K Y G L I U G L U K U Y G K U I F K U L Y U T D K R T D Y U K L O I Y U T Y A U G Y J Y O I H I H K Y G L I U G L U K U Y G K U I F K U L Y U T D K A U G W E R G H F D S O J H U I C R Y P T A N A L Y S I S I G U K Y I T U D R D T F H B J N K L I H U Y G U Q A Z X D E D F B A S I C X C I P H E R S J K N L I O U T Y F K U I F A N D Y A T B I T U M O R E G H F D S T E R D T Y U B J N L Y U T D K R T D Y U K L M I J U H Y T Y K U I H L M P U Y T R E R S D T F Y V G U B N I S E R D T M P U G S L B Y X A G I T
for secure communication in the presence of third parties • Cryptanalysis -- the study of analyzing information systems in order to study the hidden aspects of the systems • Cipher -- an algorithm for performing encryption or decryption
• Commonly used in data storage, data transmission, etc. • Examples: ASCII, UTF-8/16/32, Base64, etc. • More examples: Braille alphabet, Morse code, Human DNA, etc.
• Initially used to deliver secret military messages • Two kinds of encryptions: – Symmetric key encryption – Public key encryption • Examples: RSA, AES, Blowfish, etc.
key (called hash) to some data. • The same input will always produce the same output • Multiple disparate inputs should not produce the same output. • It should not be possible to go from the output to the input. • Any modification of a given input should result in drastic change to the hash (avalanche effect).
Julius Caesar • Based on right-shifting (addition) or left- shifting (subtraction) of letters of the alphabet A=0, B=1, C=2, …, W=22, X=23, Y=24, Z=25 26 mod 26 mod n x x D n x x E n n
both encoding and decoding • Examples: – Blowfish - the base of Bcrypt – SAFER+/++ - used by Bluetooth technology – IDEA - International Data Encryption Algorithm