Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Lecture notes

Cryptography

Rating
-
Sold
-
Pages
4
Uploaded on
05-01-2021
Written in
2020/2021

Introduction to Cryptography

Content preview

CRYPTOGRAPHY

Computer data often travels from one computer to another, leaving the safety of its protected physical
surroundings. Once the data is out of hand, people with bad intention could modify or forge your data,
either for amusement or for their own benefit. Cryptography can reformat and transform our data,
making it safer on its trip between computers. The technology is based on the essentials of secret codes,
augmented by modern mathematics that protects our data in powerful ways.

• Computer Security - generic name for the collection of tools designed to protect data and to thwart
hackers

• Network Security - measures to protect data during their transmission

• Internet Security - measures to protect data during their transmission over a collection of
interconnected networks Security Attacks, Services and Mechanisms To assess the security needs of an
organization effectively, the manager responsible for security needs some systematic way of defining
the requirements for security and characterization of approaches to satisfy those requirements. One
approach is to consider three aspects of information security: Security attack – Any action that
compromises the security of information owned by an organization.

Security mechanism – A mechanism that is designed to detect, prevent or recover from a security
attack.

Security service – A service that enhances the security of the data processing systems and the
information transfers of an organization. The services are intended to counter security attacks and they
make use of one or more security mechanisms to provide the service.

Basic Concepts Cryptography The art or science encompassing the principles and methods of
transforming an intelligible message into one that is unintelligible, and then retransforming that
message back to its original form Plaintext The original intelligible message Cipher text The transformed
message Cipher An algorithm for transforming an intelligible message into one that is unintelligible by
transposition and/or substitution methods Key Some critical information used by the cipher, known only
to the sender& receiver Encipher (encode) The process of converting plaintext to cipher text using a
cipher and a key Decipher (decode) the process of converting cipher text back into plaintext using a
cipher and a key Cryptanalysis The study of principles and methods of transforming an unintelligible
message back into an intelligible message without knowledge of the key. Also called code breaking
Cryptology Both cryptography and cryptanalysis Code An algorithm for transforming an intelligible
message into an unintelligible one using a code-book Cryptography Cryptographic systems are generally
classified along 3 independent dimensions: Type of operations used for transforming plain text to cipher
text All the encryption algorithms are based on two general principles: substitution, in which each
element in the plaintext is mapped into another element, and transposition, in which elements in the
plaintext are rearranged. The number of keys used If the sender and receiver uses same key then it is
said to be symmetric key (or) single key (or) conventional encryption.

Document information

Uploaded on
January 5, 2021
Number of pages
4
Written in
2020/2021
Type
Lecture notes
Professor(s)
Shafi goldwasser
Contains
Introduction to cryptography
£4.63
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
DENNISGOODMAN

Get to know the seller

Seller avatar
DENNISGOODMAN Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
5 year
Number of followers
0
Documents
1
Last sold
-
COMPUTER SCIENCE

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions