انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة
الكلية كلية العلوم للبنات
القسم قسم الحاسبات
المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي
2/16/2012 9:25:33 AM
Chapter 3 Some Results From Information Theory 3.1 Levels of Security Denition 3.1.1 Unconditional Security A cryptosystem is unconditionally secure if it cannot be broken even with innite computational resources. Theorem 3.1.1 The OTP is unconditionally secure if keys are only used once. 3.2 Computational Security For all known practical cryptosystems we have: Denition 3.2.1 Computational Security A system is \computational secure" if the best possible algorithm for breaking it requires N operations, where N is very large and known. 25 Unfortunately, all known practical systems are only computational secure for known algo- rithms. Denition 3.2.2 Relative Security A system is \relative secure" if its security relies on a well studied, very hard problem. Example: A system S is secure as long as factoring of large integers is hard (this is believed for RSA). 3.3 Cryptography and Coding There are three basic forms of coding in modern communication systems: source coding, channel coding, and encryption. From an information theoretical and practical point of view, the three forms of coding should be applied as follows: Data Source Source Coding Channel Coding Channel Channel Decryption Decoding Encryption Source Decoding Data Sink removes redundancy adds redundancy introduces errors and eavesdropping Figure 3.1: Communication coding system model 26 3.4 Confusion and Diusion According to Shannon, there are two basic approaches to encryption. 1. Confusion | encryption operation where the relationship between cleartext and ci- phertext is obscured. Some examples are: (a) Shift cipher | main operation is substitution. (b) German Enigma (broken by Turing) | main operation is smart substitution. 2. Diusion | encryption by spreading out the in uence of one cleartext letter over many ciphertext letters. An example is: (a) permutations | changing the positioning of the cleartext.
المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
|