up

Week 1

We want these:

See the security properties notes from Forensics last semester

Cryptology can be broken into:

Encryption of Plaintext yields Ciphertext:

\[e_K(x) = y\]

Decryption of Ciphertext yeilds Plaintext:

\[d_K(y) = x\]

The set of all keys is the Key Space:

\[\text{keyspace} = \{ K_1, K_2,\dots ,K_n \}\]

If the same key is used, encryption and decryption are inverse operations:

\[d_K(e_K(x)) = y\]

Kerckhoff’s Principle:

A cryptosystem should be secure even if the attacker knows all the details about the system, with the exception of the secret key

Meaning: Do not roll-your-own cryptosystem

Shift Cipher

Where \(k, x, y \in \{ 0, 1, 2, \dots , 25 \}\)

\[\begin {align} y = e_K(x) = x + k \bmod 26 \\ x = d_K(y) = y -k \bmod 26 \end {align}\]