Cryptology - I: Appendix C - Review of Cryptosystems

Instructors: R.E. Newman-Wolfe and M.S. Schmalz


In this class, we often express cryptologic operations in terms of a formal notation. This section contains an overview of notation associated with cryptographic transforms (Section C-1) and cryptosystems that incorporate such trnsforms (Section C-2). In Section C-3, we discuss information-theoretic concepts of data security, and summarize high-level formalisms associated with cryptanalysis in Section C-4.

C-1. Cryptographic Transforms.

An encryption or decryption transform accepts a message and a key and yields another message. In the encryption step, the input message is plaintext and the output is ciphertext. For decryption, the input (ciphertext) is transformed into plaintext at the transform's output.

C-2. Cryptosystems.

The fundamental purpose of cryptography is to enable two parties to communicate over an insecure channel such that an adversary cannot understand their communication. This concept can be expressed formally in terms of the following notation.

C-3. Concepts of Security.

C-4. Cryptanalytic Oracles.


This concludes our discussion of cryptosystems for this class. Additional statistical concepts will be defined as they are introduced in theory development.


References

[Mau91] Maurer, U.M. "A universal statistical test for random bit generators", In A.J. Menezes and S. A. Vanstone, Eds., Proceedings CRYPTO 90, Springer Lecture Notes in Computer Science 537:409-420 (1991).


Copyright © 1996 by Mark S. Schmalz, All Rights Reserved