Chronology of Cryptology 1MJ Sanada, 2MJ Segal, 1Kh

Total Page:16

File Type:pdf, Size:1020Kb

Chronology of Cryptology 1MJ Sanada, 2MJ Segal, 1Kh © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Chronology of Cryptology 1MJ Sanada, 2MJ Segal, 1Kh. Chanchanbi and 3Kh. Manglem Singh MIT Manipur1, MTU Manipur2, NIT Manipur3 Abstract This paper gives a brief overview of cryptology including cryptography, cryptanalysis and hashing function from the ancient era till present days. All the cryptography techniques and their corresponding cryptanalysis are described briefly. The latest cryptography techniques such as RSA algorithm and elliptic curve cryptography are also described. Keywords:- Cryptology, Cryptography, Cryptanalysis, Hashing function, RSA, ECC. 1. Introduction Cryptology consists of cryptography and cryptanalysis. Cryptography is the science of secret writing message by transforming in an unintelligible form such that it looks like a garbage to the undesired recipient and only legitimate one can read the object by transforming it back into the original form using the secret key she or he possesses. It is a reversible process that transforms the original message known as plaintext into another form known as ciphertext by using a process known as encryption algorithm with a secret key, which is known to the sender and recipient, and it is retransformed into original form by using the reverse process known as decryption algorithm and the key that is with the recipient. Cryptology Cryptography Cryptanalysis Classical Modern Asymmetric Symmetric Hash Substitution Transposition Cipher Cipher Function Monoalp Polyalp Block Stream ECC RSA MD5 SHA habetic habetict Cipherr Cipher ic AES DES RC4 A5 Figure 1 Chronology of Cryptology Cryptanalysis, on the other hand is the art and science of breaking cryptography. Chronology of cryptology can be based on different era of the development of the cryptography, such as ancient world, era between the ancient world and present days including World War I and World War II, and present days. Figure 1 shows the chronology of cryptology. JETIR1907107 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 762 © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) 2. Ancient era 2.1 Ancient Greek Cryptography Scytale is an ancient form of encryption commonly used by ancient Greeks [1]. It is a form of transposition cipher where letters are re-arranged in the messages prior to being deciphered by the recipient. It was developed around 404 BC by Spartan generals so that generals could exchange message. Figure 2 shows the scytale. Figure 2 Scytale. Another Ancient Greek Cryptography is Polybius cryptography [2]. It is shown in Figure 3. 1 2 3 4 5 1 A B C D E 2 F G H I&J K 3 L M N O P 4 Q R S T U 5 V W X Y Z Figure 3 Polybius cryptography. For example Message T H I S I S E A S Y T O B R E A K Cipher 44 23 24 43 24 43 15 11 43 54 44 34 12 42 15 11 25 The ciphertext is represented by row number and column number in the square. It was intended for long distance signaling. To send the first letter T, one would hold 4 torches in the right hand and 4 in left hand. 2.2 Ancient Rome Cryptography Caesar cipher was used by the emperor, Julius Caesar during his reign from 49 BC to 44 BC. Each letter was replaced by the third letter to follow it alphabetically. Caesar was able to hide his objectives from regional enemies. It is shown in Figure 4. a b c d e f g h j j k l m n o p q r s t u v w x y z D E F G H J J K L M N O P Q R S T U V W X Y Z A B C Figure 4 Caesar cipher. For example Message becomes ET TU BRUTE? Cipher HW WX EUXWH? If there is a sufficiently large ciphertext, it can be decrypted by comparing the frequency of letters in the cipher text against the frequency of letters in standard English. If the frequency of the letter in the cipher text is same as the frequency of letters, the algorithm might have been based on substitution cipher such as Caesar cipher for which there are 26 possible shifts. One technique may try 26 possible shifts and check which of these resulted in readable English text. JETIR1907107 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 763 © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) 2.3 Ancient Egypt Cryptography It started around 2000 BC in Egypt. It was mainly hieroglyphic substitution, changing one symbol by less known one. Most of the pictures can stand for the object they represent. Hieroglyphics can be pictures of living creatures, objects used in daily life or symbols. Some are easy to identify, some confusing and some impossible! If you look at the alphabet chart in Figure 5 [3], you can easily spot the foot, the hand, the lion and the owl. These are not thought to be serious attempts as secret communication, however, but rather to have been attempts at mystery, intrigue, or even amusement for literate onlookers. Figure 5 Hieroglyphic substitution. Figure 6 Cuneiform. 