1.Introduction

1.Introduction - 1 Introduction Reading assignment Chapter 1 of Katz& Lindell Cryptography Merriam-Webster Online Dictionary 1 secret writing 2

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 Introduction Reading assignment: Chapter 1 of Katz & Lindell Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering of messages in secret code or cipher. Scientific study of techniques for securing digital information, transactions, and distributed computations. 2 3 Computational Difficulty (One-Way Functions) Pseudorandom Generators And Functions Zero-Knowledge Proof Systems Encryption Schemes Crypto Protocols Sign/MAC Schemes APPLICATIONS A Structural View of Cryptography 4 Basic objectives of cryptography Protecting data privacy Data integrity (message authentication): allowing the recipient to check if a received message has been modified. Authentication: Data origin authentication: allowing the recipient to verify the origin of a received message. Entity authentication: allowing the entities of a (connection- oriented) communication to authenticate each other. Non-repudiation: to prevent the sender from later denying that he sent the message. 5 Main Characters Alice Bob Peggy (prover) Vic (verifier) Eve or Oscar (eavesdropper, opponent) 6 Bob Alice Eve 7 m c E D Bob Alice m key key’ Encryption and secrecy Plaintext ciphertext plaintext 8 Encryption and secrecy Encryption protects secrecy of transmitted messages Encryption E k : plaintext m → ciphertext c Decryption D k’ : ciphertext c → plaintext m Encryption key: Decryption key: equal or not equal k k ′ 9 Symmetric-key encryption Also called secret-key or private-key encryption Encryption key = decryption key D(k, E(k,m)) = m Or, D k (E k (m)) = m 10 Example: Caesar’s shift cipher Plaintexts m English characters...
View Full Document

This note was uploaded on 01/22/2011 for the course CSE 794 taught by Professor Tenh.lai during the Spring '10 term at Ohio State.

Page1 / 34

1.Introduction - 1 Introduction Reading assignment Chapter 1 of Katz& Lindell Cryptography Merriam-Webster Online Dictionary 1 secret writing 2

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online