Professional Documents
Culture Documents
03/12/22
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
INTRODUCTION
Topics to be discussed
Definitions
Two Categories
30.2
Cryptography components
30.3
Categories of cryptography
30.4
Symmetric-key cryptography
30.5
Note
30.7
Comparison between two categories of cryptography
30.8
SYMMETRIC-KEY CRYPTOGRAPHY
Topics to be discussed
Classical / Traditional Ciphers
30.9
Figure 30.7 Traditional ciphers
30.10
Note
30.11
3.2.1 Monoalphabetic Ciphers
Note
3.12
3.2.1 Continued
Example 3.1
The following shows a plaintext and its corresponding ciphertext.
The cipher is probably monoalphabetic because both l’s (els) are
encrypted as O’s.
Example 3.2
The following shows a plaintext and its corresponding ciphertext.
The cipher is not monoalphabetic because each l (el) is encrypted
by a different character.
3.13
3.2.1 Continued
Additive Cipher
3.14
3.2.1 Continued
Figure 3.9 Additive cipher
Note
Solution
We apply the encryption algorithm to the plaintext, character by
character:
3.16
3.2.1 Continued
Example 3.4
Solution
We apply the decryption algorithm to the plaintext character by
character:
3.17
3.2.1 Continued
Shift Cipher and Caesar Cipher
Historically, additive ciphers are called shift ciphers. Julius
Caesar used an additive cipher to communicate with his officers.
For this reason, additive ciphers are sometimes referred to as the
Caesar cipher. Caesar used a key of 3 for his communications.
Note
3.18
Cryptanalysis
3.19
Cryptanalysis of Caesar Cipher
only have 26 possible ciphers
A maps to A,B,..Z
could simply try each in turn
a brute force search
given ciphertext, just try all shifts of letters
do need to recognize when have plaintext
eg. break ciphertext "GCUA VQ DTGCM"
Note
30.21