CS458 Lecture Notes - Public-Key Cryptography, Checksum, Symmetric-Key Algorithm

99 views7 pages

Document Summary

1- confidentiality: prevent eve from reading alice"s messages. 2- integrity: prevent mallory from modifying alice"s messages. Kerckhoffs" principle : the security of a cryptosystem should not rely on a secret that"s hard ( or expensive ) to change. A strong cryptosystem is one where the most eve can do is try all the keys used to specify which encryption method was used ( computation security ) Goal of cryptography is to make sure the information transfer is not the weakest link ( send secure messages over an insecure medium ) Simplest and used for years , but hard part is exchanging keys. Unbreakable, simple idea, hard to use correctly , information-theoretic security. Description: the key is random bitstring of the same length as the message, the encrypt and decrypt functions are just xor. Note: key must be truly random not pseudorandom, key must never be used more than once.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions