Lecture 10: Cryptography
This famous photograph of US POWs in North Korea is an example of something that bears a hidden meaning to those with secret (or at least not-ubiquitous) knowledge. This photo was staged to show how happy captured US sailors were supposed to be in their new homes, but there is a hidden digital message...
* Not all cryptograhic operations require a key, but we'll start with those that do.
This famous photograph of US POWs in North Korea is an example of something that bears a hidden meaning to those with secret (or at least not-ubiquitous) knowledge. This photo was staged to show how happy captured US sailors were supposed to be in their new homes, but there is a hidden digital message...
Confidentiality | |
Integrity | |
Availability | |
Authentication | |
Authorization | |
Accountability |
Confidentiality | Encryption |
Integrity | MACs, signatures |
Authentication | Password hashing |
Cryptography is a useful mechanism that can be part of a solution that achieves security goals.
Confidentiality | Encryption |
Integrity | MACs, signatures |
Authentication | Password hashing |
Cryptography is a useful mechanism that can be part of a solution that achieves security goals.
Confidentiality | Encryption |
Integrity | MACs, signatures |
Authentication | Password hashing |
Cryptography is a useful mechanism that can be part of a solution that achieves security goals.
If you think cryptography is the answer to your problem, then you don't know what your problem is.
Cryptography doesn't solve problems by itself. Encrypting a network packet doesn't secure the hosts doing the communication. Putting a contract on a blockchain won't stop people from breaking their word. A secure system is much more than just cryptography. However, cryptography is an important part of most secure systems.
Classical cryptography refers to everything from the classical era (hence the Greek name!) up to the 20th Century. Modern cryptography is based on mathematical problems like the discrete logarithm problem — we'll talk about such things we get to public-key cryptography. In between, there's some awkwardness where different experts may disagree on definitions. Modern block ciphers aren't modern enough for some people, but they're definititely not classical either.
I would suggest that you think of classical cryptography as cryptography before computers (very broadly defined) and modern cryptography as cryptography based on math problems and applied computer science. However, don't be surprised if you encounter someone who doesn't think that definition is "pure" enough. 😉
Classical cryptography refers to everything from the classical era (hence the Greek name!) up to the 20th Century. Modern cryptography is based on mathematical problems like the discrete logarithm problem — we'll talk about such things we get to public-key cryptography. In between, there's some awkwardness where different experts may disagree on definitions. Modern block ciphers aren't modern enough for some people, but they're definititely not classical either.
I would suggest that you think of classical cryptography as cryptography before computers (very broadly defined) and modern cryptography as cryptography based on math problems and applied computer science. However, don't be surprised if you encounter someone who doesn't think that definition is "pure" enough. 😉
Classical cryptography refers to everything from the classical era (hence the Greek name!) up to the 20th Century. Modern cryptography is based on mathematical problems like the discrete logarithm problem — we'll talk about such things we get to public-key cryptography. In between, there's some awkwardness where different experts may disagree on definitions. Modern block ciphers aren't modern enough for some people, but they're definititely not classical either.
I would suggest that you think of classical cryptography as cryptography before computers (very broadly defined) and modern cryptography as cryptography based on math problems and applied computer science. However, don't be surprised if you encounter someone who doesn't think that definition is "pure" enough. 😉
If you don't know the key to such a transposition cipher, what might you try in order to find it?
It might seem unlikely that an attacker would have access to all details of the system, plus plaintext and ciphertext pairs, but it's actually not. In WWII, British codebreaking was sometimes aided by feeding specific plaintexts to the German enemy via a process called "gardening") (laying sea mines in specific locations to create minesweeping messages).
- The system must be practically, if not mathematically, indecipherable;
- It should not require secrecy, and it should not be a problem if it falls into enemy hands;
- It must be possible to communicate and remember the key without using written notes, and correspondents must be able to change or modify it at will; [...]
Translation from the French from Wikipedia
Kerchoffs had six principles, including that "it must be applicable to telegraph communications", but we're less interested in those. One key principle that we are still interested in is the second one: the security of a system should not depend on the adversary being ignorant of its details. This is commonly mis-stated as, "the design should be public", but that's not quite what Kerchoffs said. Rather, the principle is that your security shouldn't depend on the design being secret.
In a ciphertext-only attack, the adversary can break your cryptosystem using nothing but ciphertext. This is the strongest form of attack, so to say that a cryptosystem can withstand it don't impress me much.
In a ciphertext-only attack, the adversary can break your cryptosystem using nothing but ciphertext. This is the strongest form of attack, so to say that a cryptosystem can withstand it don't impress me much.
In a known-plaintext attack, the adversary is assumed to have access to plaintext/ciphertext pairs.
In a ciphertext-only attack, the adversary can break your cryptosystem using nothing but ciphertext. This is the strongest form of attack, so to say that a cryptosystem can withstand it don't impress me much.
In a known-plaintext attack, the adversary is assumed to have access to plaintext/ciphertext pairs.
In a chosen-plaintext attack, the adversary is assumed to be able to make you encrypt plaintexts of their choosing (like "gardening" in WWII, but much more direct / less costly).
In a ciphertext-only attack, the adversary can break your cryptosystem using nothing but ciphertext. This is the strongest form of attack, so to say that a cryptosystem can withstand it don't impress me much.
In a known-plaintext attack, the adversary is assumed to have access to plaintext/ciphertext pairs.
In a chosen-plaintext attack, the adversary is assumed to be able to make you encrypt plaintexts of their choosing (like "gardening" in WWII, but much more direct / less costly).
Finally, in a chosen-ciphertext attack, the adversary is assumed to be able to make you decrypt ciphertexts they give you.
hijstcih hdbtixbth tcrdst pcs strdst bthhpvth
The End.
Keyboard shortcuts
↑, ←, Pg Up, k | Go to previous slide |
↓, →, Pg Dn, Space, j | Go to next slide |
Home | Go to first slide |
End | Go to last slide |
Number + Return | Go to specific slide |
b / m / f | Toggle blackout / mirrored / fullscreen mode |
c | Clone slideshow |
p | Toggle presenter mode |
t | Restart the presentation timer |
?, h | Toggle this help |
Esc | Back to slideshow |