Beruflich Dokumente
Kultur Dokumente
Techniques
Network Security
Chapter 2 • "I am fairly familiar with all the forms of secret
writings, and am myself the author of a trifling
monograph upon the subject, in which I analyze
Fifth Edition
one hundred and sixty separate ciphers," said
by William Stallings Holmes..
Lecture slides by Lawrie Brown —The Adventure of the Dancing Men, Sir Arthur
(with edits by RHB) Conan Doyle
Requirements
• two requirements for secure use of
symmetric encryption:
– a strong encryption algorithm
– a secret key known only to sender / receiver
• mathematically have:
Y = E(K,X)
X = D(K,Y)
• assume encryption algorithm is known
• implies a secure channel to distribute key
Cryptography Cryptanalysis
• can characterize cryptographic system by: • objective to recover key not just message
– type of encryption operations used
• general approaches:
• substitution
• transposition – cryptanalytic attack
• product – brute-force attack
– number of keys used • if either succeed all key use compromised
• single-
single-key or private
• two-
two-key or public
– way in which plaintext is processed
• block
• stream
168 Triple DES 2168 ≈ 3.7 x 1050 2167 ns = 5.8 x 1033 years 5.8 x 1029 years
plaintext bit patterns with ciphertext bit
192 AES 2192 ≈ 6.3 x 1057 2191 ns = 9.8 x 1040 years 9.8 x 1036 years
patterns
256 AES 2256 ≈ 1.2 x 1077 2255 ns = 1.8 x 1060 years 1.8 x 1056 years
26 characters Monoalphabetic 26! = 4 x 1026 2 ´ 1026 ns = 6.3 x 109 years 6.3 x 106 years
(permutation)
Plaintext: ifwewishtoreplaceletters
Ciphertext:
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Language Redundancy and English Letter Frequencies
Cryptanalysis
• human languages are redundant
• eg "th lrd s m shphrd shll nt wnt"
• letters are not equally commonly used
• in English E is by far the most common letter
– followed by T,R,N,I,O,A,S
• other letters like Z,J,K,Q,X are fairly rare
• have tables of single, double and triple letter
frequencies for various languages
• then attack each monoalphabetic cipher • but can still attack frequency characteristics …
individually using same techniques as before
Vernam Cipher
• ultimate defense is to use a key as long as
the plaintext
• with no statistical relationship to it
• invented by AT&T engineer Gilbert
Vernam in 1918
• originally proposed using a very long but
eventually repeating key
One-Time Pad Transposition Ciphers
• if a truly random key equally as long as the • now consider classical transposition or
message is used, the cipher will be secure permutation ciphers
• called a One-Time pad
• these hide the message by rearranging
• is unbreakable since ciphertext bears no the letter order
statistical relationship to the plaintext
• since for any plaintext and any ciphertext
• without altering the actual letters used
there exists a key mapping one to other • can recognise these since have the same
• can only use the key once though frequency distribution as the original text
• problems in generation & safe distribution of key