Preview

number theory

Better Essays
Open Document
Open Document
7093 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
number theory
2

INTRODUCTION TO
CRYPTOGRAPHY

2.1 WHAT IS CRYPTOGRAPHY?
The word cryptography comes from the Greek words κρυπτο (hidden or secret) and γραφη
(writing). Oddly enough, cryptography is the art of secret writing. More generally, people think of cryptography as the art of mangling information into apparent unintelligibility in a manner allowing a secret method of unmangling. The basic service provided by cryptography is the ability to send information between participants in a way that prevents others from reading it. In this book we will concentrate on the kind of cryptography that is based on representing information as numbers and mathematically manipulating those numbers. This kind of cryptography can provide other services, such as


integrity checking—reassuring the recipient of a message that the message has not been altered since it was generated by a legitimate source



authentication—verifying someone’s (or something’s) identity

But back to the traditional use of cryptography. A message in its original form is known as plaintext or cleartext. The mangled information is known as ciphertext. The process for producing ciphertext from plaintext is known as encryption. The reverse of encryption is called decryption.

plaintext

encryption

ciphertext

decryption

plaintext

While cryptographers invent clever secret codes, cryptanalysts attempt to break these codes.
These two disciplines constantly try to keep ahead of each other. Ultimately, the success of the cryptographers rests on the

39

40

INTRODUCTION TO CRYPTOGRAPHY

2.1.1

Fundamental Tenet of Cryptography
If lots of smart people have failed to solve a problem, then it probably won’t be solved (soon).
Cryptographic systems tend to involve both an algorithm and a secret value. The secret value is known as the key. The reason for having a key in addition to an algorithm is that it is difficult to keep devising new algorithms that will allow

You May Also Find These Documents Helpful

  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    M1 Unit 4

    • 1010 Words
    • 3 Pages

    When a message is communicated in writing, it is called Written Communication. Written Communication takes place in the form of letters, circular, reports, magazines, noticeboards, handbooks, notebooks etc. Written communication is generally used for communicating a message through across two parties. For example, Apple may use written communication to communicate with the competitor Samsung. Or, it could be used for the customers to communicate with the Apple due to…

    • 1010 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.…

    • 928 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Theories of communication

    • 377 Words
    • 2 Pages

    Message Decoded- The other person will have to be able to interpret/decode the message you sent and they will make assumptions that will either be correct or incorrect.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    2. Message fixed in some form with information and symbolic content (either in digital bits or commodity form)…

    • 972 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Secure Electronic Transactions (SET) relies on the science of cryptography – the art of encoding and decoding messages. Cryptography dates back many centuries – even in the time of Julius Caesar, encryption was used to preserve the secrecy of messages. Preserving the secrecy of transactions is no different, though stronger encryption algorithms are used, as well as significantly stronger encryption keys. Encryption advancements have come about through its application by the military, and by advances in computing power and mathematics.…

    • 1719 Words
    • 7 Pages
    Powerful Essays