Message confidentiality HOM Purpose Terminology block Using Mathematical Operations stream study
Message confidentiality
Pieter van den Hombergh
Fontys Hogeschool voor Techniek en Logistiek
June 6, 2016
HOM/FHTenL Message confidentiality June 6, 2016 1/16Message confidentiality HOM Purpose Terminology block Using Mathematical Operations stream study
Purpose of Encryption Purpose of Encryption
Maintain confidentiality Maintain confidentiality Best way to keep something secret is not to share it. Best way to keep something secret is not to share it. Effective against gossip, Effective against gossip, but not very useful sharing the information is essential. but not very useful sharing the information is essential. Think bank information, account, pin but also business plans or strategic Think bank information, account, pin but also business plans or strategic Thinking military is a good starting point: Paranoid.
HOM/FHTenL Message confidentiality June 6, 2016 2/16Message confidentiality HOM Purpose Terminology block Using Mathematical Operations stream study
Terminology
Plaintext - original message Ciphertext - coded message Cipher - algorithm for transforming plaintext to ciphertext Key - info used in cipher known only to sender/receiver Encipher (encrypt) - converting plaintext to ciphertext Decipher (decrypt) - recovering ciphertext from plaintext Cryptography - study of encryption principles/methods Cryptanalysis (code breaking) - study of principles/methods of deciphering ciphertext without knowing key Cryptology - field of both cryptography and cryptanalysis
HOM/FHTenL Message confidentiality June 6, 2016 3/16Message confidentiality HOM Purpose Terminology block Using Mathematical Operations stream study
Simplified diagram symmetric encryption
Plaintext input Y = E(K, X) X = D[K, Y] X K K Transmitted ciphertext Plaintext
- utput
Secret key shared by sender and recipient Secret key shared by sender and recipient Encryption algorithm (e.g., AES) Decryption algorithm (reverse of encryption algorithm)
Same keys use at both transmitting and receiving end. Both key must be kept secret, making sharing the keys risky. source: Network Security Essentials. W. Stallings
HOM/FHTenL Message confidentiality June 6, 2016 4/16June 6, 2016 this week 1