Lecture 5 - Class Notes September 23, 2008 Thursday: RSA...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Class Notes September 23, 2008 Thursday: RSA lab Cryptanalysis: 1. Cipher-text only attack (cryptanalyst has access only to cipher text) 2. Full or partial access to plain-text attack (or known plain-text attack) a. For example when the attacker has official release of document, and a suspected cipher-text, do the two match? 3. Cipher-text of any plain-text a. When the cryptanalyst has the ability to acquire the cipher-text for any desired plain- text message and compare the two (also called the chosen plain-text attack) 4. Attacker knows the algorithm and the cipher-text a. Encrypt several plaintext to find the one that matches the given cipher-text 5. Attacker has cipher-text and plain-text and wants to find the key Areas of Weaknesses: 1. Humans (make mistakes) 2. Hardware and Software implementation Today’s Algorithms: Until 90’s DES was used by the government. DES was developed in 1977 by IBM for use by the public. DES standardized encryption for parties that wanted to securely communicate. Called DEA and
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 2

Lecture 5 - Class Notes September 23, 2008 Thursday: RSA...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online