02 - Classical Cryptosystems Introduction Cryptography and...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Introduction Classical Cryptosystems Cryptography and Protocols Andrei Bulatov
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cryptography and Protocols - Classical Cryptosystems 2-2 Notation Alice Bob message Eve Protocol: (K, E, D) K – key generation algorithm E – encryption algorithm D – decryption algorithm Plaintext Ciphertext Key
Background image of page 2
Cryptography and Protocols - Classical Cryptosystems 1-3 Three Types of Cryptosystems Steganography `Security by obscurity’ Transposition cryptosystems: E permutes (transposes) the letters of plaintext D applies the converse transposition Example: Spartans Scytale
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1-4 Three Types of Cryptosystems (cntd) Substitution cryptosystems E substitutes each letter of the plaintext with another letter or symbol D applies the converse substitution Example: Caesar cipher He made messages secret by shifting each letter three letters forward. Thus we can replace letters by integers from 0 to 25. For Next, Then E adds 3 modulo 25 to every letter. To decrypt a message,
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 15

02 - Classical Cryptosystems Introduction Cryptography and...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online