Question 3 -
Explain different characteristics that identify a good encryption technique.
Several characteristics that identify a good Encryption technique.
The implementation of the process should be as simple as possible. Principle 3 wasformulated with hand implementation in mind: A complicated algorithm is prone toerror or likely to be forgotten. With the development and popularity of digitalcomputers, algorithms far too complex for hand implementation became feasible.Still, the issue of complexity is important. People will avoid an encryption algorithmwhose implementation process severely hinders message transmission, therebyundermining security. And a complex algorithm is more likely to be programmedincorrectly.
The enciphering algorithm and set of keys used should be less complex. Thisprinciple implies that we should restrict neither the choice of keys nor the types of plaintext on which the algorithm can work. For instance, an algorithm that works onlyon plaintext having an equal number of As and Es is useless. Similarly, it would bedifficult to select keys such that the sum of the values of the letters of the key is aprime number. Restrictions such as these make the use of the enciphermentprohibitively complex. If the process is too complex, it will not be used. Furthermore,the key must be transmitted, stored, and remembered, so it must be short.
The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption. Principle 1 is a reiteration of the principle of timelinessand of the earlier observation that even a simple cipher may be strong enough todeter the casual interceptor or to hold off any interceptor for a short time.
Errors in ciphering should not propagate and cause corruption of further informationin the message. Principle 4 acknowledges that humans make errors in their use of enciphering algorithms. One error early in the process should not throw off the entireremaining ciphertext.
The size of the original message and that of enciphered text should be at most same.The idea behind principle 5 is that a ciphertext that expands dramatically size cannotpossibly carry more information than the plaintext, yet it gives the cryptanalyst moredata from which to infer a pattern. Furthermore, a longer ciphertext implies morespace for storage and more time to communicate.