Cryptography

Language and Cryptanalysis

Cryptography Terms

Cipher Categories

Symmetric

Sym Crypt

Block cipher

DES

AES

Symmetric Stream Encryption Algorithm - RC4

Asymmetric

Asymmetric Public Key

Asym Pub Key

Asymmetric Public Key Algorithms

Asymmetric process

Diffie-Hellman Key Exchange

DHKE

RSA

RSA

RSA Example

Cryptography’s Role in Information Security

Remember CIAN like the color

Transposition Ciphers

TC

Substitution Ciphers

Keyword mixed alphabet cipher

Remove a few letters from a word, throw in the rest of the letters, substitution cipher after that

Vigenére

Vigenére

Simple Substitution Cipher

Allows any letter to uniquely map to any other letter (vigenére included)

Rot13

Modification of Caesar cipher, shifts by 13 rather than 3

Hash functions and signatures

Digital Signature Process

Digital Signature Process

SSL/TLS

TLS Handshake

  1. Agree on suite (Diffie-hellman? RSA? AES? SHA for hashing?)
  2. Server authenticates with a digital certificate (Amazon is really Amazon, the certificate proves it)
  3. Key/color exchange, mixing them, getting that final symmetric key (Diffie-Hellman or some other cipher suite)
  4. Use that ‘brown’ key and use symmetric encryption

Cryptanalysis

Cryptanalysis objectives:

Forms of cryptographic attack:

Computationally secure encryption schemes rely on cost and time.