2.4 Ancient Mesopotamia Cryptography Cryptography of ancient Mesopotamia used Cuneiform tablets that contains the formula for making pottery glazes even during 4000 BC [4]. In cuneiform, a carefully cut writing implement known as a stylus was pressed into soft clay to produce wedge-like impressions that represent word-signs (pictographs) and, later, phonograms or `word-concepts' (closer to a modern-day understanding of a `word'). Figure 6 shows cuneiform. 2.5 Ancient China Cryptography China did not develop any meaningful cryptography. However most messages were memorized and sent in person to be delivered orally. Their techniques include written message on paper concealed with wax or concealed elsewhere on the body or swallowed. For example, the ancient Chinese wrote messages on fine silk, which then was scrunched into a tiny ball and covered in wax and swallowed by a messenger. 2.6 Ancient Indian Cryptography Kama-sutra, a text written in the 4 AD by the Brahmin scholar Vatsyayana used substitution cipher [5]. The kamasutra generated list of alphabet with no duplicate as shown in Figure 7. Then divide by 2 row. Find for each letter of message text in table and choose the opposite of the letter. JETIR1907107 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 764 © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Key = G H A J R I O B E S Q C L F V Z T Y K M X W N U D P G H A J R I O B E S Q C L – 1st row F V Z T Y K M X W N U D P – 2nd row Figure 7 Ancient India cryptography. For example Message – NIT Manipur Cipher - skj ozsklqy 2.7 Ancient Hebrew Cryptography In the Bible, a Hebrew ciphering method is used in 600 BC [6]. The last letter is replaced by the first letter and vice versa. Figure 8 shows the algorithm. a b c d e f g h j j k l m n o p q r s t u v w x y z Z Y X W V U T S R Q P O N M L K J I H G F E D C B A Figure 8 Ancient Hebrew cryptography. For example Message – HELLO Cipher - SVOOL 2.8 Ancient Arab Cryptography The Arabs were the first people to understand cryptanalysis [7]. They realised the rarest letters in Arabic and the most common letters: the letters 'a' and 'l' are the most common in Arabic, whereas the letter 'j' appears only a tenth as frequency. This leads to the first great breakthrough in cryptanalysis, namely frequency analysis. The earliest known description comes from the 9 AD scientist Abū-Yūsuf Ya’qūb ibn Ishāq al- Kindī. Letters and corresponding relative frequencies are shown in Table 1 for English alphabet. The technique is to write down all ciphertext letters and find the frequencies of all letters. 3. Era between the ancient and present days 3.1 Substitution Cipher 3.1.1 Affine Cipher Affine cipher is the generalization of Caesar cipher. Its form is 퐶 = 푎푀 + 푏 (푚표푑 26), for letter M, where (푎, 푏) is key 퐾, and 퐾 = (0, 푏) is not allowed. 퐾 = (1,3) gives a Caesar cipher [8]. If two letters in the message and their corresponding ciphertext letters are known, the key can be found easily and affine cipher can be broken. Table 1 Sample English Statistics Letter Relative frequency (%) Letter Relative frequency (%) A 8.2 N 6.7 B 1.5 O 7.5 C 2.8 P 1.9 D 4.3 Q 0.1 E 12.7 R 6.0 F 2.2 S 6.3 G 2.0 T 9.0 H 6.1 U 2.8 I 7.0 V 1.0 J 0.2 W 2.4 K 0.8 X 0.2 L 4.0 Y 2.0 M 2.4 Z 0.1 JETIR1907107 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 765 © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) 3.1.2 Alberti Cipher Leon Battista Alberti (1404 - 1472) invented Alberti cipher in 1467 that consists of two metal disks as shown in Figure 9 [9]. Inner disk contains alphabets that may be rotated with respect to the outer disk to form substitution ciphertext.
