Terminology

  • Cryptosystem
  • A system that describes how to encrypt or decrypt messages
  • Plaintext
  • Message in its original form
  • Ciphertext
  • Message in its encrypted form
  • Cryptographer
  • Invents encryption algorithms
  • Cryptanalyst
  • Breaks encryption algorithms or implementations
Cryptography CSE 365 – Information Assurance代写

Security Benefits of Cryptography
• Confidentiality
• Integrity
• Authentication (as we will see)
• Non-repudiation

Cryptosystem

  • Quintuple $(\mathcal{E}, \mathcal{D}, \mathcal{M}, \mathcal{K}, C)$
    $-\mathcal{M}$ set of plaintexts
  • $\mathcal{K}$ set of keys
  • $C$ set of ciphertexts
    $-\mathcal{E}$ set of encryption functions e: $\mathcal{M} \times \mathcal{K} \rightarrow C$
    $-\mathcal{D}$ set of decryption functions $d: C \times \mathcal{K} \rightarrow \mathcal{M}$

Attacks

  • Adversary is the person who wants to break the cryptosystem
  • Assume adversary knowns the algorithm used, but not the key
  • Is this a realistic assumption?
  • Adversary capabilities
  • ciphertext only
  • known plaintext
  • chosen plaintext

Basis for Attacks

  • Mathematical attacks
  • Finding flaws by analyzing the underlying mathematics of the cryptosystem
  • Statistical attacks
  • Make assumptions based on the underlying language
  • Examine ciphertext, correlate properties with the assumptions
  • Implementation attacks
  • Implementation of cryptosystem introduces a flaw that is not in the mathematics of the cryptosystem

Classical Cryptography

  • Sender and receiver share common key
  • Keys may be the same, or trivial to derive from one another
  • Called symmetric cryptography
  • Two basic types
  • Substitution ciphers
  • Transposition ciphers
  • Combinations are called product ciphers

Substitution Ciphers

  • Change characters in plaintext to produce ciphertext
  • Ceasar cipher
  • HELLO WORLD
  • Change each letter to the third letter following it $(X \rightarrow A, Y->B, Z->C, \ldots)$
  • Key is 3 or written as a letter ‘D’
  • KHOOR ZRUOG
Cryptography CSE 365 – Information Assurance代写 认准UprivateTA™

matlab代写请认准UprivateTA™. UprivateTA™为您的留学生涯保驾护航。

实分析代考

图论代考

运筹学代考

模电数电代写

神经网络代写

数学建模代考

Course Search

Keyword(s)SearchReset

Search Results

Course Prefix:CSECourse #: 365Keywords: showing 0 to 1

CSE 365LR Introduction to Computer Security

View ScheduleCSE 365LR Introduction to Computer SecurityLecture

This is an undergraduate-level course intended for junior and senior-level students and will teach them introductory concepts of computer security. The main foci of this course will be network, web security, and application security. Part of the work will be dedicated to ethical aspects of security, and online privacy. The course will be heavily hands-on, as opposed to theoretical teaching.Credits: 4
Grading: Graded (GRD)
Typically Offered: Fall
Prerequisites:CSE 250 and approved Computer Science, Computer Engineering, and Bioinformatics/CS Majors only. Students must complete a mandatory advisement session with their faculty advisor