The origin and basic concept of cryptography

Source: Internet
Author: User

One, some ancient encryption methods:

1. Steganography----Hide Secret messages in other messages

The most common is invisible ink: the sender uses onions or milk to write a secret message on the paper, and the receiver heats it slightly on the back of the paper to see the ciphertext.

2. The squares of the Greek poppy

1 2 3 4 5
1 A B C D E
2 F G H Ij K
3 L M N O P
4 Q R S T U
5 V W X Y Z

Plaintext A P P L E
Ciphertext 11 35 35 31 15

Thought: Replace

Just remember the password table and be able to encrypt and decrypt.

3. Caesar Password

A B C D E F G ... X Y Z
D E F G H I J ... A B C

Plaintext A P P L E
Ciphertext D S S O H

Thought: Replace

The Caesar Code table is easier to remember than the Greek squares above, because it only moves the clear text right 3 bits.

Second, the basic concept of cryptography:

Research on the Science of Information system security technology, including two branches: cryptography, encoding information to realize the knowledge of hidden information; cryptography: Research and analysis of the knowledge of breaking passwords or forgery. The two oppose each other, and promote each other to develop forward.

Sender: The sender of the message

Recipient: Destination of message sent

Eavesdroppers: Non-authorized person in the information transmission process and processing system

PlainText: Messages that will be hidden

Ciphertext: The form of clear text after transformation

Cryptography: The process of transforming plaintext into ciphertext

Decryption: The process of restoring ciphertext to plaintext

Encryption algorithm: A set of rules used to encrypt plaintext

Decryption algorithm: A set of rules used to decrypt ciphertext

Key: The data that controls the operation of the encryption and decryption algorithms, respectively, with the encryption key and decryption key

Third, the security system model:

Security System (M,C,K1,K2,EK1,DK2):

Clear text message space m

Ciphertext message Space C

Key space K1 and K2, under a single-key system K1=k2=k, when the key K belongs to K

Iv. Classification of cryptographic algorithms:

The basis for confidentiality dependence is divided into:

1. Restricted algorithm: The secrecy of the algorithm is based on the secrecy of the retention algorithm (secrecy algorithm is not disclosed).

2. Key-based algorithm: the confidentiality of the algorithm is based on the confidentiality of the key.

According to the key features are divided into:

Symmetric cipher algorithm: The encryption key and decryption key are the same, or substantially equivalent, from one easy to eject another. Also known as the Tammy key algorithm.

Asymmetric key algorithm: Encryption key and decryption key is not the same, from one difficult to launch another, also known as Public key algorithm.

Security of cryptographic algorithms:

1. Unconditional security: Even if the translator has unlimited resources, it will not be able to solve the corresponding plaintext

2. Computational safety: The cost of deciphering exceeds the value of the information itself, deciphering the time beyond the validity of the information

The origin and basic concept of cryptography

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.