modern cryptography dddd
TRANSCRIPT
-
8/13/2019 Modern Cryptography Dddd
1/4
Modern Cryptography - An Overview
Contents Listing
Chapter 1: An overview of Cryptography
Section 1: Introduction
Section 2: Terminology and ConceptsSection 3: volution of cryptography
Section !: "ifferent forms of cryptography and their usage
Chapter 2: Symmetric#$ey cryptography
Section 1: %loc$ Ciphers &AS' "S' %lowfish(
Section 2: Stream Cipher &)C!(
Section 3: Symmetric#$ey algorithms # A comparison
Chapter 3: *u+lic#$ey cryptography
Section 1: )SA
Section 2: Chic$en and the egg situation # And its solutionSection 3: *rotocols using *u+lic#$ey cryptography
Chapter !: ,ash -unctions
Section 1: ."/
Section 2: The S,A family
Section 3: 0,I)L*L
Section !: ,ash -unctions # A comparison
Chapter /: Cryptanalysis
Section 1: 0hat is cryptanalysis
Section 2: Typical 0ea$nesses in algorithms
Chapter : Attac$s in cryptology
Section 1: Attac$s on the )C! algorithm
Section 2: Attac$s on the ."/ hash function
Section 3: %rute force and "ictionary attac$s
Chapter 4: 5ample C Source Code
# AS &)i6ndael(
# "S
# %lowfish# )C!
# )SA
# ."/
# S,A#1
# 0,I)L*L
Chapter 7: Conclusion
Section 1: ,ow to choose the algorithm for you
Section 2: Algorithms to stay clear on
Section 3: -inal tips and reminders
Section !: 8uic$ 8uestion answers
-
8/13/2019 Modern Cryptography Dddd
2/4
Chapter 1 An Overview of Cryptography
Section 1 9 Introduction
Cryptography is the process +y which information is hidden It is in use all around us in the modern
world' whether we are logging in to a system' using a secured wireless internet connection' usingcash#cards at an AT. or ma$ing payments over the internet .odern "ay cryptography has given
us a sense of security with technology As always' a sense of security' and a lac$ of care' can +e
incredi+ly dangerous
0hilst cryptography is vital to the lives we live' all over the internet' you can see e5amples of
where too much trust is placed on its security This +oo$ will give readers a deep insight into not
only the mathematical wor$ings +ehind cryptographic algorithms' +ut into where and when
different algorithms should +e used and what it is that ma$es them strong' or wea$
*erhaps the more interesting chapters of this +oo$ will +e the ones which delve into cryptanalysis
and other attac$s on cryptography These sections of the +oo$ will hopefully provide you with agreater insight into' in my opinion' one of the most interesting su+6ects on the internet today and
prepare +udding developers for future challenges that may lie ahead
.ost of the algorithms descri+ed in this +oo$ will also +e lin$ed to an e5ample implementation in
the C programming language 0hilst $nowledge of this programming language is not essential' a
+asic $nowledge of how +itwise operations wor$ and the general synta5 of the language' should
help with your understanding I intend to ma$e my descriptions clear enough so that even those
with no programming $nowledge can follow them +y using the terminology section as an aid
0hether you are a teenager with an interest in computers' a student on the way to a career in
computer forensics' a software developer +uilding secure applications or 6ust one of those who has
to understand how everything wor$s' I hope this +oo$ is of great use to you and that you en6oy
reading it
Section 2 9 Terminology and Concepts
To understand some of the algorithms' a descriptions of algorithms' in this +oo$ you will need to
understand some of the following concepts and terms .any of you may +e a+le to s$ip through this
section' +ut please refer +ac$ to it if you ever get stuc$ understanding the way something is
e5plained
The first' and pro+a+ly most important' concept to get your head around is that on a computer
everything is stored as +its %its are +inary digits' they can yield one of two possi+le values' for the
purposes of this +oo$ we will refer to them as ; or
=off>' with a +it that is =on> holding a value of 1' and a +it that is =off> holding a value of
-
8/13/2019 Modern Cryptography Dddd
3/4
If' however' the 32 +it integer &! +ytes(
-
8/13/2019 Modern Cryptography Dddd
4/4
?ow' all forms of cryptography descri+ed in this +oo$ will reuire +itwise operations The
following list of +ullet points goes through the $ey +itwise operations and what they do
Left Shift. The left shift operation shifts all of the +its in
the num+er left -or e5ample' the num+er