Beruflich Dokumente
Kultur Dokumente
Basic Concepts Models of Encryption and Decryption Classical Encryption Methods Substitution Techniques Transposition Techniques
Information Security
Basic Concepts
plaintext: the original clear message ciphertext: the transformed message cipher: an algorithm for transforming or encrypting or ciphering a clear message into ciphertext with which any unauthorized party cannot find the plaintext. key: a data unit used for encryption or decryption.
Information Security
Basic Concepts
encipher/encrypt: the process of converting plaintext to ciphertext using a cipher and a key. decipher/decrypt: the process of converting ciphertext back into plaintext using a cipher and a key.
Information Security
Basic Concepts
cryptography: the science/maths of transforming a plaintext into a ciphertext and then transforming the ciphertext back into the plaintext. cryptographic systems are characterized as: The type of operations used for transforming plain text to ciphertext. The number of keys used. The way in which the plaintext is processed.
Information Security
Basic Concepts
cryptanalysis: the study of transforming a ciphertext back into the original plaintext without knowledge of the key. There are two general approaches to attack a conventional scheme: Cryptanalysis Brute-force attack cryptology: both cryptography and cryptanalysis.
Information Security
Information Security
Asymmetric
e.g. RSA
Information Security
Information Security
Notation
Information Security
Substitution: the letters of plaintext are replaced by other letters or numbers of symbols Transposition: the letters of plaintext are reordered
Information Security Chapter 2 Classical Encryption Methods
10
Caesar Cipher
Substitution: a letter is replaced by another letter or symbol Example: Move each letter of the alphabet to the letter three to the right in the predetermined order of the letters of the alphabet. A D, B E, C F, Caesar cipher moves the ith letter of an alphabet to the i+kth letter. a=0, b=1, c=2,...,Pi=i,...
Encryption C= E(Pi) = i+ k(mod 26) Decryption Pi = D(C)= C-k (mod 26)
Example:
Information Security
11
Information Security
12
Information Security
13
Information Security
14
Monoalphabetic Cipher with a Key A better cipher: increase the key space, allow an arbitrary substitution Let KEY be the key
ABCDEFGHIJKLMNOPQRSTUVWXYZ KEYABCDFGHIJLMNOPQRSTUVWXZ
Example
HELLO
Information Security
FBJJN
15
16
Example
I KNOW ONLY THAT I KNOW NOTHING H UINF NIAP OCSO H UINF INOCHIT
Information Security
17
General Monoalphabetic Cipher Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet A countermeasure is to provide multiple substitutes, known as homophones, for a single letter. e.g: letter e be assigned different cipher symbols such as: 16,74,35 and 21, with each homophone used in rotation
Information Security Chapter 2 Classical Encryption Methods
18
S X
R D K T Z
Information Security
19
Playfair Cipher
The plaintext is encrypted a pair at a time, left over one needs to be paired by a filler letter. Repeating letters of the same pair are separated with a filler letter. Letters of a pair that fall in the same row are each replaced by the letter to the right. The row is circular with the 1st letter following the last one. Letters of a pair that fall in the same column are each replaced by the letter beneath. The column is circular with the 1st letter following the last one. Otherwise, each plaintext letter is replaced by the letter that lies in its own row and the column occupied by the other plaintext letter.
Information Security Chapter 2 Classical Encryption Methods
20
Playfair Cipher
An example: Whats the cipher text for encrypting Playfair Cipher by Playfair Cipher? Pair combination: pl ay fa ir ci ph er no filler letter needed.
Information Security
21
Information Security
22
Hill Cipher
this can be expressed in terms of column vector and matrices: c1 k11 k12 k13 p1 c2 = k21 k22 k23 p2 mod 26 c3 k31 k32 k33 p3 or C=KP mod 26
Information Security
23
Information Security
24
25
26
Transposition Techniques
More complex one: write the message in a rectangle, row by row, read off column by column but permute the order of the columns Example: plaintext:
2 C U S R 4 O T E I 1 M E C T 3 P R U Y
encryption
decryption
2 M E C T
4 C U S R
1 P R U Y
3 O T E I
key ciphertext
COMPUTERSECURITY MECTCUSRPRUYOTEI Note: If the message length is not a multiple of a row, the last column is not full. Some infrequent letter(s) should be filled.
Information Security Chapter 2 Classical Encryption Methods
27
One-Time Pad
An encryption scheme (by Joseph Mauborgne,AT&T). What is one-time pad? A large non-repeating set of truly random key letters as long as the message, written on sheets of paper, and glued together in a pad. Encryption: Ciphertext_letter = (Plaintext_letter + Key_letter) mod 26 Ciphertext_bit = Plaintext_bit Key_bit Decryption: Plaintext_letter = ( Ciphertext_letter - Key_letter) mod 26 Plaintext_bit = Ciphertext_bit Key_bit
Information Security Chapter 2 Classical Encryption Methods
28
One-Time Pad
n o f
+
t b
t b f
on
One-Time Pad
Each letter is used exactly once, for only one message. The sender encrypts the message and then destroys the used pages of the pad or used section of the tape. The receiver has an identical pad and uses the key on the pad. The receiver destroys the same pad pages or tape section after decrypting the message. A given ciphertext message is equally likely to correspond to any possible plaintext message of equal size. Since every key sequence is equally likely, an opponent has no information with which to cryptanalyse the ciphertext.
Information Security Chapter 2 Classical Encryption Methods
30