting every plaintext character for a different ciphertext character. Detail
Encryption
:lock: Process of transforming information so it is unintelligible to anyone but the intended recipient
-
-
Symmetric key
-
-
-
Iterated block ciphers
:lock: Encrypts a plaintext block, process has several rounds Detail
:lock: Sub keys are usually derived from the user-provided secret key by a key schedule.
Non-repudiation
:pencil2: Creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information
-