modern cryptography dddd

Upload: shot-shot

Post on 04-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Modern Cryptography Dddd

    1/4

    Modern Cryptography - An Overview

    Contents Listing

    Chapter 1: An overview of Cryptography

    Section 1: Introduction

    Section 2: Terminology and ConceptsSection 3: volution of cryptography

    Section !: "ifferent forms of cryptography and their usage

    Chapter 2: Symmetric#$ey cryptography

    Section 1: %loc$ Ciphers &AS' "S' %lowfish(

    Section 2: Stream Cipher &)C!(

    Section 3: Symmetric#$ey algorithms # A comparison

    Chapter 3: *u+lic#$ey cryptography

    Section 1: )SA

    Section 2: Chic$en and the egg situation # And its solutionSection 3: *rotocols using *u+lic#$ey cryptography

    Chapter !: ,ash -unctions

    Section 1: ."/

    Section 2: The S,A family

    Section 3: 0,I)L*L

    Section !: ,ash -unctions # A comparison

    Chapter /: Cryptanalysis

    Section 1: 0hat is cryptanalysis

    Section 2: Typical 0ea$nesses in algorithms

    Chapter : Attac$s in cryptology

    Section 1: Attac$s on the )C! algorithm

    Section 2: Attac$s on the ."/ hash function

    Section 3: %rute force and "ictionary attac$s

    Chapter 4: 5ample C Source Code

    # AS &)i6ndael(

    # "S

    # %lowfish# )C!

    # )SA

    # ."/

    # S,A#1

    # 0,I)L*L

    Chapter 7: Conclusion

    Section 1: ,ow to choose the algorithm for you

    Section 2: Algorithms to stay clear on

    Section 3: -inal tips and reminders

    Section !: 8uic$ 8uestion answers

  • 8/13/2019 Modern Cryptography Dddd

    2/4

    Chapter 1 An Overview of Cryptography

    Section 1 9 Introduction

    Cryptography is the process +y which information is hidden It is in use all around us in the modern

    world' whether we are logging in to a system' using a secured wireless internet connection' usingcash#cards at an AT. or ma$ing payments over the internet .odern "ay cryptography has given

    us a sense of security with technology As always' a sense of security' and a lac$ of care' can +e

    incredi+ly dangerous

    0hilst cryptography is vital to the lives we live' all over the internet' you can see e5amples of

    where too much trust is placed on its security This +oo$ will give readers a deep insight into not

    only the mathematical wor$ings +ehind cryptographic algorithms' +ut into where and when

    different algorithms should +e used and what it is that ma$es them strong' or wea$

    *erhaps the more interesting chapters of this +oo$ will +e the ones which delve into cryptanalysis

    and other attac$s on cryptography These sections of the +oo$ will hopefully provide you with agreater insight into' in my opinion' one of the most interesting su+6ects on the internet today and

    prepare +udding developers for future challenges that may lie ahead

    .ost of the algorithms descri+ed in this +oo$ will also +e lin$ed to an e5ample implementation in

    the C programming language 0hilst $nowledge of this programming language is not essential' a

    +asic $nowledge of how +itwise operations wor$ and the general synta5 of the language' should

    help with your understanding I intend to ma$e my descriptions clear enough so that even those

    with no programming $nowledge can follow them +y using the terminology section as an aid

    0hether you are a teenager with an interest in computers' a student on the way to a career in

    computer forensics' a software developer +uilding secure applications or 6ust one of those who has

    to understand how everything wor$s' I hope this +oo$ is of great use to you and that you en6oy

    reading it

    Section 2 9 Terminology and Concepts

    To understand some of the algorithms' a descriptions of algorithms' in this +oo$ you will need to

    understand some of the following concepts and terms .any of you may +e a+le to s$ip through this

    section' +ut please refer +ac$ to it if you ever get stuc$ understanding the way something is

    e5plained

    The first' and pro+a+ly most important' concept to get your head around is that on a computer

    everything is stored as +its %its are +inary digits' they can yield one of two possi+le values' for the

    purposes of this +oo$ we will refer to them as ; or

    =off>' with a +it that is =on> holding a value of 1' and a +it that is =off> holding a value of

  • 8/13/2019 Modern Cryptography Dddd

    3/4

    If' however' the 32 +it integer &! +ytes(

  • 8/13/2019 Modern Cryptography Dddd

    4/4

    ?ow' all forms of cryptography descri+ed in this +oo$ will reuire +itwise operations The

    following list of +ullet points goes through the $ey +itwise operations and what they do

    Left Shift. The left shift operation shifts all of the +its in

    the num+er left -or e5ample' the num+er