Lecture 7: Cryptography Part 1
Date: October 11, 2013
Homework due: Oct. 18 at 5:00pm
- Cryptography and cryptanalysis
- What it does
- When it is used
- Basic assumptions
- Terms
- Ciphers and codes
- Plaintext, ciphertext, key
- Code book
- Encipher, decipher
- Adversary
- Types of attacks
- Ciphertext only — given ciphertext, find plaintext and/or key
- Known plaintext — given plaintext and corresponding ciphertext, find key
- Chosen plaintext — given the ability to select a plaintext and get the
corresponding ciphertext, find the key
- Types of cipher transformations
- Substitution ciphers
- Transposition ciphers
- Product ciphers
- Superencipherment
- A brief history
- Classical cryptography
- Simple substitution
- Cæsar cipher; example, with key ‘D’ (3), RENAISSANCE → UHQDLVVDQFH