Recommended publications
  • Making Sense of Snowden, Part II: What's Significant in the NSA
    web extra Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations Susan Landau, Google hen The Guardian began publishing a widely used cryptographic standard has vastly wider impact, leaked documents from the National especially because industry relies so heavily on secure Inter- Security Agency (NSA) on 6 June 2013, net commerce. Then The Guardian and Der Spiegel revealed each day brought startling news. From extensive, directed US eavesdropping on European leaders7 as the NSA’s collection of metadata re- well as broad surveillance by its fellow members of the “Five cords of all calls made within the US1 Eyes”: Australia, Canada, New Zealand, and the UK. Finally, to programs that collected and stored data of “non-US” per- there were documents showing the NSA targeting Google and W2 8,9 sons to the UK Government Communications Headquarters’ Yahoo’s inter-datacenter communications. (GCHQs’) interception of 200 transatlantic fiberoptic cables I summarized the initial revelations in the July/August is- at the point where they reached Britain3 to the NSA’s pene- sue of IEEE Security & Privacy.10 This installment, written in tration of communications by leaders at the G20 summit, the late December, examines the more recent ones; as a Web ex- pot was boiling over. But by late June, things had slowed to a tra, it offers more details on the teaser I wrote for the January/ simmer. The summer carried news that the NSA was partially February 2014 issue of IEEE Security & Privacy magazine funding the GCHQ’s surveillance efforts,4 and The Guardian (www.computer.org/security).
    [Show full text]
  • Public Key Cryptography And
    PublicPublic KeyKey CryptographyCryptography andand RSARSA Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/ Washington University in St. Louis CSE571S ©2011 Raj Jain 9-1 OverviewOverview 1. Public Key Encryption 2. Symmetric vs. Public-Key 3. RSA Public Key Encryption 4. RSA Key Construction 5. Optimizing Private Key Operations 6. RSA Security These slides are based partly on Lawrie Brown’s slides supplied with William Stallings’s book “Cryptography and Network Security: Principles and Practice,” 5th Ed, 2011. Washington University in St. Louis CSE571S ©2011 Raj Jain 9-2 PublicPublic KeyKey EncryptionEncryption Invented in 1975 by Diffie and Hellman at Stanford Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Key2 Text Ciphertext Text Keys are interchangeable: Key2 Key1 Text Ciphertext Text One key is made public while the other is kept private Sender knows only public key of the receiver Asymmetric Washington University in St. Louis CSE571S ©2011 Raj Jain 9-3 PublicPublic KeyKey EncryptionEncryption ExampleExample Rivest, Shamir, and Adleman at MIT RSA: Encrypted_Message = m3 mod 187 Message = Encrypted_Message107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 53 = 125 Message = 125107 mod 187 = 5 = 125(64+32+8+2+1) mod 187 = {(12564 mod 187)(12532 mod 187)... (1252 mod 187)(125 mod 187)} mod 187 Washington University in
    [Show full text]
  • Crypto Wars of the 1990S
    Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S CYBERSECURITY June 2015 | INITIATIVE © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. AUTHORS Danielle Kehl, Senior Policy Analyst, Open Technology Institute Andi Wilson, Program Associate, Open Technology Institute Kevin Bankston, Director, Open Technology Institute ABOUT THE OPEN TECHNOLOGY INSTITUTE ACKNOWLEDGEMENTS The Open Technology Institute at New America is committed to freedom The authors would like to thank and social justice in the digital age. To achieve these goals, it intervenes Hal Abelson, Steven Bellovin, Jerry in traditional policy debates, builds technology, and deploys tools with Berman, Matt Blaze, Alan David- communities. OTI brings together a unique mix of technologists, policy son, Joseph Hall, Lance Hoffman, experts, lawyers, community organizers, and urban planners to examine the Seth Schoen, and Danny Weitzner impacts of technology and policy on people, commerce, and communities.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • A Secure Authentication System- Using Enhanced One Time Pad Technique
    IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.2, February 2011 11 A Secure Authentication System- Using Enhanced One Time Pad Technique Raman Kumar1, Roma Jindal 2, Abhinav Gupta3, Sagar Bhalla4 and Harshit Arora 5 1,2,3,4,5 Department of Computer Science and Engineering, 1,2,3,4,5 D A V Institute of Engineering and Technology, Jalandhar, Punjab, India. Summary the various weaknesses associated with a password have With the upcoming technologies available for hacking, there is a come to surface. It is always possible for people other than need to provide users with a secure environment that protect their the authenticated user to posses its knowledge at the same resources against unauthorized access by enforcing control time. Password thefts can and do happen on a regular basis, mechanisms. To counteract the increasing threat, enhanced one so there is a need to protect them. Rather than using some time pad technique has been introduced. It generally random set of alphabets and special characters as the encapsulates the enhanced one time pad based protocol and provides client a completely unique and secured authentication passwords we need something new and something tool to work on. This paper however proposes a hypothesis unconventional to ensure safety. At the same time we need regarding the use of enhanced one time pad based protocol and is to make sure that it is easy to be remembered by you as a comprehensive study on the subject of using enhanced one time well as difficult enough to be hacked by someone else.
