Classical Encryption

Total Page:16

File Type:pdf, Size:1020Kb

Classical Encryption Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 2: Classical encryption Ion Petre Department of IT, Åbo Akademi University January 10, 2012 http://users.abo.fi/ipetre/crypto/ 1 Overview of the course I. CRYPTOGRAPHY III. NETWORK SECURITY Secret-key cryptography Email security Classical encryption techniques IP security DES, AES, RC5, RC4 Web security (SSL, secure Public-key cryptography electronic transactions) RSA Firewalls Key management Wireless security II. AUTHENTICATION IV. OTHER ISSUES MAC Viruses Hashes and message digests Digital cash Digital signatures Secret sharing schemes Kerberos Zero-knowledge techniques January 10, 2012 http://users.abo.fi/ipetre/crypto/ 2 Part I. Cryptography Will cover more than half of this course I.1 Secret-key cryptography Also called symmetric or conventional cryptography Five ingredients Plaintext Encryption algorithm: runs on the plaintext and the encryption key to yield the ciphertext Secret key: an input to the encryption algorithm, value independent of the plaintext; different keys will yield different outputs Ciphertext: the scrambled text produced as an output by the encryption algorithm Decryption algorithm: runs on the ciphertext and the key to produce the plaintext Requirements for secure conventional encryption Strong encryption algorithm An opponent who knows one or more ciphertexts would not be able to find the plaintexts or the key Ideally, even if he knows one or more pairs plaintext-ciphertext, he would not be able to find the key Sender and receiver must share the same key. Once the key is compromised, all communications using that key are readable It is impractical to decrypt the message on the basis of the ciphertext plus the knowledge of the encryption algorithm encryption algorithm is not a secret January 10, 2012 http://users.abo.fi/ipetre/crypto/ 3 Cryptography – some notations Notation for relating the plaintext, ciphertext, and the keys C=EK(P) denotes that C is the encryption of the plaintext P using the key K P=DK(C) denotes that P is the decryption of the ciphertext C using the key K Then DK(EK(P))=P January 10, 2012 http://users.abo.fi/ipetre/crypto/ 4 Caesar Cipher It is a typical substitution cipher and the oldest known – attributed to Julius Caesar Simple rule: replace each letter of the alphabet with the letter standing 3 places further down the alphabet Example: MEET ME AFTER THE TOGA PARTY PHHW PH DIWHU WKH WRJD SDUWB Here the key is 3 – choose another key to get a different substitution The alphabet is wrapped around so that after Z follows A: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C January 10, 2012 http://users.abo.fi/ipetre/crypto/ 5 Caesar cipher Mathematically, give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 The key is a number from to 25 Caesar cipher can now be given as E(p) = (p + k) mod (26) D(C) = (C – k) mod (26) January 10, 2012 http://users.abo.fi/ipetre/crypto/ 6 Attacking Caesar Caesar can be broken if we only know one pair (plain letter, encrypted letter) The difference between them is the key Caesar can be broken even if we only have the encrypted text and no knowledge of the plaintext Brute-force attack is easy: there are only 25 keys possible Try all 25 keys and check to see which key gives an intelligible message January 10, 2012 http://users.abo.fi/ipetre/crypto/ 7 Why is Caesar easy to break? Only 25 keys to try The language of the plaintext is known and easily recognizable What if the language is unknown? What if the plaintext is a binary file of an unknown format? From Stallings – “Cryptography and Network Security” January 10, 2012 http://users.abo.fi/ipetre/crypto/ 8 Strengthening Caesar: monoalphabetic ciphers Caesar only has 25 possible keys – far from secure Idea: instead of shifting the letters with a fixed amount how about allowing any permutation of the alphabet Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: if we wish to replace letters Ciphertext: WI RF RWAJ UH YFTSDVF SFUUFYA This is called monoalphabetic susbstitution cipher – a single alphabet is used The increase in the number of keys is dramatic: 26!, i.e., more than 4x1026 possible keys Compare: DES only has an order of 1016 possible keys January 10, 2012 http://users.abo.fi/ipetre/crypto/ 9 How large is large? Reference Order of magnitude Seconds in a year ≈ 3 x 107 Age of our solar system (years) ≈ 6 x 109 Seconds since creation of solar system ≈ 2 x 1017 Clock cycles per year, 3 GHz computer ≈ 9.6 x 1016 Binary strings of length 64 264 ≈ 1.8 x 1019 Binary strings of length 128 2128 ≈ 3.4 x 1038 Binary strings of length 256 2256 ≈ 1.2 x 1077 Number of 75-digit prime numbers ≈ 5.2 x 1072 Electrons in the universe ≈ 8.37 x 1077 Adapted from Handbook of Applied Cryptography (A.Menezes, P.van Oorschot, S.Vanstone), 1996 January 10, 2012 http://users.abo.fi/ipetre/crypto/ 10 Monoalphabetic ciphers Having 1016 possible keys appears to make the system challenging: difficult to perform brute-force attacks There is however another line of attack that easily defeats the system even when a relatively small ciphertext is known If the cryptanalyst knows the nature of the text, e.g., noncompressed English text, then he can exploit the regularities of the language January 10, 2012 http://users.abo.fi/ipetre/crypto/ 11 Language redundancy and cryptanalysis Human languages are redundant Letters are not equally commonly used In English E is by far the most common letter Followed by T,R,N,I,O,A,S Other letters are fairly rare See Z,J,K,Q,X Tables of single, double & triple letter frequencies exist Most common digram in English is TH Most common trigram in English in THE January 10, 2012 http://users.abo.fi/ipetre/crypto/ 12 English Letter Frequencies January 10, 2012 http://users.abo.fi/ipetre/crypto/ 13 Cryptanalysis of monoalphabetic ciphers Key concept - monoalphabetic substitution ciphers do not change relative letter frequencies Discovered by Arabs in the 9th century Calculate letter frequencies for ciphertext Compare counts/plots against known values Most frequent letter in the ciphertext may well encrypt E The next one could encrypt T or A After relatively few tries the system is broken If the ciphertext is relatively short (and so, the frequencies are not fully relevant) then more guesses may be needed Powerful tool: look at the frequency of two-letter combinations (digrams) January 10, 2012 http://users.abo.fi/ipetre/crypto/ 14 Example of cryptanalysis Ciphertext: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZVUEPHZHMDZSHZOWSFPAPPDTSVPQUZ WYMXUZUHSXEPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ Count relative letter frequencies: P is the most frequent (13.33%), followed by Z (11.67), S (8.33), U (8.33), O (7.5), M (6.67), H (5.83), etc. Guess P and Z stand for E and T but the order is not clear because of small difference in the frequency The next set of letters {S,U, O, M, H} may stand for {A, H, I, N, O, R, S} but again it is not completely clear which is which One may try to guess and see how the text translates Also, a good guess is that ZW, the most common digram in the ciphertext, is TH, the most common digram in English: thus, ZWP is THE Proceed with trial and error and finally get after inserting the proper blanks: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in moscow January 10, 2012 http://users.abo.fi/ipetre/crypto/ 15 Some conclusions after this cryptanalysis Monoalphabetic ciphers are easy to break because they reflect the frequency of the original alphabet Essential to know the original alphabet Countermeasure: provide multiple substitutes for a given letter Highly frequent letters such as E could be encrypted using a larger number of letters than less frequent letters such as Z: to encrypt E one could choose either one of, say 15 fixed letters, and to encrypt Z one could choose either one of, say 2 fixed letters The number of encryptions for a letter may be proportional with the frequency rate in the original language (English) This would hide the letter-frequency information However: Multiple-letter patterns (digrams, trigrams, etc) survive in the text providing a tool for cryptanalysis Each element of the plaintext only affects one element in the ciphertext Longer text needed for breaking the system, but cryptanalysis still relatively straightforward January 10, 2012 http://users.abo.fi/ipetre/crypto/ 16 Measures to hide the structure of the plaintext 1. Encrypt multiple letters of the plaintext at once 2. Use more than one substitution in encryption and decryption (polyalphabetic ciphers) Consider both these approaches in the following January 10, 2012 http://users.abo.fi/ipetre/crypto/ 17 Playfair Cipher The Playfair Cipher is an example of multiple-letter encryption Invented by Sir Charles Wheatstone in 1854, but named after his friend Baron Playfair who championed the cipher at the British foreign office Based on the use of a 5x5 matrix in which the letters of the alphabet are written (I is considered the same as J) This is called key matrix January 10, 2012 http://users.abo.fi/ipetre/crypto/ 18 Playfair key matrix A 5X5 matrix of letters based on a keyword Fill in letters of keyword (no duplicates) Left to right, top to bottom Fill the rest of matrix with the other letters in alphabetic order E.g.
Recommended publications
  • Introduction to Cryptography Teachers' Reference
    Introduction to Cryptography Teachers’ Reference Dear Teachers! Here I have mentioned some guidelines for your good self so that your students can benefit form these modules. I am very hopeful that you will enjoy conducting the session. After Module-1 1. Scytale Decryption In your class ask your students to devise a method to decrypt the message just been encrypted using Scytale. Encourage them to look around to find a decryption tool. Ask your students to cut a strip of paper some 4mm wide, 32cm long and light pencil lines drawn on it at 4mm distance. To give it the following shape. Now write cipher text on the paper strip in the following way. t i t i r s a e e e e e b h y w i t i l r f d n m g o e e o h v n t t r a a e c a g o o w d m h Encourage them once again to find a tool around them to decrypt it. Ask them to look for a very familiar thing they must have been using right from their early school days to do their work. Now many of them must have figured out that you are asking for a pencil. Now ask them to use the pencil to decrypt the cipher text by using pencil and the only reasonable way would be to wrap the paper strip around the strip. The plain text will be visible along the six side faces of the pencil. Encourage them to reason that how did it work? There is a connection between six rows of the table in which the plain text was filled and the six faces of the pencil.
    [Show full text]
  • International Journal for Scientific Research & Development
    IJSRD - International Journal for Scientific Research & Development| Vol. 6, Issue 03, 2018 | ISSN (online): 2321-0613 Designing of Decryption Tool Shashank Singh1 Vineet Shrivastava2 Shiva Agrawal3 Shakti Singh Rawat4 1,3,4Student 2Assistant Professor 1,2,3,4Department of Information Technology 1,2,3,4SRM Institute of Science & Technology, India Abstract— In the modern world secure transmission of the r = gk mod p data is very important. Many modern day cryptographic methods can be used to encrypt the message before C. Decryption of the Cipher-text transmitting in the secured medium. In certain situations like The receiver with his private key calculates when there is matter of national security the information t. r−x encrypted has to be decrypted, it is where the cryptanalysis which gives the plaintext. comes into play. Cryptanalysis is the field of Cryptography in But in this algorithm, as there is just one private key, it can which various types of Cryptographic techniques are be guessed by any intruder and is thus not reliable. carefully studied in order to reverse engineer the encrypted information in order to retrieve the sensible information. The III. PROBLEM SOLUTION main aim and function of the Decryption tool is to take the In this project we are modifying the existing conventional input as the encrypted text given from the user and encryption algorithm by dividing the private key and cryptanalyze it and give the output as the decrypted text in assigning them to 2n+1 authorized receivers individually. case more than one sensible decrypted text found it will The persons will be able to decrypt the message received output all the possible decrypted texts.
