Documente Academic
Documente Profesional
Documente Cultură
Lecture 1
Classical encryption techniques
Module 1
ASET
Basic terminology
ASET
plaintext into
Basic terminology
ASET
ASET
Basic terminology
ASET
Ciphers
ASET
Symmetric Encryption
ASET
Symmetric Encryption
ASET
Mathematically:
Y = EK(X)
X = DK(Y)
or
or
Y = E(K, X)
X = D(K, Y)
X = plaintext
Y = ciphertext
K = secret key
E = encryption algorithm
D = decryption algorithm
Both E and D are known to public
9
Cryptanalysis
ASET
10
Brute-Force Attack
ASET
Number of Alternative
Keys
Time required at 1
decryption/s
32
231 s
= 35.8 minutes
2.15 milliseconds
56
255 s
= 1142 years
10.01 hours
128
2127 s
168
2167 s
26! = 4 1026
26 characters
(permutation)
11
Classical Ciphers
ASET
12
Caesar Cipher
ASET
13
Caesar Cipher
ASET
14
ASET
15
ASET
ASET
17
ASET
ASET
19
ASET
Use in Cryptanalysis
ASET
21
Example Cryptanalysis
ASET
Given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXD
BMETSXAIZVUEPHZHMDZSHZOWSFPAPPDTSPQ
UZWYMXUZUHSXEPYEPOPDZSZUFPOMBZWPF
UPZHMDJUDTMOHMQ
Count relative letter frequencies (see next page)
Guess {P, Z} = {e, t}
Of double letters, ZW has highest frequency, so guess ZW = th
and hence ZWP = the
Proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
22
ASET
F 3.33
B 1.67
C 0.00
Z 11.67
D 5.00
W 3.33
G 1.67
K 0.00
8.33 E 5.00
Q 2.50
Y 1.67
L 0.00
8.33 V 4.17
2.50 I
0.83
N 0.00
7.50 X 4.17
1.67 J
0.83
R 0.00
6.67
23
Playfair Cipher
ASET
ASET
Use a 5 x 5 matrix.
Fill in letters of the key (w/o duplicates).
Fill the rest of matrix with other letters.
E.g., key = MONARCHY.
I/J
Z
25
ASET
26
ASET
Plaintext: SH IS HE RX RY LO VE SH EA TH LE DG ER
S H E R Y
A B C D F
G I K L M
N O P Q T
U V W X Z
ASET
HE GH ER DR YS IQ WH HE SC OY KR AL RY
final ciphertext :
HEGHERDRYSIQWHHESCOYKRALRY
ASET
29
ASET
Vigenre Cipher
ASET
32
Transposition Ciphers
Also called permutation ciphers.
Shuffle the plaintext, without altering the
actual letters used.
Example: Row Transposition Ciphers
33
ASET
d u n t i l t
w o a mx y z
Ciphertext:TTNAAPTMTSUOAODWCOIXKNLYPETZ
34
Product Ciphers
ASET
35
ASET
Unconditional & Computational
Security
ASET
An unconditionally Secure Cipher
Steganography
ASET
ASET
39