Page 39 - DCAP516_COMPUTER_SECURITY
P. 39

Avinash Bhagat, Lovely Professional University
                                                                                             Unit 4: Cryptography




                                  Unit 4: Cryptography                                          Notes


            CONTENTS
            Objectives
            Introduction

            4.1  What is Cryptography
                 4.1.1  Substitution Ciphers
                 4.1.2  Transposition Ciphers

            4.2  Two Fundamental Cryptographic Principles
            4.3  Data Encryption Standard
            4.4  The AES Encryption Algorithm
            4.5  Public-Key Algorithms
            4.6  Uses of Encryption

            4.7  Summary
            4.8  Keywords
            4.9  Review Questions

            4.10 Further Readings
          Objectives


          After studying this unit, you will be able to:
               Familiarize with the concepts of cryptography
               Discuss the concept of substitution ciphers and transposition

               Understand the methodology of making good encryption algorithm
               Describe the concepts of AES and DES algorithms
               Know about the uses of encryption

          Introduction

          In pre-computer days, military, diplomats, diarists and lovers used the art of cryptography for
          hiding data or message from intruders. The message to be encrypted known as “plaintext”, are
          transformed by a function that is parametrized by “key”. The output of the encryption process,
          known as the ciphertext or cryptograph is then transmitted by some medium (messenger, radio
          or wire). Suppose, an intruder, hears and accurately copies the ciphertext. Unlike the intended
          recipient, he does not know the key and so cannot decrypt the ciphertext easily.
          Sometimes an active intruder can record message and modify message before they get to the
          intended recipient. The art of breaking ciphers is called cryptanalysis. The art of devising ciphers
          and breaking them is collectively known as ‘cryptology’. To achieve security the cryptographer
          should make sure that the system is unbreakable even if his opponent can encrypt arbitrary
          amount of plaintext.





                                           LOVELY PROFESSIONAL UNIVERSITY                                   33
   34   35   36   37   38   39   40   41   42   43   44