CS458 Lecture Notes - Public-Key Cryptography, Checksum, Symmetric-Key Algorithm

99 views7 pages

Document Summary

1- confidentiality: prevent eve from reading alice"s messages. 2- integrity: prevent mallory from modifying alice"s messages. Kerckhoffs" principle : the security of a cryptosystem should not rely on a secret that"s hard ( or expensive ) to change. A strong cryptosystem is one where the most eve can do is try all the keys used to specify which encryption method was used ( computation security ) Goal of cryptography is to make sure the information transfer is not the weakest link ( send secure messages over an insecure medium ) Simplest and used for years , but hard part is exchanging keys. Unbreakable, simple idea, hard to use correctly , information-theoretic security. Description: the key is random bitstring of the same length as the message, the encrypt and decrypt functions are just xor. Note: key must be truly random not pseudorandom, key must never be used more than once.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents

Related Questions