Presentation is loading. Please wait.

Presentation is loading. Please wait.

Symmetric Encryption or conventional / private-key / single-key

Similar presentations


Presentation on theme: "Symmetric Encryption or conventional / private-key / single-key"— Presentation transcript:

1 Symmetric Encryption or conventional / private-key / single-key
ender and recipient share a common key all classical encryption algorithms are private-key was only type prior to invention of public-key in 1970’s

2 The General Idea of Symmetric-Key Cryptography

3 Classic ciphers substitution ciphers
monoalphabetic ciphers polyalphabetic ciphers transposition (permutation) ciphers product ciphers using both substitution, and transposition

4 Classical Cryptography
Monoalphabetic Ciphers Once a key is chosen, each alphabetic character of a plaintext is mapped onto a unique alphabetic character of a ciphertext. The Shift Cipher (Caesar Cipher) The Substitution Cipher The Affine Cipher

5 Classical Cryptography
Polyalphabetic Ciphers Each alphabetic character of a plaintext can be mapped onto m alphabetic characters of a ciphertext. Usually m is related to the encryption key. The Vigenère Cipher The Hill Cipher The Permutation Cipher

6 Benefits of Cryptography
Offers individual privacy and confidentiality. In some circumstances also authentication and non-repudiation (e.g. legal ‘signatures’) Especially important in explicitly Authorization .

7 Cryptanalysis Is the science and study of methods of breaking ciphers. A cipher is breakable if it is possible to determine the plaintext or key from the Cipher text or to determine the key from both plaintext and Cipher text

8 cryptanalysis

9 Types of Cryptanalysis attacks
1. Ciphertext-only attack:- The cryptanalyst has the cipher text of several messages, all of which have been encrypted using the same encryption algorithm, the cryptanalyst job is to recover the plain text of many message as possible, or better yet to deduce the key (or keys) used to encrypt the message. In order to decrypt other message encrypted with the same keys.

10 Ciphertext-only attack

11 Types of Cryptanalysis attacks
2. Known-plaintext attack The cryptanalyst (attacker) has access not only to the cipher text of several message, but also to the plain text of those message. His job is to deduce the key (or keys) used to encrypt the message or an algorithm to decrypt any new message encrypted with the same key, (or keys).

12 Known-plaintext attack


Download ppt "Symmetric Encryption or conventional / private-key / single-key"

Similar presentations


Ads by Google