Академический Документы
Профессиональный Документы
Культура Документы
Plaintext
the original intelligible message or data that is fed into the algorithm as input.
Encryption algorithm
performs various substitutions and transformations on the plaintext
Secret key
a value independent of the plaintext and of the algorithm which helps the algorithm to produce a different output depending on the
one being used at the time
Ciphertext
the scrambled message produced as output
Decryption algorithm
essentially the encryption algorithm run in reverse
Rely on the nature of the algorithm plus Attacker tries every possible key on a piece of
perhaps some knowledge of the general ciphertext until an intelligible translation into
characteristics of the plaintext or even some plaintext is obtained
sample plaintext-ciphertext pairs
Type of attack Known to cryptanalyst Type of attack Known to cryptanalyst
Key size (bits) Number of alternative keys Time required at 1 decryption/ms Time required at 106
decryption/ms
C = E(k, p) = (p + k) mod 26
c
helloworld jgnnqyqtnfb
Decryption: p = D(k, C) = (C - k) mod 26
1. Repeating plaintext letters that are in the same pair are separated with a filler letter, such as x,
2. Two plaintext letters that fall in the same row of the matrix are each replaced by the letter to
the right, with the first element of the row circularly following the last. For example, ar is
encrypted as RM.
3. Two plaintext letters that fall in the same column are each replaced by the letter beneath, with
the top element of the column circularly following the last. For example, mu is encrypted as
CM.
4. Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and
the column occupied by the other plaintext letter. Thus, hs becomes BP and ea becomes IM
(or JM, as the encipherer wishes). UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
Hill Cipher
C = KP mod 26
P = K-1C mod 26
• Poly-alphabetic
Key : deceptivedeceptivedeceptive
Plaintext : wearediscoveredsaveyourself
Ciphertext : ZICVTWQNGRZGVTWAVZHCQYGLMGJ
Image Source:
https://pages.mtu.edu/~shen
e/NSF-4/Tutorial/VIG/Vig-
Base.html
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
ASCII Table
XOR 0xA1 2F A1 2F A1 2F On following the similar procedure we obtain the cipher text as
0xE9 4A CD 43 CE 0E
Regardless of any prior information, the attacker has about the plaintext, the ciphertext should leak no additional
information about the plaintext.
Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS
Ciphertext : ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS
Key : mfugpmiydgaxgoufhklllmhsqdqogtewbqfgyovuhwt
In theory, we need look no further for a cipher. The one-time pad offers complete security but, in practice, has two
fundamental difficulties:
1. There is the practical problem of making large quantities of random keys. Supplying truly random characters in this
volume is a significant task.
2. The problem of key distribution and protection. For every message to be sent, a key of equal length is needed by
both sender and receiver.
Rail-fence Cipher
Key : 2
m e m a t r h t g p r y
e t e f e t e o a a t
• Character marking
• Invisible ink
• Pin punctures
Stream Cipher
• Encrypts a digital data stream one bit or one byte at a time
• Example: Vigenère cipher, Vernam Cipher
Block Cipher
• A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length
• Example: Data Encryption Standard
• Proposed by Feistel
• Execution of two or more ciphers in a sequence in such a way that the result or product is cryptographically stronger
• Use of cipher that alternates substitutions and permutations
• Practical application of a proposal by Claude Shannon to develop a product cipher that alternated diffusion and
confusion functions
Make
Make the
the relationship
relationship The
The statistical
statistical structure
structure
between Each
Each plaintext
plaintext element
element AA sequence
sequence of of
between thethe statistics
statistics of
of the
the plaintext
plaintext isis
of or
or group
group ofof elements
elements plaintext
plaintext elements isis
elements
of the ciphertext and
the ciphertext and dissipated
dissipated into
into long-
long-
the isis uniquely
uniquely replaced
replaced replaced
replaced by
by aa
the value of the
value of the range
range statistics of the
statistics of the
encryption by
by aa corresponding
corresponding permutation
permutation of of that
that
encryption key key as as ciphertext.
ciphertext.
complex as possible ciphertext
ciphertext element
element or
or sequence.
sequence. That is,
That is,
complex as possible
group
group of
of elements.
elements. no
no elements
elements are are
added
added or or deleted
deleted or or
replaced
replaced in
in the
the
sequence,
sequence, rather
rather the
the
order
order inin which
which the the
elements
elements appear
appear in in
the sequence
the sequence is is
changed.
changed.
Block size
• Larger block sizes mean greater security (Reasonable size: 64/128-bit block)
Key size
• Larger key size means greater security (Reasonable size: 64/128 bits)
Number of rounds
• Multiple rounds offer increased security
Subkey generation algorithm
• Greater complexity in this algorithm leads to greater difficulty of cryptanalysis
Round function F
• Greater complexity generally leads to greater resistance to cryptanalysis
Ease of analysis
• If the algorithm can be concisely and clearly explained, it is easier to analyze that algorithm for cryptanalytic
vulnerabilities and therefore develop a higher level of assurance as to its strength
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.
Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.