    [Show full text]
  • Enhancing the Security of Caesar Cipher Substitution Method Using a Randomized Approach for More Secure Communication
    International Journal of Computer Applications (0975 – 8887) Volume 129 – No.13, November2015 Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication Atish Jain Ronak Dedhia Abhijit Patil Dept. of Computer Engineering Dept. of Computer Engineering Dept. of Computer Engineering D.J. Sanghvi College of D.J. Sanghvi College of D.J. Sanghvi College of Engineering Engineering Engineering Mumbai University, Mumbai, Mumbai University, Mumbai, Mumbai University, Mumbai, India India India ABSTRACT communication can be encoded to prevent their contents from Caesar cipher is an ancient, elementary method of encrypting being disclosed through various techniques like interception plain text message into cipher text protecting it from of message or eavesdropping. Different ways include using adversaries. However, with the advent of powerful computers, ciphers, codes, substitution, etc. so that only the authorized there is a need for increasing the complexity of such people can view and interpret the real message correctly. techniques. This paper contributes in the area of classical Cryptography concerns itself with four main objectives, cryptography by providing a modified and expanded version namely, 1) Confidentiality, 2) Integrity, 3) Non-repudiation for Caesar cipher using knowledge of mathematics and and 4) Authentication. [1] computer science. To increase the strength of this classical Cryptography is divided into two types, Symmetric key and encryption technique, the proposed modified algorithm uses Asymmetric key cryptography. In Symmetric key the concepts of affine ciphers, transposition ciphers and cryptography a single key is shared between sender and randomized substitution techniques to create a cipher text receiver. The sender uses the shared key and encryption which is nearly impossible to decode.
    [Show full text]
  • Download Download
    International Journal of Integrated Engineering: Special Issue 2018: Data Information Engineering, Vol. 10 No. 6 (2018) p. 183-192. © Penerbit UTHM DOI: https://doi.org/10.30880/ijie.2018.10.06.026 Analysis of Four Historical Ciphers Against Known Plaintext Frequency Statistical Attack Chuah Chai Wen1*, Vivegan A/L Samylingam2, Irfan Darmawan3, P.Siva Shamala A/P Palaniappan4, Cik Feresa Mohd. Foozy5, Sofia Najwa Ramli6, Janaka Alawatugoda7 1,2,4,5,6Information Security Interest Group (ISIG), Faculty Computer Science and Information Technology University Tun Hussein Onn Malaysia, Batu Pahat, Johor, Malaysia E-mail: [email protected], [email protected], {shamala, feresa, sofianajwa}@uthm.edu.my 3School of Industrial Engineering, Telkom University, 40257 Bandung, West Java, Indonesia 7Department of Computer Engineering, University of Peradeniya, Sri Lanka E-mail: [email protected] Received 28 June 2018; accepted 5August 2018, available online 24 August 2018 Abstract: The need of keeping information securely began thousands of years. The practice to keep the information securely is by scrambling the message into unreadable form namely ciphertext. This process is called encryption. Decryption is the reverse process of encryption. For the past, historical ciphers are used to perform encryption and decryption process. For example, the common historical ciphers are Hill cipher, Playfair cipher, Random Substitution cipher and Vigenère cipher. This research is carried out to examine and to analyse the security level of these four historical ciphers by using known plaintext frequency statistical attack. The result had shown that Playfair cipher and Hill cipher have better security compare with Vigenère cipher and Random Substitution cipher.
    [Show full text]
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • Simple Substitution Cipher Evelyn Guo
    Simple Substitution Cipher Evelyn Guo Topic: Data Frequency Analysis, Logic Curriculum Competencies: • Develop thinking strategies to solve puzzles and play games • Think creatively and with curiosity and wonder when exploring problems • Apply flexible and strategic approaches to solve problems • Solve problems with persistence and a positive disposition Grade Levels: G3 - G12 Resource: University of Cambridge Millennium Mathematics Project - NRICH https://nrich.maths.org/4957 Cipher Challenge Toolkit https://nrich.maths.org/7983 Practical Cryptography website http://practicalcryptography.com/ciphers/classical-era/simple- substitution/ Materials: Ipad and Laptop which could run excel spreadsheet. Flip Chart with tips and hints for different levels of players Booklet flyers for anyone taking home. Printed coded message and work sheet (help sheet) with plain alphabet and cipher alphabet (leave blank) Pencils Extension: • Depends on individual player’s interest and math abilities, introduce easier (Atbash Cipher, Caesar Cipher) or harder ways ( AutoKey Cipher) to encrypt messages. • Introduce students how to use the practical cryptography website to create their own encrypted message instantly. • Allow players create their own cipher method. • Understand in any language some letters tend to appear more often than other letters Activity Sheet for Substitution Cipher Opening Question: Which Letters do you think are the most common in English? Start by performing a frequency analysis on some selected text to see which letters appear most often. It is better to use longer texts, as a short text might have an unusual distribution of letters, like the "quick brown fox jumps over the lazy dog" Introduce the Problem: In the coded text attached, every letter in the original message was switched with another letter.
