Foundations of modern
cryptography
Modern cryptography is the cornerstone of computer and
communications security. Its foundation is based on various concepts of
mathematics such as number theory, computational- complexity
theory, and probability theory.
Foundations of
modern cryptography
• Perfect security
• Information Theory
• Product Cryptosystem
• Cryptanalysis.
Why this modern
cryptography ?
• key to advanced computer and communication security
• based on the ideas of maths
• Number theory +computational complexity thoery+probability
Types,
• Symmetric key encryption-RC4,AEC,DES,3DES
• Asymmetric key encryption -Diffie-hellman,RSA
Entropy mean that measurement
Product Cryptosystem
A product cryptosystem is a block cipher that repeatedly performs substitutions and
permutations, one after the other, to produce cipher text.
Example : DES and AES
Cryptanalysis
• Cryptanalysis is the science of cracking codes and decoding secrets. It is used to
violate authentication schemes, to break cryptographic protocols, and, more
benignly, to find and correct weaknesses in encryption algorithms
Among the types of attacks are:
• Ciphertext only attacks
• Known plaintext attacks
• Chosen plaintext attacks
• Chosen ciphertext attacks
• Man-in-the-middle attacks
• Side channel attacks
• Brute force attacks
• Birthday attacks
Type of Attack Known to Cryptanalyst
· Encryption algorithm
Cipher text Only · Cipher text
· Encryption algorithm
· Cipher text
Known Plaintext · One or more plaintext-cipher text pairs formed
with the secret key
· Encryption algorithm
· Cipher text
Chosen plaintext · Plaintext message chosen by cryptanalyst,
together with its corresponding cipher text
generated with the secret key
Chosen ciphertex Encryption algorithm
Ciphertext only attacks:
• A ciphertext only attack (COA) is a case in which only the encrypted
message is available for attack, but because the language is known a
frequency analysis could be attempted.
Known Plaintext Attack
• In a known plaintext attack (KPA) both the plaintext and matching
ciphertext are available for use in discovering the key.
Chosen Plaintext Attack
• A chosen plaintext attack (CPA) occurs when the attacker gains access
to the target encryption device
Chosen Ciphertext Attack
• In a chosen ciphertext attack (CCA), the cryptanalyst can choose
different ciphertexts to be decrypted and has access to the decrypted
plaintext.