13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

interpreting or uncovering the deciphered codes without the sender’s consentor authorization).Cryptology is an area <strong>of</strong> special difficulty for readers <strong>and</strong> studentsbecause many good techniques <strong>and</strong> analyses are available but remain theproperty <strong>of</strong> organizations whose main business is secrecy. As such, we discussthe fundamental technique <strong>of</strong> cryptography in this section without making anyspecific recommendations.1.4.1 Basic Cryptographic FunctionsBasic cryptography comprises encryption, decryption, <strong>and</strong> key managementunit, as shown in Fig. 1.3. Encryption (enciphering) is the process <strong>of</strong>converting messages, information, or data into a form unreadable by anyoneexcept the intended recipient. The encrypted (enciphered) text is called acryptogram. Encrypted data must be deciphered (unlocked, or decrypted)before the recipient can read it. Decryption is the unlocking <strong>of</strong> the lockedmessage—that is, the reverse <strong>of</strong> encryption. ‘‘Key’’simply means ‘‘password’’.Key management refers to the generation, distribution, recognition, <strong>and</strong>reception <strong>of</strong> the cryptographic keys. Cryptographic key management is themost important element <strong>of</strong> any cryptographic system (simply called cryptosystem)design.Encryption uses a special system called an algorithm to convert the text<strong>of</strong> the original message (plaintext) into an encrypted form <strong>of</strong> the message(ciphertext or cryptogram). Algorithms are step-by-step procedures for solvingproblems in the case <strong>of</strong> encryption, for enciphering <strong>and</strong> deciphering a plaintextmessage. Cryptographic algorithms (like key <strong>and</strong> transformation functions)equate individual characters in the plaintext with one or more different keys,numbers, or strings <strong>of</strong> characters. In Fig. 1.3, the encryption algorithm E ytransforms the transmitted message M T into a cryptogram C y by the cryptographickey K E algorithm. The received message M R is obtained through theFIGURE 1.3General cryptographic functions.Copyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!