Cryptography: Study of mathematical techniques for information security services.
Purpose: Creating secrets.
Cryptanalysis: Study methods to defeat security services.
Purpose: Breaking secrets.
Cryptology: Combined study of cryptography and cryptanalysis.
Plaintext: Original message before encryption.
Ciphertext: Encrypted message that is unreadable to unauthorized users.
Encryption: Process of converting plaintext to ciphertext.
Decryption: Process of converting ciphertext back to plaintext.
Encryption Key: Key used to encrypt plaintext.
Decryption Key: Key used to decrypt ciphertext.
Confidentiality: Protection against unauthorized interception.
Integrity: Assurance that data is unaltered without authorization.
Authenticity: Verification of the true source of data.
Non-repudiation: Prevents denial of authorship.
Pseudo-random number generation: Critical for randomness in cryptographic processes.
Anonymity: Protects identities of individuals engaging in transactions.
E-voting: Secure electronic voting systems.
Secret sharing: Distributing a secret among multiple parties.
Zero-knowledge proof: Proving possession of knowledge without revealing it.
Secure multi-party computation: Multiple parties compute a function while keeping their inputs private.
Homomorphic encryption: Computation performed on encrypted data without decryption.
Enable parties to achieve security goals against adversaries.
Important considerations in protocols:
Identify parties and their context.
Define security goals of the protocol.
Understand capabilities of potential adversaries.
Passive attackers: Only observe, threatening confidentiality.
Active attackers: Can modify or delete messages, threatening confidentiality, integrity, and authenticity.
Kerckhoffs's Principle: The security of a cryptosystem should remain even if everything besides the key is public knowledge.
Shannon’s Maxim: The enemy knows the system—no security through obscurity.
Chosen-plaintext attack: Attacker chooses messages to discover corresponding ciphertexts.
Chosen-ciphertext attack: Attacker chooses ciphertexts to reveal corresponding plaintexts.
Attacks may be adaptive, influenced by previous results.
Computationally bounded adversaries: Finite computational resources, cannot utilize quantum computations.
Overview of cryptography and cryptanalysis throughout history.
Steganography: Hides existence; secrecy relies on the method.
Cryptography: Hides meaning; relies on secrecy of the key, not the method.
A simple symmetric substitution cipher using a key (number k).
To Encrypt: Shift letters by k positions.
To Decrypt: Shift letters back by k positions.
Example: SHIFTS with K = 3.
Brute-force attack: Testing all 25 keys.
Key space needs sufficient size for security—too few keys will weaken encryption.
Replaces each letter using a permutation.
Key: The specific permutation applied to each letter.
Key space consists of all possible permutations
Example: For English, the space is 26! (about 4 x 10^26).
Dominated cryptography for centuries.
Exhaustive search is infeasible (26! number of keys).
Utilizes frequency analysis.
Based on the observation of common letter patterns and combinations in human languages.
Recommendations based on frequency analysis:
Use larger blocks instead of small data bits.
Implement polyalphabetic substitution and stream ciphers to combat frequency analysis.
Improvement on monoalphabetic substitution ciphers.
Uses a key that shifts letters according to a repeating pattern.
Example of encryption process shown with plaintext and ciphertext transformations.
A 26x26 table visualizing multiple letters corresponding to ciphertext letters.
Involves examining shifts and periodic nature of the cipher.
Kasisky Test: Identifying key length through repeated patterns.
Examining repeating patterns in the ciphertext to derive potential key length.
Division of ciphertext and application of frequency analysis based on guessed key length.
A modern encryption method resolving vulnerabilities in previous ciphers.
Involves using long, random keys for encryption equal to the length of the plaintext.
Ensures perfect secrecy; ciphertext gives no information about plaintext.
Discussing scenarios that might lead to compromising OTP methods.
Discussion surrounding practical OTP use, key distribution, and security challenges.
Reiterates conditions for OTP integrity and challenges surrounding key usage.
Overview of symmetric key cryptography.
Involves algorithms using the same key for both encryption and decryption.
Historic and modern examples provided.
Illustrated model demonstrating plaintext, encryption, and decryption.
Larger unit transformations enhance security against frequency analysis.
Lists popular algorithms with respective plaintext and key sizes.
Explains Data Encryption Standard and its vulnerabilities over time.
Highlights development and characteristics of Advanced Encryption Standard.
Notable efficiency in software/hardware; showcases resilience against attacks.
Examines average search times for various key sizes and algorithms and their security implications.
Necessity of encryption modes for managing longer messages beyond single blocks.
Discusses weaknesses in ECB mode, notably redundancy and predictability.
Introduces Cipher Block Chaining with initial vector randomness.
Strategies and best practices for implementing CBC effectively.
Highlights challenges in achieving perfect security in practice.
Overview of the security demonstration and property evaluation.
Comparison of classical and modern algorithms' maximal adversarial probabilities of decrypting.
Overview of asymmetric cryptography and its unique features compared to symmetric methods.
Discusses key distribution vulnerabilities and their implications in unsecured online environments.
Discusses RSA's relevance and method of operation.
Illustrates procedures of RSA encryption including prime selection and public key formulation.
Explanation of mathematical operations and relations between plaintext and ciphertext.
Notes on historical vulnerabilities and future expectations regarding key sizes.
Discusses difficulties associated with securely managing encrypted communications.
Utilization of cryptographic principles to ensure identity verification in communications.
Overview of cryptographic hash functions, their significance and essential properties.
Discusses the evolution and competitive selection process for recent cryptographic hashing standards.
Describes roles and functions of certification authorities in establishing secure communications.
Overview of trusted CA's roles, their verification processes, and potential issues in trust dynamics.
Discusses the role of TLS in securing communications and its implementation procedures.
Steps needed to acquire and manage valid digital certificates for web security.
Describes mechanisms for certificate revocation and the importance of timely revocation processes.
Addresses ongoing issues in revocation methods and proposes improvements for efficacy.