CSCE 313 Lecture 24
Jump to navigation
Jump to search
« previous | Thursday, April 19, 2012 | next »
Encryption
Closed Design: Everything (algorithm and key kept secret)
Open-Design:
- Key exchanged by private means
- Message composed
- Message encrypted
- Message sent over public channel (attacker cannot read)
- Message received and decrypted
Encryption algorithm takes a message and a key, and produces ciphertext
- Needs to be efficient
- Most encryption schemes can be broken, but depends on resources
- Longer key is often more secure ( possible keys where is length)
Breaking Encryption
Depends on what you have
- Ciphertext: exhaustive search until "recognizable plaintext"
- Plaintext and Ciphertext: find out what it takes to get from plain to cipher, and vice-versa
- Algorithm: figure out what the key is
Models of Security
- Unconditional security: perfect secrecy; impossible to crack
- Complexity-theoretic security
- Provable security: breaking algorithm would require solving an unsolved problem
- Computational security: takes a long long time to break
Types of Cryptography
- Hash functions: no key
- Secret key (symmetric): one key used for encryption and decryption
- crypt command in Linux
- challenge-response: send r, verify returned encrypted {r}
- send message integrity code (checksum) with message
- Public key (asymmetric): two keys (public, private)
- encryption(public)/decryption(private) or signing(private)/verification(public)