Chapter 5 Encryption
Chapter 5 Encryption
COMPUTER SECURITY
Chapter 5 : Encryption
Zulazeze Sahri, UiTM
Objectives
2
Introduction
• Encryption
▪ Scrambling information
▪ One critical part to the security puzzle
▪ Without it, all security measures are inadequate
• Cryptography
▪ An art form
▪ The information that is being hidden is called plaintext and the
information that has been encrypted is called ciphertext.
3
An Overview of Cryptography
• Decryption
– Reversal of the scrambling protocol
• Encryption
– Algorithm scrambles plain
– Sender and receiver agree on
algorithm
– Message difficult to re-create
without protocol
5
Cryptography Basics (cont.)
7
History of Encryption
• Multi-alphabetic
– Select multiple shifts
• Shift 1, 2, –1
• Rotate through the shifts
• A DOG becomes B FQI
– Old cipher considered weak today
9
Binary Operations
• Binary Operations
– AND, OR, XOR
1 1 0 1
1 0 0 1
1 0 0 1
10
Binary Operations
• Example of OR operation
1 1 0 1
1 0 0 1
1 1 0 1
11
Binary Operations
1 1 0 1
1 0 0 1
0 1 0 0
12
Binary Operations
14
Cryptography Terms
• Key: The bits that are combined with the plain text to encrypt
it. In some cases this is random numbers; in other cases it is the
result of some mathematical operation.
• Plain text: The unencrypted text.
• Cipher text: The encrypted text.
• Algorithm: A mathematical process for doing something.
15
Modern Methods
16
Modern Methods (cont.)
17
Modern Methods (cont.)
19
Modern Methods (cont.)
20
Modern Methods (cont.)
22
Modern Methods (cont.)
23
Modern Methods (cont.)
25
Cryptography Basics (cont.)
26
Modern Methods (cont.)
27
Digital Signatures
29
Hash – cont.
Hash - Salt
Random bits added to further secure encryption or hashing. Most often encountered with
hashing, to prevent Rainbow Table attacks.
Essentially the salt is intermixed with the message that is to be hashed. Consider this example.
You have a password that is pass001
• The ancient Chinese wrapped notes in wax and swallowed them for
transport.
• In ancient Greece a messenger’s head might be shaved, a message
written on his head, then his hair was allowed to grow back.
• In 1518 Johannes Trithmeus wrote a book on cryptography and
described a technique where a message was hidden by having each
letter taken as a word from a specific column.
Historical Steganography –
Continued
Cryptanalysis
37