    [Show full text]
  • Cryptography in Modern World
    Cryptography in Modern World Julius O. Olwenyi, Aby Tino Thomas, Ayad Barsoum* St. Mary’s University, San Antonio, TX (USA) Emails: [email protected], [email protected], [email protected] Abstract — Cryptography and Encryption have been where a letter in plaintext is simply shifted 3 places down used for secure communication. In the modern world, the alphabet [4,5]. cryptography is a very important tool for protecting information in computer systems. With the invention ABCDEFGHIJKLMNOPQRSTUVWXYZ of the World Wide Web or Internet, computer systems are highly interconnected and accessible from DEFGHIJKLMNOPQRSTUVWXYZABC any part of the world. As more systems get interconnected, more threat actors try to gain access The ciphertext of the plaintext “CRYPTOGRAPHY” will to critical information stored on the network. It is the be “FUBSWRJUASLB” in a Caesar cipher. responsibility of data owners or organizations to keep More recent derivative of Caesar cipher is Rot13 this data securely and encryption is the main tool used which shifts 13 places down the alphabet instead of 3. to secure information. In this paper, we will focus on Rot13 was not all about data protection but it was used on different techniques and its modern application of online forums where members could share inappropriate cryptography. language or nasty jokes without necessarily being Keywords: Cryptography, Encryption, Decryption, Data offensive as it will take those interested in those “jokes’ security, Hybrid Encryption to shift characters 13 spaces to read the message and if not interested you do not need to go through the hassle of converting the cipher. I. INTRODUCTION In the 16th century, the French cryptographer Back in the days, cryptography was not all about Blaise de Vigenere [4,5], developed the first hiding messages or secret communication, but in ancient polyalphabetic substitution basically based on Caesar Egypt, where it began; it was carved into the walls of cipher, but more difficult to crack the cipher text.
    [Show full text]
  • RSA BSAFE Crypto-C 5.21 FIPS 140-1 Security Policy2.…
    RSA Security, Inc. RSA™ BSAFE® Crypto-C Crypto-C Version 5.2.1 FIPS 140-1 Non-Proprietary Security Policy Level 1 Validation Revision 1.0, May 2001 © Copyright 2001 RSA Security, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Table of Contents 1 INTRODUCTION.................................................................................................................. 3 1.1 PURPOSE ............................................................................................................................. 3 1.2 REFERENCES ....................................................................................................................... 3 1.3 DOCUMENT ORGANIZATION ............................................................................................... 3 2 THE RSA BSAFE PRODUCTS............................................................................................ 5 2.1 THE RSA BSAFE CRYPTO-C TOOLKIT MODULE .............................................................. 5 2.2 MODULE INTERFACES ......................................................................................................... 5 2.3 ROLES AND SERVICES ......................................................................................................... 6 2.4 CRYPTOGRAPHIC KEY MANAGEMENT ................................................................................ 7 2.4.1 Protocol Support........................................................................................................
