cryptology past-present -future

32
Cryptology Past-Present -future

Upload: kanan

Post on 23-Feb-2016

58 views

Category:

Documents


0 download

DESCRIPTION

Cryptology Past-Present -future. Saeed seyed Agha Banihashemi School of International Relation of Minisrty of Forigen Affairs of I.R.Iran. Embassador of I.R.Iran in Hungary –Budapest [email protected] www.ircypt.com 21.sept.2010 BME. مدل منطقی یک سیستم رمزنگاری. 01101011. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cryptology Past-Present -future

CryptologyPast-Present

-future

Page 2: Cryptology Past-Present -future

Saeed seyed Agha BanihashemiSchool of International Relation of

Minisrty of Forigen Affairs of I.R.IranEmbassador of I.R.Iran in Hungary –Budapest

[email protected]

www.ircypt.com21.sept.2010

BME

Page 3: Cryptology Past-Present -future
Page 4: Cryptology Past-Present -future
Page 5: Cryptology Past-Present -future
Page 6: Cryptology Past-Present -future
Page 7: Cryptology Past-Present -future
Page 8: Cryptology Past-Present -future
Page 9: Cryptology Past-Present -future
Page 10: Cryptology Past-Present -future
Page 11: Cryptology Past-Present -future

Adversary Private domain of Receiver

Public Channel Decryption Algorithm

D

Secr

et k

ey K

Plaintext P

Private domain of Sender

Encryption Algorithm

EPlaintext P

Secr

et k

ey K

مدل منطقی یک سیستم رمزنگاری

Page 12: Cryptology Past-Present -future

12

11001110

Cipher text

Uniform Secret Key

1001

Logical Model of a General Stream Cipher

10100101

Key stream

XOR

Key generator

01101011

Plain text

Page 13: Cryptology Past-Present -future

13

• Vernum Cipher is a stream cipher . • A binary message m[1],m[2],…,m[t] is operated by a binary key stream k[1],k[2],

…,k[t] of the same length to produce cipher text c[1],c[2],…,c[t] Where for each i=1,2,…t c[i]=k[i] m[i]

Ciphertext110…….010 ..

010 ..

110…….

100…….Plaintext Plaintext

K K

Encryption Decryption

A Simple Example

In design a general Stream Cipher,

usually we consider a One Time Pad which uses a short uniform secret key.

Page 14: Cryptology Past-Present -future
Page 15: Cryptology Past-Present -future
Page 16: Cryptology Past-Present -future
Page 17: Cryptology Past-Present -future
Page 18: Cryptology Past-Present -future
Page 19: Cryptology Past-Present -future
Page 20: Cryptology Past-Present -future

20

Page 21: Cryptology Past-Present -future
Page 22: Cryptology Past-Present -future

• (608) GIUDICANDO CHE CON NESSUNA COSA SI POSSA RESTITUIRE PIU SANTA A QUESTEO REGNOCHE CON MANDRA A LA GUERRA RICUPERATION DE BENI REGII MOSCO PER SMALTIRE INQUESO MODO I MALI UMORI CHE TURBANO LA RELIGION CATTOLICA ET INANZ (I) LA SUA PARTITA HA DATO MOLTO INDRIZZO A QUESTO CONSIGLIO ET NE HA LASSATO A ME PARTICOLAR ORDINE ET BENCHE LI HEREETICI TEMANO MOLTO CHE IL RE ABBIA DA DARE IN QUSTED SUA SANTITA ET LO DANNANO NONDIMENO CAMMINA MOLTO BENE ET CON SECRETEZZA SECOND CHE BISOGNA ET SI VA OGNI GIORNO GUADAGNANDO QUALCUNO CON QUESTI GIRORNI IL CASTELLANO DI SENDOOMIRIA CHE E,PERSONA DI LINGUA ET D,AUTOITA,FRA LI HERETICI HA SOTTOSCRITTO A QUESTO PARERE

• IN GASA DE ? DOPO AVERCI FATTO MOLTO RESISTENZA• 508 HA MOSTATO MOLTO TRVAGLIO CHE IL RE ABBIA RIMESSO LE COSE SUE A LA

DIETA ET IO HO VEDUTO UNA LETTERA DEL BASINO SECRETARIO DEL RE CHRI STIANISSIMO CHE VENENDO DI 308 HA PARLATO IN 108 CON ESSA 508 CHE SCRIVE CHE PRE MOLTO CHE ABBIA FATTO NON LI..E PARSO DI LASSAR PUNTO AQUETATO LANIMO SUO.

Page 23: Cryptology Past-Present -future
Page 24: Cryptology Past-Present -future

ل • گ ك ق ف غ ع ظ ط ض ص ش س ژ رز دذ خ ح چ ج ت پ ب الفي ه و ن م

. . . .

. . .

. . .

. . . .

. . . .

. . .

.

Page 25: Cryptology Past-Present -future
Page 26: Cryptology Past-Present -future
Page 27: Cryptology Past-Present -future
Page 28: Cryptology Past-Present -future
Page 29: Cryptology Past-Present -future
Page 30: Cryptology Past-Present -future

keyencryptionne ),(

Page 31: Cryptology Past-Present -future
Page 32: Cryptology Past-Present -future