Professional Documents
Culture Documents
Classical Encryption
Techniques
Ø ciphertext only
l only know algorithm & ciphertext, is statistical, know or can
identify plaintext
Ø known plaintext
l know/suspect plaintext & ciphertext
Ø chosen plaintext
l select plaintext and obtain ciphertext
Ø chosen ciphertext
l select ciphertext and obtain plaintext
Ø chosen text
l select plaintext or ciphertext to en/decrypt
More Definitions
Ø unconditional security
l no matter how much computer power or time is
available, the cipher cannot be broken since the
ciphertext provides insufficient information to
uniquely determine the corresponding plaintext
Ø computational security
l given limited computing resources (eg time
needed for calculations is greater than age of
universe), the cipher cannot be broken
Brute Force Search
168 2168 = 3.7 ´ 1050 2167 µs = 5.9 ´ 1036 years 5.9 ´ 1030 years
26 characters 26! = 4 ´ 1026 2 ´ 1026 µs = 6.4 ´ 1012 years 6.4 ´ 106 years
(permutation)
Classical Substitution Ciphers
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Monoalphabetic Cipher Security
u given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
u count relative letter frequencies (see text)
u guess P & Z are e and t
u guess ZW is th and hence ZWP is the
u proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
Steganography
u an alternative to encryption
u hides existence of message
u using only a subset of letters/words in a longer
message marked in some way
u using invisible ink
u hiding in LSB in graphic image or sound file
u has drawbacks
u high overhead to hide relatively few info bits
u advantage is can obscure encryption use
Block vs Stream Ciphers
Ø block size
Ø key size
Ø number of rounds
Ø subkey generation algorithm
Ø round function
Ø fast software en/decryption
Ø ease of analysis
Data Encryption Standard (DES)