Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views29 pages

Foundations of Modern Cryptography

Modern cryptography is essential for computer and communication security, relying on mathematical concepts like number theory and computational complexity. It includes symmetric and asymmetric key encryption methods, as well as product cryptosystems like DES and AES. Cryptanalysis, the study of breaking codes, involves various attack types such as ciphertext-only and known-plaintext attacks to identify vulnerabilities in encryption algorithms.

Uploaded by

cuteblackneega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views29 pages

Foundations of Modern Cryptography

Modern cryptography is essential for computer and communication security, relying on mathematical concepts like number theory and computational complexity. It includes symmetric and asymmetric key encryption methods, as well as product cryptosystems like DES and AES. Cryptanalysis, the study of breaking codes, involves various attack types such as ciphertext-only and known-plaintext attacks to identify vulnerabilities in encryption algorithms.

Uploaded by

cuteblackneega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Foundations of modern

cryptography
Modern cryptography is the cornerstone of computer and
communications security. Its foundation is based on various concepts of
mathematics such as number theory, computational- complexity
theory, and probability theory.
Foundations of
modern cryptography
• Perfect security
• Information Theory
• Product Cryptosystem
• Cryptanalysis.
Why this modern
cryptography ?
• key to advanced computer and communication security
• based on the ideas of maths
• Number theory +computational complexity thoery+probability

Types,
• Symmetric key encryption-RC4,AEC,DES,3DES
• Asymmetric key encryption -Diffie-hellman,RSA
Entropy mean that measurement
Product Cryptosystem
A product cryptosystem is a block cipher that repeatedly performs substitutions and
permutations, one after the other, to produce cipher text.
Example : DES and AES
Cryptanalysis
• Cryptanalysis is the science of cracking codes and decoding secrets. It is used to
violate authentication schemes, to break cryptographic protocols, and, more
benignly, to find and correct weaknesses in encryption algorithms

Among the types of attacks are:

• Ciphertext only attacks


• Known plaintext attacks
• Chosen plaintext attacks
• Chosen ciphertext attacks
• Man-in-the-middle attacks
• Side channel attacks
• Brute force attacks
• Birthday attacks
Type of Attack Known to Cryptanalyst
· Encryption algorithm
Cipher text Only · Cipher text

· Encryption algorithm
· Cipher text
Known Plaintext · One or more plaintext-cipher text pairs formed
with the secret key

· Encryption algorithm
· Cipher text
Chosen plaintext · Plaintext message chosen by cryptanalyst,
together with its corresponding cipher text
generated with the secret key

Chosen ciphertex  Encryption algorithm


Ciphertext only attacks:
• A ciphertext only attack (COA) is a case in which only the encrypted
message is available for attack, but because the language is known a
frequency analysis could be attempted.
Known Plaintext Attack
• In a known plaintext attack (KPA) both the plaintext and matching
ciphertext are available for use in discovering the key.
Chosen Plaintext Attack
• A chosen plaintext attack (CPA) occurs when the attacker gains access
to the target encryption device
Chosen Ciphertext Attack
• In a chosen ciphertext attack (CCA), the cryptanalyst can choose
different ciphertexts to be decrypted and has access to the decrypted
plaintext.

You might also like