Beruflich Dokumente
Kultur Dokumente
2.3 Cryptography
2.3.1 Classification of Cryptosystems
2.3.1.1 Symmetric and Asymmetric
Distribution Keys
2.3.1.2 Block and Stream Cipher
2.3.1.3 Hardware versus Software
Implementation
Another solution is to generate one-time pads for encryption with the help of
a single key and various chaining algorithms. But since encryption
algorithms are publicly known, the above procedure critically depends on the
security of the single key. The idea of using mathematical functions for
generating multiple keys or one time pads has been largely unexplored.
Some such functions are suggested in [euro].
The advent of the Internet has made security of data and protection of
privacy a major cause concern for everyone. Therefore increasing efforts
have been made to use chaotic systems for enhancing some features of
communications systems. The highly unpredictable and random-look nature
of chaotic signals is the most attractive feature of deterministic chaotic
systems that may lead to novel (engineering) applications. Chaos and
cryptography have some common features, the most prominent being
sensitivity to variable and parameter changes. During the past decade a
large number of chaos-based encryption systems has been suggested and
investigated. The idea behind is to use complex dynamics but simple
mathematical descriptions and algorithms of chaotic systems for the purpose
of encryption
2.
Description of Chaos &
Cryptography
(1) When r ∈ [0,3.57] , the points concentrate on several values and could
not be used for our cryptosystem.
(2) For r ∈ [3.57,4] , the logistic map exhibits chaotic behavior. So it can
be used for our cryptosystem.
Fig 2 Analysis of logistic map: Iteration property when (a) r = 2.8 (b) r =
3.2 (c) r = 3.8
The close relationship between chaos and cryptography makes chaos based
cryptographic algorithms as a natural candidate for design of chaos based
encryption techniques which are good for practical use as these techniques
provide a good combination of speed, high security, complexity, reasonable
computational overheads and computational power etc.
Firstly, being completely deterministic means that we can always obtain the
same set of values provided we have exactly the same mapping function and
initial value. Compared to using conventional random number generators
where the string of random numbers cannot be regenerated, chaos allows us
to repeat the same string of numbers as long as we have the mapping
function and initial value used. The apparent randomness of the system also
makes attacks such as the ‘codebook’ attack impossible.
Next, since chaotic functions are sensitive to initial conditions, any slight
difference in the initial value used will mean that the cipher-text produced
using chaos will be drastically different. This means that the system will be
‘strong’ against brute force attacks as the number of possible keys is
astronomical given that the precision of the initial values, which depends on
the hardware used, is high.
Confusion seeks to reduce the correlation between the input plaintext and
the output ciphertext. The task is generally accomplished substituting every
fundamental block of data for another one according to the rules dictated by
the cryptographic algorithm. Despite this, repetitions or well-known
sequence of blocks in the plaintext are still kept at the output. This problem
is addressed by diffusion: a data on the input block is transposed to other
coordinates on the output block. Put in another way, diffusion changes the
position of data, while, during a confusion process, the data itself is modified.
It is to be observed that diffusion implies a block cipher, whereas confusion
can deal with streams of data, as well
2.3 CRYPTOGRAPHY
E (M) = C
D (C) = M
Two different keys ke and kd for encryption and decryption might be used. In symbols:
Eke (M) = C
Dkd (C) = M
Finally, a cryptosystem is an algorithm plus all possible plaintexts, cipher-texts and keys.
Contrarily, the asymmetric method makes use of a pair of keys for each
individual — one public and the other private.
Besides ECB and CBC, Ciphertext Feedback (CFB) represents a mode to run
block ciphers as stream ciphers. This statement means that output values
from a cryptosystem are serialized as in a stream cipher, but rely somehow
on the previous computed values as in a block cipher. The mechanism used
to realize this mode generally consists of a shift register into which new
values are pushed and on which the encryption algorithm depends.
There is no theory which proves the strength for any conventional cipher,
Therefore ciphers have been traditionally regarded "strong" when they have
been used for a long time with no known easy method to break them.
Cryptanalysis seeks to improve this process by testing the ciphers against
certain known attack strategies and also looking for new attack strategies.
But while cryptanalysis can show the "weakness" of the ciphers against
certain attacks, it cannot prove that there is no simpler attack: “Lack of
proof of weakness is not proof of strength”. We cannot assume that a
particular cryptographic system is ‘strong’ just because we cannot find
weakness in the system. This is because there may be vulnerabilities in the
system that is not discovered yet and may be exposed with the advance in
technology. We can only show the strength of the system against known
attacks at the moment
2.3.3.2 Codebook
One simply tries to build or collect a codebook of all the possible
transformations between plaintext(original message) and ciphertext under a
single key. This is the classic approach we normally think of as "code-
breaking". Such attacks can be defeated if the plaintext data are randomized
and thus evenly and independently distributed among the possible values.
4. Hosam El-din et.al, “An Efficient Chaos based Feedback Stream Cipher
for image Encryption and Decryption, Informatica, 2007.