Professional Documents
Culture Documents
Ic 04 2018 en
Ic 04 2018 en
COMMUNICATIONS
COURSE no. 4
• Cryptografic Algorithms
• Plaintext
• Ciphertext
• Key
• Cryptanalysis
• Cryptographic Attacks
10/24/2018 Luminita Scripcariu 23
Cryptographic Techniques
• Symmetric-key techniques – use private keys
DES, TDES, IDEA, AES, RC4
substitution techniques
transposition techniques
• Asymmetric-key techniques – Public-Key
Cryptography use public encryption keys but
private decryption keys
e.g. RSA, El Gamal, Backpack Algorithm
10/24/2018 Luminita Scripcariu 24
Acronyms
• DES – Data Encryption Standard
• TDES = 3DES – Triple DES
• AES – Advanced Encryption Standard
• IDEA – International Data Encryption
Algorithm
• RC - Rivest Cipher 4
• RSA – Rivest, Shamir, Adleman
Output: 101010111
10/24/2018 Luminita Scripcariu 33
PROPOSED EXERCISE
Let us consider p=3, q=7 and the RSA algorithm.
1. Calculate the component n of the PK, the
Euler’s totient function and the encryption
exponent e.
2. Encrypt the decimal value M = 3 using RSA
algorithm.
3. Convert the encrypted value in binary form.
Li 1 Ri Ri 1 Li f ( Ri , Ki )
Feistel function (f) expands the half-block data sequence from
32 bits to 48 bits, applies the subkey and compresses the
result back to 32 bits with 8 shift-boxes (called S-boxes).
10/24/2018 Luminita Scripcariu 43
4. FINAL PERMUTATION
• ASCII Codes:
• Ciphertext:
[t e l e c o m]
• Robustness
• GF(8) = {0, 1, 2, 3, 4, 5, 6, 7}
• p(x)=x3 +x +1
• m=3 (3-bit symbols)
1 001 1 1
2 010 x α
3 011 x+1 α3
4 100 x2 α2
5 101 x2+1 α6
6 110 x2+x α4
7 111 x2+x+1 α5
• Calculate in GF(8):
(1+3*5+6^2)/7
C = [7 4 4 7 0 3 3]