    [Show full text]
  • What Is a Cryptosystem?
    Cryptography What is a Cryptosystem? • K = {0, 1}l • P = {0, 1}m • C′ = {0, 1}n,C ⊆ C′ • E : P × K → C • D : C × K → P • ∀p ∈ P, k ∈ K : D(E(p, k), k) = p • It is infeasible to find F : P × C → K Let’s start again, in English. Steven M. Bellovin September 13, 2006 1 Cryptography What is a Cryptosystem? A cryptosystem is pair of algorithms that take a key and convert plaintext to ciphertext and back. Plaintext is what you want to protect; ciphertext should appear to be random gibberish. The design and analysis of today’s cryptographic algorithms is highly mathematical. Do not try to design your own algorithms. Steven M. Bellovin September 13, 2006 2 Cryptography A Tiny Bit of History • Encryption goes back thousands of years • Classical ciphers encrypted letters (and perhaps digits), and yielded all sorts of bizarre outputs. • The advent of military telegraphy led to ciphers that produced only letters. Steven M. Bellovin September 13, 2006 3 Cryptography Codes vs. Ciphers • Ciphers operate syntactically, on letters or groups of letters: A → D, B → E, etc. • Codes operate semantically, on words, phrases, or sentences, per this 1910 codebook Steven M. Bellovin September 13, 2006 4 Cryptography A 1910 Commercial Codebook Steven M. Bellovin September 13, 2006 5 Cryptography Commercial Telegraph Codes • Most were aimed at economy • Secrecy from casual snoopers was a useful side-effect, but not the primary motivation • That said, a few such codes were intended for secrecy; I have some in my collection, including one intended for union use Steven M.
    [Show full text]
  • Simple Substitution and Caesar Ciphers
    Spring 2015 Chris Christensen MAT/CSC 483 Simple Substitution Ciphers The art of writing secret messages – intelligible to those who are in possession of the key and unintelligible to all others – has been studied for centuries. The usefulness of such messages, especially in time of war, is obvious; on the other hand, their solution may be a matter of great importance to those from whom the key is concealed. But the romance connected with the subject, the not uncommon desire to discover a secret, and the implied challenge to the ingenuity of all from who it is hidden have attracted to the subject the attention of many to whom its utility is a matter of indifference. Abraham Sinkov In Mathematical Recreations & Essays By W.W. Rouse Ball and H.S.M. Coxeter, c. 1938 We begin our study of cryptology from the romantic point of view – the point of view of someone who has the “not uncommon desire to discover a secret” and someone who takes up the “implied challenged to the ingenuity” that is tossed down by secret writing. We begin with one of the most common classical ciphers: simple substitution. A simple substitution cipher is a method of concealment that replaces each letter of a plaintext message with another letter. Here is the key to a simple substitution cipher: Plaintext letters: abcdefghijklmnopqrstuvwxyz Ciphertext letters: EKMFLGDQVZNTOWYHXUSPAIBRCJ The key gives the correspondence between a plaintext letter and its replacement ciphertext letter. (It is traditional to use small letters for plaintext and capital letters, or small capital letters, for ciphertext. We will not use small capital letters for ciphertext so that plaintext and ciphertext letters will line up vertically.) Using this key, every plaintext letter a would be replaced by ciphertext E, every plaintext letter e by L, etc.
