Cryptography

The word cryptography comes from the Greek words κρυπτός (kryptós), meaning “hidden,” and γράφειν (gráphein), meaning “writing.” Its original meaning is “secret writing.” Cryptography has evolved into a distinct field, primarily within computer science, that deals with creating encryption (secret codes) and their decryption (breaking these codes).

With the spread of electronic communication, three fundamental requirements for encryption methods to ensure secure Internet communication channels have emerged. These requirements are crucial to achieving secure communication.

Basic Requirements for a Secure Channel

1. Confidentiality: The content of messages should only be accessible to the communicating parties. No third party should be able to intercept and understand the message. This is achieved through encryption algorithms, which are designed to be difficult to reverse-engineer, efficient in computation, and easy to use. It’s essential to prove mathematically the limits of a given encryption method.

2. Authenticity: The communicating parties need to verify each other's identity, even if they have never met in person. This is crucial for secure internet transactions and communication with remote servers, which may be impossible to physically reach. Authentication ensures that a sender is indeed who they claim to be.

3. Integrity: It must be ensured that the data exchanged between parties remains unchanged during transmission. Unauthorized changes or tampering with the data must be detectable. Integrity is often ensured through the use of digital signatures.

Basic communication model

Where Alice is the sender(A), Bob is the receiver (B),

m: message, c: encrypted message,

\(E()\): encrypt function,

\(D()\): decrypt function,

\(D()\) is the inverse function of \(E()\).