文章目录

  • 1 Basic Introduction
    • 1.1 Definition
    • 1.2 Main Branches
  • 2 History of cryptography and cryptanalysis
    • 2.1 Classic cryptography
      • 2.1.1 main classical cipher types
      • 2.1.2 This fundamental principle of Cryptography
      • 2.1.3devices and aids
    • 2.2 Computer era
    • 2.3 Advent of modern cryptography
    • 2.3 Modern cryptography
      • 2.3.1 Public-key cryptography
      • 2.3.2 Public-key cryptography
      • 2.3.3 Cryptanalysis
  • 3 Legal Issues

1 Basic Introduction

1.1 Definition

Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

More generally, cryptography cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages

Alice →{\rightarrow}→ sender
Bob →{\rightarrow}→ recipient
Eve →{\rightarrow}→ adversary

1.2 Main Branches

  • Aspects of cryptography in information security:
    →{\rightarrow}→ data confidentiality
    →{\rightarrow}→data integrity
    →{\rightarrow}→authentication
    →{\rightarrow}→non-repudiation

  • Modern cryptography exists at the intersection of the disciplines:
    →{\rightarrow}→mathematics
    →{\rightarrow}→computer science
    →{\rightarrow}→electrical engineering, communication science
    →{\rightarrow}→physics

  • Applications of cryptography
    →{\rightarrow}→electronic commerce
    →{\rightarrow}→chip-based payment cards
    →{\rightarrow}→digital currencies
    →{\rightarrow}→computer passwords
    →{\rightarrow}→military communications

2 History of cryptography and cryptanalysis

                             Brief Introduction
Classic Cryptography
Computer era
Advent of modern cryptography

2.1 Classic cryptography

2.1.1 main classical cipher types


Security of the key used should alone be sufficient for a good cipher to maintain confidentiality under an attack. This fundamental principle was first explicitly stated in 1883 by Auguste Kerckhoffs and is generally called Kerckhoffs’s Principle; alternatively and more bluntly, it was restated by Claude Shannon, the inventor of information theory and the fundamentals of theoretical cryptography, as Shannon’s Maxim—‘the enemy knows the system’.

  • transposition ciphers, which rearrange the order of letters in a message

    • e.g. Caesar cipher. Suetonius reports that Julius Caesar used it with a shift of three to communicate with his generals.
  • substitution ciphers, which systematically replace letters or groups of letters with other letters or groups of letters
  • Steganography, to hide even the existence of a message so as to keep it confidential
    • e.g. An early example, from Herodotus, was a message tattooed on a slave’s shaved head and concealed under the regrown hair.
    • e.g. include the use of invisible ink, microdots, and digital watermarks to conceal information.
  • frequency analysis cryptanalysis techniques: After the discovery of frequency analysis about in the 9th century, nearly all such ciphers could be broken by an informed attacker. Such classical ciphers still enjoy popularity today, though mostly as puzzles.
    • e.g. Language letter frequencies may offer little help for some extended historical encryption techniques
  • polyalphabetic cipher with automatic cipher device
    • e.g. In the Vigenère cipher, encryption uses a key word, which controls letter substitution depending on which letter of the key word is used.

2.1.2 This fundamental principle of Cryptography

Security of the key used should alone be sufficient for a good cipher to maintain confidentiality under an attack. This fundamental principle was first explicitly stated in 1883 by Auguste Kerckhoffs and is generally called Kerckhoffs’s Principle; alternatively and more bluntly, it was restated by Claude Shannon, the inventor of information theory and the fundamentals of theoretical cryptography, as Shannon’s Maxim—‘the enemy knows the system’.

2.1.3devices and aids

Different physical devices and aids have been used to assist with ciphers.

  • the scytale of ancient Greece
  • cipher grille in medieval times
  • cipher disk, Johannes Trithemius’ tabula recta scheme, and Thomas Jefferson’s wheel cypher
  • rotor machines—famously including the Enigma machine used by the German government and military from the late 1920s and during World War II.

2.2 Computer era

Prior to the early 20th century, cryptography was chiefly concerned with linguistic and lexicographic patterns. Since then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory, computational complexity, statistics, combinatorics, abstract algebra, number theory, and finite mathematics generally.

  • Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers.
  • computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers ;
  • Many computer ciphers can be characterized by their operation on binary bit sequences
  • computers have also assisted cryptanalysis, which has compensated to some extent for increased cipher complexity.

Nonetheless, good modern ciphers have stayed ahead of cryptanalysis; it is typically the case that use of a quality cipher is very efficient (i.e., fast and requiring few resources, such as memory or CPU capability)

2.3 Advent of modern cryptography

  • Colossus was made as cryptanalysis of the new mechanical devices proved to be both difficult and laborious.

    • e.g. assisted in the decryption of ciphers generated by the German Army’s Lorenz SZ40/42 machine.

Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s.

  • In recent times, IBM personnel designed the algorithm that became the Federal (i.e., US) Data Encryption Standard; Whitfield Diffie and Martin Hellman published their key agreement algorithm;[24] and the RSA algorithm was published in Martin Gardner’s Scientific American column.
  • Following their work in 1976, it became popular to consider cryptography systems based on mathematical problems that are easy to state but have been found difficult to solve.
  • There are very few cryptosystems that are proven to be unconditionally secure
    • e.g. one-time pad
  • There are a few important algorithms that have been proven secure under certain assumptions.
    • e.g. For example, the infeasibility of factoring extremely large integers is the basis for believing that RSA is secure, and some other systems, but even so proof of unbreakability is unavailable since the underlying mathematical problem remains open.

