Conventional Encryption Model

Conventional Encryption Model
Public key
Application for publickey
cryptosystem
Encryption/decryption
Digital signature
Key exchange
Examples of publickey cryptosystem
Elgamal
RSA
conventional encryption algorithm
Encryption ingredients
Plaintext
Encryption algorithm
Secret key
Ciphertext
Decryption algorithm
Source use of symmetric encryption
A strong encryption algorihm
A secret key known only to sender/reciver
Cryptographic attack methoods
Plaintext based attacks
Known plaintext
Chosen plaintext
Adaptive chosen plaintext
Ciphertext based attacks
Ciphertext only
Chosen ciphertext
Adaptive chose ciphertext
Man in the middle attack
make it seem that two computers are
communication with each other.
12