    [Show full text]
  • A Covert Encryption Method for Applications in Electronic Data Interchange
    Technological University Dublin ARROW@TU Dublin Articles School of Electrical and Electronic Engineering 2009-01-01 A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan Blackledge Technological University Dublin, [email protected] Dmitry Dubovitskiy Oxford Recognition Limited, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engscheleart2 Part of the Digital Communications and Networking Commons, Numerical Analysis and Computation Commons, and the Software Engineering Commons Recommended Citation Blackledge, J., Dubovitskiy, D.: A Covert Encryption Method for Applications in Electronic Data Interchange. ISAST Journal on Electronics and Signal Processing, vol: 4, issue: 1, pages: 107 -128, 2009. doi:10.21427/D7RS67 This Article is brought to you for free and open access by the School of Electrical and Electronic Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan M Blackledge, Fellow, IET, Fellow, BCS and Dmitry A Dubovitskiy, Member IET Abstract— A principal weakness of all encryption systems is to make sure that the ciphertext is relatively strong (but not that the output data can be ‘seen’ to be encrypted. In other too strong!) and that the information extracted is of good words, encrypted data provides a ‘flag’ on the potential value quality in terms of providing the attacker with ‘intelligence’ of the information that has been encrypted.
    [Show full text]
  • Battle Management Language: History, Employment and NATO Technical Activities
    Battle Management Language: History, Employment and NATO Technical Activities Mr. Kevin Galvin Quintec Mountbatten House, Basing View, Basingstoke Hampshire, RG21 4HJ UNITED KINGDOM [email protected] ABSTRACT This paper is one of a coordinated set prepared for a NATO Modelling and Simulation Group Lecture Series in Command and Control – Simulation Interoperability (C2SIM). This paper provides an introduction to the concept and historical use and employment of Battle Management Language as they have developed, and the technical activities that were started to achieve interoperability between digitised command and control and simulation systems. 1.0 INTRODUCTION This paper provides a background to the historical employment and implementation of Battle Management Languages (BML) and the challenges that face the military forces today as they deploy digitised C2 systems and have increasingly used simulation tools to both stimulate the training of commanders and their staffs at all echelons of command. The specific areas covered within this section include the following: • The current problem space. • Historical background to the development and employment of Battle Management Languages (BML) as technology evolved to communicate within military organisations. • The challenges that NATO and nations face in C2SIM interoperation. • Strategy and Policy Statements on interoperability between C2 and simulation systems. • NATO technical activities that have been instigated to examine C2Sim interoperation. 2.0 CURRENT PROBLEM SPACE “Linking sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo” (Lt Gen Sir Robert Fulton, Deputy Chief of Defence Staff, 29th May 2002) Although General Fulton made that statement in 2002 at a time when the concept of network enabled operations was being formulated by the UK and within other nations, the requirement remains extant.
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • A New Cryptosystem for Ciphers Using Transposition Techniques
    Published by : International Journal of Engineering Research & Technology (IJERT) http://www.ijert.org ISSN: 2278-0181 Vol. 8 Issue 04, April-2019 A New Cryptosystem for Ciphers using Transposition Techniques U. Thirupalu Dr. E. Kesavulu Reddy FCSRC (USA) Research Scholar Assistant Professor, Dept. of Computer Science Dept. of Computer Science S V U CM&CS – Tirupati S V U CM&CS - Tirupati India – 517502 India – 517502 Abstract:- Data Encryption techniques is used to avoid the performs the decryption. Cryptographic algorithms are unauthorized access original content of a data in broadly classified as Symmetric key cryptography and communication between two parties, but the data can be Asymmetric key cryptography. recovered only through using a key known as decryption process. The objective of the encryption is to secure or save data from unauthorized access in term of inspecting or A. Symmetric Cryptography adapting the data. Encryption can be implemented occurs by In the symmetric key encryption, same key is used for both using some substitute technique, shifting technique, or encryption and decryption process. Symmetric algorithms mathematical operations. By adapting these techniques we more advantageous with low consuming with more can generate a different form of that data which can be computing power and it works with high speed in encrypt difficult to understand by any person. The original data is them. The symmetric key encryption takes place in two referred to as the plaintext and the encrypted data as the modes either as the block ciphers or as the stream ciphers. cipher text. Several symmetric key base algorithms have been The block cipher mode provides, whole data is divided into developed in the past year.
    [Show full text]