Cryptography Concepts and Terminology Cryptography Concepts - - PowerPoint PPT Presentation

cryptography concepts and terminology
SMART_READER_LITE
LIVE PREVIEW

Cryptography Concepts and Terminology Cryptography Concepts - - PowerPoint PPT Presentation

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts and Terminology Cryptography Concepts Cryptography Notation and Terminology Cryptography School of Engineering and Technology CQUniversity


slide-1
SLIDE 1

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

1/11

Cryptography Concepts and Terminology

Cryptography

School of Engineering and Technology CQUniversity Australia

Prepared by Steven Gordon on 21 Feb 2020, concepts.tex, r1808

slide-2
SLIDE 2

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

2/11

Contents

Security Concepts Cryptography Concepts Cryptography Notation and Terminology

slide-3
SLIDE 3

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

3/11

Important Security Protections

Confidentiality ensures only authorised parties can view information Integrity ensures information, including identity of sender, is not altered Availability ensures information accessible to authorised parties when needed

slide-4
SLIDE 4

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

4/11

Other Common Protections

Authentication ensures that the individual is who she claims to be (the authentic or genuine person) and not an impostor Authorisation providing permission or approval to use specific technology resources Accounting provides tracking of events

slide-5
SLIDE 5

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

5/11

Scope

◮ Focus on confidentiality and integrity of information using technical means ◮ Means of authentication also covered ◮ Accounting, system availability, policy, etc. are out of scope ◮ See other subjects or books on “IT Security”, “Network Security Concepts” or similar

slide-6
SLIDE 6

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

6/11

Contents

Security Concepts Cryptography Concepts Cryptography Notation and Terminology

slide-7
SLIDE 7

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

7/11

Encryption for Confidentiality

◮ Aim: assure confidential information not made available to unauthorised individuals (data confidentiality) ◮ How: encrypt the original data; anyone can see the encrypted data, but only authorised individuals can decrypt to see the original data ◮ Used for both sending data across network and storing data on a computer system

slide-8
SLIDE 8

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

8/11

Model of Encryption for Confidentiality

slide-9
SLIDE 9

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

9/11

Cryptography Terms

Plaintext original message Ciphertext encrypted or coded message Encryption convert from plaintext to ciphertext (enciphering) Decryption restore the plaintext from ciphertext (deciphering) Key information used in cipher known only to sender/receiver Cipher a particular algorithm (cryptographic system) Cryptography study of algorithms used for encryption Cryptanalysis study of techniques for decryption without knowledge of plaintext Cryptology areas of cryptography and cryptanalysis

slide-10
SLIDE 10

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

10/11

Contents

Security Concepts Cryptography Concepts Cryptography Notation and Terminology

slide-11
SLIDE 11

Cryptography Cryptography Concepts and Terminology Security Concepts Cryptography Concepts Cryptography Notation and Terminology

11/11

Common Symbols and Notation

Symbol Description Example P Plaintext or message P = D(KAB, C) M Message or plaintext M = D(PRB, C) C Ciphertext C = E(KAB, P) C = E(PUB, M) K Secret key, symmetric key KAB Secret key shared between A and B E() Encrypt operation E(KAB, P) E(PUB, M) Ecipher() Encrypt operation using EAES(KAB, P) named cipher D() Decrypt operation D(KAB, C) D(PRB, C) PUA Public key of user A PRA Private key of user A H() Hash operation H(M) MAC() MAC operation MAC(KAB, M) XOR, ⊕ Exclusive OR operation A XOR B, A ⊕ B h Hash value h = H(M) || Concatenate (join) operation A||B