密码学入门【英文】

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2
3. Enigma Cipher
– – – –
4. Post-WWII
JILL WWII Crypto Spring 2006 - Class 1: Introduction
Menu
• Introduction to Cryptology
– Terminology – Principles – Brief history of 4000 years of Cryptology
6
Introductions
Insecure Channel Plaintext Encrypt Ciphertext Decrypt Plaintext
Alice
Eve (passive attacker)
Bob
JILL WWII Crypto Spring 2006 - Class 1: Introduction
Spring 2006
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa
David Evans
Class 1: Introduction and Cryptography before World War II
JILL WWII Crypto Spring 2006 - Class 1: Introduction
9
“The enemy knows the system being used.”
Claude Shannon
JILL WWII Crypto Spring 2006 - Class 1: Introduction
8
Cryptosystem
Ciphertext = E(Plaintext)
Required property: E must be invertible
Plaintext = D(Ciphertext)
Desired properties: Without knowing D must be “hard” to invert E and D should be easy to compute Possible to have lots of different E and D
Cryptology is a branch of mathematics.
Security is about people.
Attackers try find the weakest link. In most cases, this is not the mathematics.
JILL WWII Crypto Spring 2006 - Class 1: Introduction
10
Kerckhoff‟s Principle
• French handbook of military cryptography, 1883 • Cryptography always involves:
– Transformation – Secret
• Security should depend only on the key • Don‟t assume enemy won‟t know algorithm
• Cryptology before World War II
– A simple substitution cipher – [Break] – Breaking substitution cipher – Vigenè re Cipher
JILL WWII Crypto Spring 2006 - Class 1: Introduction
7
Introductions
Insecure Channel Plaintext Encrypt Ciphertext Decrypt Plaintext
Alice
Malice (active attacker)
Bob
JILL WWII Crypto Spring 2006 - Class 1: Introduction
– Cryptography, Cryptanalysis – hide meaning of a message – Steganography, Steganalysis – hide existence of a message
• Cryptography – secret writing • Cryptanalysis – analyzing (breaking) secrets
3
Jefferson Wheel wk.baidu.comipher
JILL WWII Crypto Spring 2006 - Class 1: Introduction
4
What is cryptology?
• Greek: “krypto” = hide • Cryptology – science of hiding
Bletchley Park, Summer 2004
http://www.cs.virginia.edu/jillcrypto
Overview
1. Introduction, Pre-WWII cryptology 2. Lorenz Cipher (Fish)
– – Used by Nazis for high command messages First programmable electronic computer built to break it Used by German Navy, Army, Air Force Broken by team including Alan Turing Modern symmetric ciphers Public-Key Cryptography
Cryptanalysis is what attacker does Decipher or Decryption is what legitimate receiver does
JILL WWII Crypto Spring 2006 - Class 1: Introduction
5
Cryptology and Security
相关文档
最新文档