cours-crypto

icon

24

pages

icon

English

icon

Documents

Le téléchargement nécessite un accès à la bibliothèque YouScribe Tout savoir sur nos offres

icon

24

pages

icon

English

icon

Ebook

Le téléchargement nécessite un accès à la bibliothèque YouScribe Tout savoir sur nos offres

Introduction to cryptographyChristophe RitzenthalerNovember 19, 20071 Private key cryptographyLet us introduce some terminology. The information that Alice wants to send to Bob willbe called plaintext (Message clair). She will cipher or encrypt (chiffrer) the plaintext toobtain a ciphertext (texte chiffr´e ou cryptogramme) with the help of a key. Bob whoknows the key will then decipher (d´echiffrer) the ciphertext, whereas Oscar, who does not,can try to decrypt (d´ecrypter) it, in order to obtain the plaintext.Definition 1.1. A (secret key) cryptosystem (cryptosyst`eme) is a three-tuple (P,C,K)where the following conditions are satisfied :1. P is a finite set of possible plaintexts;2. C is a finite set of possible ciphertexts;3. K is a finite set of possible keys called keyspace (espace des cl´es);4. For each K ∈K, there is an encryption rule (fonction de chiffrement) E :P →CKand a decryptionrule (fonction de d´echiffrement)D :C →P suchthatD ◦E =K K KId.Remark 1. We see already that the function E must be injective. Moreover if P =C, EK Kand D are bijective : they are permutations, inverse of each other.KAlice and Bob will employ the following protocol to use a specific cryptosystem. Firstthey choose a random key K ∈ K. This is done when they are in the same place and notbeing observed by Oscar, or, alternatively, when they do have access to a secure channel. Atalatertime, suppose AlicewantstocommunicateamessagetoBoboveraninsecurechannel.We suppose that this ...
Voir Alternate Text

Publié par

Nombre de lectures

11

Langue

English

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text