CCT275H5 Lecture Notes - Lecture 10: Ciphertext, Plaintext, Pretty Good Privacy

35 views5 pages
Tuesday, November 10, 2015
1
CCT275
Lecture 10
- CRYPTOGRAPHY
What is it good for?
1. Ensuring Privacy:
- Techniques to encrypt the contents of your message so that only the recipient can
read them
2. Ensure Authentication:
- Techniques to ensure that message shave not been altered en route; signatures
3. Ensure Anonymity/Pseudonymity:
- Techniques that hide or mask the route or origin of a message
>> I need all this information about you so that I can authenticate that
How it works?
>> Remember that digital data is numeric data; everything is a number in 1s and 0s
** Crypto: is using a key to alter a message so that it can only be recovered with
another key
ex.
** choose a really big number as the key
To encrypt, multiply the message (the plaintext) by that really big number.
>> This produced the Cipher-text
To decrypt, divide the cipher text by the really big number.
>> This leaves you with the original Plaintext.
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in
Tuesday, November 10, 2015
2
Why is this secure?
>> To break the encryption without knowing the key, you now have to factor the cipher-
text number and decide which factors are the key and the who are the message. This is
relatively difficult. Much more difficult, anyway, than just dividing, when you know the
key.
- Symmetric Key
>> Use the same key encrypts and decrypts message, as in above example
This is how crypto has worked for millennia
But, it requires secure way of sharing keys (ex. Codebooks)
- Asymmetric (Public Key)
The key pair
>> Generate mathematically related key pair such that:
( Anything encrypted with one ca be decrypted only with the other )
ex.
Generate PubK and PrivK s.t. (M^PrivK)^PubK = M
>> this also implies (M^PubK)^PrivK = M
(exponentiation is modulo exponentiation, exponentiation in clock arithmetic)
>> So any message that is encrypted with PubK can be decrypted with PrivK,
** Using Asymmetric Keys (Public Key Cryptography)
Publish PubK, Keep PrivK secret.
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Cryptography: what is it good for, ensuring privacy: Techniques to encrypt the contents of your message so that only the recipient can read them: ensure authentication: Techniques to ensure that message shave not been altered en route; (cid:1688)signatures(cid:1689: ensure anonymity/pseudonymity: Techniques that hide or mask the route or origin of a message. >> remember that digital data is numeric data; everything is a number in 1"s and 0"s. ** crypto: is using a (cid:1688)key(cid:1689) to alter a message so that it can only be recovered with another (cid:1688)key(cid:1689) ex. ** choose a really big number as the key. To encrypt, multiply the message (the (cid:1688)plaintext(cid:1689)) by that really big number. To decrypt, divide the cipher text by the really big number. >> this leaves you with the original plaintext. >> to break the encryption without knowing the key, you now have to factor the cipher- text number and decide which factors are the key and the who are the message.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents