Chapter 30 Cryptography

Let us introduce the issues involved in cryptography. First, we need to define some terms; then we give some taxonomies. | Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 30. 30-1 INTRODUCTION Let us introduce the issues involved in cryptography. First, we need to define some terms; then we give some taxonomies. Definitions Two Categories Topics discussed in this section: 30. Figure Cryptography components 30. Figure Categories of cryptography 30. Figure Symmetric-key cryptography 30. In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note 30. Figure Asymmetric-key cryptography 30. Figure Keys used in cryptography 30. Figure Comparison between two categories of cryptography 30. 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed to exchange secrets (for example, in a war). We still mainly use symmetric-key cryptography in our . | Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 30. 30-1 INTRODUCTION Let us introduce the issues involved in cryptography. First, we need to define some terms; then we give some taxonomies. Definitions Two Categories Topics discussed in this section: 30. Figure Cryptography components 30. Figure Categories of cryptography 30. Figure Symmetric-key cryptography 30. In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note 30. Figure Asymmetric-key cryptography 30. Figure Keys used in cryptography 30. Figure Comparison between two categories of cryptography 30. 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed to exchange secrets (for example, in a war). We still mainly use symmetric-key cryptography in our network security. Traditional Ciphers Simple Modern Ciphers Modern Round Ciphers Mode of Operation Topics discussed in this section: 30. Figure Traditional ciphers 30. A substitution cipher replaces one symbol with another. Note 30. The following shows a plaintext and its corresponding ciphertext. Is the cipher monoalphabetic? Example Solution The cipher is probably monoalphabetic because both occurrences of L’s are encrypted as O’s. 30. The following shows a plaintext and its corresponding ciphertext. Is the cipher monoalphabetic? Example Solution The cipher is not monoalphabetic because each occurrence of L is encrypted by a different character. The first L is encrypted as N; the second as Z. 30. The shift cipher is sometimes referred to as the Caesar cipher. Note 30. Use the shift cipher with key = 15 to encrypt the message “HELLO.” Solution We encrypt one character at a time. Each character is shifted 15 characters down. Letter H is encrypted to W.

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.