    [Show full text]
  • A Practical Implementation of a One-Time Pad Cryptosystem
    Jeff Connelly CPE 456 June 11, 2008 A Practical Implementation of a One-time Pad Cryptosystem 0.1 Abstract How to securely transmit messages between two people has been a problem for centuries. The first ciphers of antiquity used laughably short keys and insecure algorithms easily broken with today’s computational power. This pattern has repeated throughout history, until the invention of the one-time pad in 1917, the world’s first provably unbreakable cryptosystem. However, the public generally does not use the one-time pad for encrypting their communication, despite the assurance of confidentiality, because of practical reasons. This paper presents an implementation of a practical one-time pad cryptosystem for use between two trusted individuals, that have met previously but wish to securely communicate over email after their departure. The system includes the generation of a one-time pad using a custom-built hardware TRNG as well as software to easily send and receive encrypted messages over email. This implementation combines guaranteed confidentiality with practicality. All of the work discussed here is available at http://imotp.sourceforge.net/. 1 Contents 0.1 Abstract.......................................... 1 1 Introduction 3 2 Implementation 3 2.1 RelatedWork....................................... 3 2.2 Description ........................................ 3 3 Generating Randomness 4 3.1 Inadequacy of Pseudo-random Number Generation . 4 3.2 TrulyRandomData .................................... 5 4 Software 6 4.1 Acquiring Audio . 6 4.1.1 Interference..................................... 6 4.2 MeasuringEntropy................................... 6 4.3 EntropyExtraction................................ ..... 7 4.3.1 De-skewing ..................................... 7 4.3.2 Mixing........................................ 7 5 Exchanging Pads 8 5.1 Merkle Channels . 8 5.2 Local Pad Security .
    [Show full text]
  • Elements of Cryptography
    Elements Of Cryptography The discussion of computer security issues and threats in the previous chap- ters makes it clear that cryptography provides a solution to many security problems. Without cryptography, the main task of a hacker would be to break into a computer, locate sensitive data, and copy it. Alternatively, the hacker may intercept data sent between computers, analyze it, and help himself to any important or useful “nuggets.” Encrypting sensitive data com- plicates these tasks, because in addition to obtaining the data, the wrongdoer also has to decrypt it. Cryptography is therefore a very useful tool in the hands of security workers, but is not a panacea. Even the strongest cryp- tographic methods cannot prevent a virus from damaging data or deleting files. Similarly, DoS attacks are possible even in environments where all data is encrypted. Because of the importance of cryptography, this chapter provides an introduction to the principles and concepts behind the many encryption al- gorithms used by modern cryptography. More historical and background ma- terial, descriptions of algorithms, and examples, can be found in [Salomon 03] and in the many other texts on cryptography, code breaking, and data hiding that are currently available in libraries, bookstores, and the Internet. Cryptography is the art and science of making data impossible to read. The task of the various encryption methods is to start with plain, readable data (the plaintext) and scramble it so it becomes an unreadable ciphertext. Each encryption method must also specify how the ciphertext can be de- crypted back into the plaintext it came from, and Figure 1 illustrates the relation between plaintext, ciphertext, encryption, and decryption.
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • Public Key Cryptography
    Public Key Cryptography Shai Simonson Stonehill College Introduction When teaching mathematics to computer science students, it is natural to emphasize constructive proofs, algorithms, and experimentation. Most computer science students do not have the experience with abstraction nor the appreciation of it that mathematics students do. They do, on the other hand, think constructively and algorithmically. Moreover, they have the programming tools to experiment with their algorithmic intuitions. Public-key cryptographic methods are a part of every computer scientist’s education. In public-key cryptography, also called trapdoor or one-way cryptography, the encoding scheme is public, yet the decoding scheme remains secret. This allows the secure transmission of information over the internet, which is necessary for e-commerce. Although the mathematics is abstract, the methods are constructive and lend themselves to understanding through programming. The mathematics behind public-key cryptography follows a journey through number theory that starts with Euclid, then Fermat, and continues into the late 20th century with the work of computer scientists and mathematicians. Public-key cryptography serves as a striking example of the unexpected practical applicability of even the purest and most abstract of mathematical subjects. We describe the history and mathematics of cryptography in sufficient detail so the material can be readily used in the classroom. The mathematics may be review for a professional, but it is meant as an outline of how it might be presented to the students. “In the Classroom” notes are interspersed throughout in order to highlight exactly what we personally have tried in the classroom, and how well it worked.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]