Unformatted text preview:

Alice and Bob want to communicate they have some shared information a key k in advance Alice has a plaintext message m She coverts it to a ciphertext c with c Enc k m Bob decrypts this with m Dec k c You can also do this yourself such as encrypting your own data and then decrypting it later A private key encryption algorithm scheme is defined by a message space M and three algorithms Gen Enc Dec such that Gen key generation algorithm Randomized Outputs a key k Enc encryption algorithm Takes as input a key k and message m and outputs a ciphertext c outputs a message m m Dec k c Dec decryption algorithm Takes as input a key k and ciphertext c and For all k outputed by Gen and all m in M and all c outputed by Enc k m Kerckhoff s principle Attacker knows all the details of the scheme the parties are using opposite is security through obscurity where you try to keep the algorithm secret which is bad private key setting secret key setting shared key setting symmetric key setting Consider M all strings composed of a z Gen output a uniform k in 0 25 Enc k m 1 m 2 m l output c c 1 c 2 c l Dec k c 1 c 2 c l output m m 1 m 2 m l where c i m i k 26 where m i c i k 26 This is a bad encryption scheme easy to break for example by just looking at all 26 possibilities


View Full Document

UMD CMSC 456 - Notes

Download Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?