5 Cryptography - CET 4663 Cryptography part 2 Last Time We...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CET 4663 Cryptography part 2
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Last Time We covered a brief history of shared-key encryption At least up to modern times
Background image of page 2
Perfect Secrecy Is it achievable? Depends on how you define 'perfect' and 'secrecy' How about: An adversary, given an unlimited amount of time can learn nothing about the message from the ciphertext
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
One-Time Pad Achieves this definition of perfect secrecy No eavesdropper can ever determine the original message Ok – that's it – lecture over, right? What's the catch?
Background image of page 4
One-Time Pad Extremely difficult to use correctly Requires long key length Each key can only be used a single time Insecure against known-plaintext attacks But let's look at how it works
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
One-Time Pad Generate a string of random numbers as long as the message to be encrypted Combine the random numbers with the message XOR, modular or rotational arithmetic Now you have your ciphertext Why is this unbreakable?
Background image of page 6
One-Time Pad Assume we have Message : M Key : K Ciphertext : C, where C = M * K Let's just use numbers I tell you that C = 100 What is M?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
We could have the ciphertext “JEUAHCUWHFZDION”
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/24/2011 for the course CET 4663 taught by Professor Staff during the Fall '08 term at University of Central Florida.

Page1 / 23

5 Cryptography - CET 4663 Cryptography part 2 Last Time We...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online