The discrete logarithm problem is the basis for believing some other cryptosystems are secure, and again, there are related, less practical systems that are provably secure relative to the solvability or insolvability discrete log problem.

2.3 Modern cryptography

To Be Continue…

2.3.1 Public-key cryptography

2.3.2 Public-key cryptography

2.3.3 Cryptanalysis

3 Legal Issues

To Be Continue…


reference: wikipedia: Cryptography



Author

lance

2019.3.22

密码学史观----Cryptography相关推荐

  1. 现代密码学(Cryptography)经典习题及解法(一)

    习题一:Many Time Pad 题目链接:https://www.coursera.org/learn/crypto/home/week/1 Question: Let us see what g ...

  2. [以太坊源代码分析] IV. 椭圆曲线密码学和以太坊中的椭圆曲线数字签名算法应用

    数字签名算法在Ethereum中的应用不少,目前已知至少有两处:一是在生成每个交易(Transaction, tx)对象时,对整个tx对象进行数字签名:二是在共识算法的Clique算法实现中,在针对新 ...

  3. python cryptography key加密_python3利用cryptography 进行加密和解密

    我们的日常工作中,一定会遇到需要加密的数据,比如:密码.私密信息... ... 我们不仅要对他们进行加密,更需要对他们进行解密,因为毕竟我们的用户应该不会看得懂加密过后的字符串吧!!! 在python ...

  4. 密码学的100个基本概念

    密码学的100个基本概念 一.密码学历史 二.密码学基础 三.分组密码 四.序列密码 五.哈希函数 六.公钥密码 七.数字签名 八.密码协议 九.密钥管理 十.量子密码 2022年主要完成了密码学专栏 ...

  5. 配置 不使用rsa 密码_了解使用RSA的密码学

    配置 不使用rsa 密码 RSA is an asymmetric cryptographic algorithm that you are probably using right now to v ...

  6. 区块链快速入门(六)——区块链密码学与安全相关技术

    一.区块链密码安全技术简介 区块链和分布式账本中大量使用了密码学和安全技术的最新成果,特别是身份认证和隐私保护相关技术.区块链使用了包括Hash 算法与摘要.加密算法.数字签名和证书.PKI体系.Me ...

  7. 密码学--CTF Crypto 总结

    密码学简介 密码学(Cryptography)一般可分为古典密码学和现代密码学. 其中,古典密码学,作为一种实用性艺术存在,其编码和破译通常依赖于设计者和敌手的创造力与技巧,并没有对密码学原件进行清晰 ...

  8. 密码学系列之一:密码学的前世今生

    密码学的前世今生 1.传统密码 1.1 古典密码 1.2 近代密码 2.现代密码 密码学(cryptography),源于希腊语kryptós"隐藏的",和gráphein&quo ...

  9. 公开密钥密码学是什么

    公开密钥密码学(Public-key cryptography)也称非对称式密码学(Asymmetric cryptography)是密码学的一种算法,它需要两个密钥,一个是公开密钥,另一个是私有密钥 ...

最新文章

  1. 3月最新!ESI世界大学排名:371所内地高校上榜!
  2. Django 2.1.3 中间件使用
  3. python安装pandas模块-python安装numpy和pandas的方法步骤
  4. 字符串中的第一个唯一字符
  5. R语言计算相关矩阵然后将计算结果输出到CSV文件
  6. FreeMarker 日期转换
  7. 当一个人把你所有联系方式删除,意味着什么?
  8. ISA2006之二---client
  9. 如何使用Selenium-Grid
  10. 如何获取k8s拓扑_k8s从安装到精通--Service 拓扑介绍
  11. vc++无进程式线程插入穿墙技术实现
  12. 360 绑架浏览器首页的解决方法
  13. mysql如何防止sql注入
  14. 图解:卷帘快门(Rolling_shutter)与全局快门(global_shutter)的区别
  15. STM32智能家居系统设计(门禁、人体感应、GSM远程控制)
  16. 2019年QQ透明头像与QQ动态头像设置方法
  17. PYTHON爬虫书籍
  18. node.js 腾讯镜像站_史上最强Sx05RE游戏整合镜像发布!FBA4ARM永久闭源并停止发布!...
  19. java 内存很高_Java服务器内存和CPU占用过高的原因
  20. 企业钉钉群发送信息轮子

热门文章

  1. 区块链之联盟链---认识Fabric
  2. VisualSVN server 备份恢复
  3. 熔断器 java_防雪崩利器:熔断器 Hystrix 的原理与使用
  4. docker容器使用docker-squash压缩体积
  5. 静音打印,UART驱动TMC2208教程
  6. AS中码云和GitHub的使用入门
  7. EasyPlayer-rtsp播放器中码率及帧率统计的实现方法
  8. Redis是什么、特点、优势
  9. UBT14:ubuntu安装Drawing
  10. JavaScript 实现异步任务调度器