Fractale & Wavelet Beeldcompressie

Download Report

Transcript Fractale & Wavelet Beeldcompressie

Contact Information
Professor Ann Dooms
[email protected]
Assistant Adriaan Barri
[email protected]
Office Pleinlaan 9, 2.29
Webpage http://homepages.vub.ac.be/~andooms (Education)
Course • Johanes A. Buchmann.
Text Introduction to Cryptography, Springer, 2000.
• Richard Mollin,
Codes: The Guide to Secrecy From Ancient to Modern Times,
Chapman & Hall, 2005.
• Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
Handbook of Applied Cryptography, CRC Press, 1996.
Cryptography
18/07/2015 | pag. 2
INTRODUCTION
Introduction
18/07/2015 | pag. 3
Cryptology
Cryptography
A form of communication which is primarily
concerned with the secure transmission
(through encryption) of a secret message
over an insecure channel.
+
Cryptanalysis
Deals with attacks on encrypted intercepted
messages to recover the secret message.
=
Introduction
18/07/2015 | pag. 4
Cryptology
Cryptosystem
Introduction
18/07/2015 | pag. 5
Example:
Ceasar Cipher
Cryptography
18/07/2015 | pag. 6
Example:
Ceasar Cipher
Hence the number of keys should be large!
Introduction
18/07/2015 | pag. 7
BASIC CONCEPTS
Introduction
18/07/2015 | pag. 8
Symmetric vs Asymmetric
Cryptosystems
Introduction
18/07/2015 | pag. 9
Cryptanalysis
Kerckhoff’s principle
Introduction
18/07/2015 | pag. 10
Attacks
Introduction
18/07/2015 | pag. 11
Example:
Attacks
Introduction
18/07/2015 | pag. 12
Alphabet
Introduction
18/07/2015 | pag. 13
Alphabet
Introduction
18/07/2015 | pag. 14
Words
Introduction
18/07/2015 | pag. 15
Permutations
Introduction
18/07/2015 | pag. 16
Permutations
Cryptography
18/07/2015 | pag. 17
SYMMETRIC
CRYPTOSYSTEMS
Symmetric Cryptosystems
18/07/2015 | pag. 18
Block Ciphers
Symmetric Cryptosystems
18/07/2015 | pag. 19
Block Ciphers
Symmetric Cryptosystems
18/07/2015 | pag. 20
Block Ciphers:
Permutation Cipher
Symmetric Cryptosystems
18/07/2015 | pag. 21
Block Ciphers:
Multiple Encryption
Symmetric Cryptosystems
18/07/2015 | pag. 22
Block Ciphers:
Modes of Use
• ECB: Electronic Codebook
• CBC: Cipherblock Chaining
• CFB: Cipher Feedback
• OFB: Output Feedback
Cryptography
18/07/2015 | pag. 23
Block Ciphers – ECB:
Electronic Codebook Mode
Cryptography
18/07/2015 | pag. 24
Block Ciphers – ECB:
Electronic Codebook Mode
Cryptography
18/07/2015 | pag. 25
Block Ciphers – ECB:
Electronic Codebook Mode
Cryptography
18/07/2015 | pag. 26
Example:
Block Ciphers – ECB
Cryptography
18/07/2015 | pag. 27
Drawback:
Block Ciphers – ECB
Cryptography
18/07/2015 | pag. 28
Example:
Block Ciphers – ECB
Cryptography
18/07/2015 | pag. 29
Block Ciphers – CBC:
Cipherblock Chaining Mode
Cryptography
18/07/2015 | pag. 30
Block Ciphers – CBC:
XOR
Cryptography
18/07/2015 | pag. 31
Block Ciphers – CBC:
Cipherblock Chaining Mode
Cryptography
18/07/2015 | pag. 32
Block Ciphers – CBC:
Cipherblock Chaining Mode
Cryptography
18/07/2015 | pag. 33
Block Ciphers – CBC:
Cipherblock Chaining Mode
Cryptography
18/07/2015 | pag. 34
Example:
Block Ciphers – CBC
Cryptography
18/07/2015 | pag. 35
Block Ciphers – CBC:
Cipherblock Chaining Mode
Cryptography
18/07/2015 | pag. 36
Example:
Block Ciphers – CBC
Cryptography
18/07/2015 | pag. 37
Drawback:
Block Ciphers – CBC
Cryptography
18/07/2015 | pag. 38
Block Ciphers – CFB:
Cipher Feedback Mode
Cryptography
18/07/2015 | pag. 39
Block Ciphers – CFB:
Cipher Feedback Mode
Cryptography
18/07/2015 | pag. 40
Block Ciphers – CFB:
Cipher Feedback Mode
Cryptography
18/07/2015 | pag. 41
Example:
Block Ciphers – CFB
Cryptography
18/07/2015 | pag. 42
Drawback:
Block Ciphers – CFB
The smaller the block length r, the shorter the ciphertext
blocks. This means on the hand that transmission is faster, but
on the other hand that the block encryption function must be
applied more frequently. The optimal choice of r depends on a
tradeoff between transmission and computation speed.
Cryptography
18/07/2015 | pag. 43
Block Ciphers – OFB:
Output Feedback Mode
Cryptography
18/07/2015 | pag. 44
Block Ciphers – OFB:
Output Feedback Mode
Cryptography
18/07/2015 | pag. 45
Block Ciphers – OFB:
Output Feedback Mode
Cryptography
18/07/2015 | pag. 46
Example:
Block Ciphers – OFB
Cryptography
18/07/2015 | pag. 47
Drawback:
Block Ciphers – OFB
Cryptography
18/07/2015 | pag. 48