Record Detail Back

XML

FUNDAMENTALS OF CRYPTOLOGY


Cryptology, the study of crypto systems, can be subdivided into two disciplines. Cryptography concerns itself with the design of crypto systems, while cryptanalysis studies the breaking of crypto systems. These two aspects are closely related; when setting up a crypto system the analysis of its security plays an important role. At this time we will not give a formal definition of a crypto system, as that will come later in this chapter. We assume that the reader has the right intuitive idea of what a cryptosystem is.
Why would anybody use a crypto system? There are several possibilities:
Confidentiality: When transmitting data, one does not want an eavesdropper to understand the contents of the transmitted messages. The same is true for stored data that should be protected against unauthorized access, for instance by hackers.
Authentication: This property is the equivalent of a signature. The receiver of a message wants proof that a message comes from a certain party and not from somebody else (even if the original party later wants to deny it).
Integrity: This means that the receiver of certain data has evidence that no changes have been made by a third party.
Throughout the centuries (see [Kahn67]) cryptosystems have been used by the military and by the diplomatic services. The nowadays widespread use of computer controlled communication systems in industry or by civil services, often asks for special protection of the data by means of cryptographic techniques.
Since the storage, and later recovery, of data can be viewed as transmission of this data in the time domain, we shall always use the term transmission when discussing a situation when data is stored and/or transmitted.
Henk C.A. van Tilborg - Personal Name
1st Edtion
NONE
FUNDAMENTALS OF CRYPTOLOGY
Information Technology
English
KLUWER ACADEMIC PUBLISHERS
2006
London
1-503
LOADING LIST...
LOADING LIST...