Cryptography and Network Security Chapter 2

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography and Network Security Chapter 2 CryptographyCryptography andand Chapter 2 – Classical Encryption NetworkNetwork SecuritySecurity Techniques ChapterChapter 22 • "I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph upon the subject, in which I analyze Fifth Edition one hundred and sixty separate ciphers," said by William Stallings Holmes. Lecture slides by Lawrie Brown —The Adventure of the Dancing Men , Sir Arthur (with edits by RHB) Conan Doyle Outline Symmetric Encryption • We will consider: • or conventional / private -key / single -key – classical cipher techniques and terminology • sender and recipient share a common key – monoalphabetic substitution ciphers • all classical encryption algorithms are – cryptanalysis using letter frequencies private -key – Playfair cipher – polyalphabetic ciphers • was only type prior to invention of public - – transposition ciphers key in 1970 ’s – product ciphers and rotor machines • and by far most widely used – steganography Some Basic Terminology Symmetric Cipher Model • plaintext - original message • ciphertext - coded message • cipher - algorithm for transforming plaintext to ciphertext • key - info used in cipher known only to sender/receiver • encipher (encrypt) - converting plaintext to ciphertext • decipher (decrypt) - recovering ciphertext from plaintext • cryptography - study of encryption principles/methods • cryptanalysis ( codebreaking ) - study of principles/ methods of deciphering ciphertext without knowing key • cryptology - field of both cryptography and cryptanalysis Requirements • two requirements for secure use of symmetric encryption: – a strong encryption algorithm – a secret key known only to sender / receiver • mathematically have: Y = E(K,X) X = D(K,Y) • assume encryption algorithm is known • implies a secure channel to distribute key Cryptography Cryptanalysis • can characterize cryptographic system by: • objective to recover key not just message – type of encryption operations used – type of encryption operations used • general approaches: • substitution • transposition – cryptanalytic attack • product – brute -force attack – number of keys used • if either succeed all key use compromised • single -key or private • two -key or public – way in which plaintext is processed • block • stream Cryptanalytic Attacks More Definitions • ciphertext only • unconditional security – only know algorithm & ciphertext , is statistical, must – no matter how much computer power or time is know or be able to identify plaintext available, the cipher cannot be broken … since the • known plaintext ciphertext provides insufficient information to – attacker knows/suspects plaintext & ciphertext uniquely determine the corresponding plaintext • chosen plaintext • computational security – attacker selects plaintext and gets ciphertext • given limited computing resources ( eg . time • chosen ciphertext needed for calculations is greater than age of – attacker selects ciphertext and gets plaintext universe (usually defined via polynomial time • chosen text algorithms)), the cipher cannot be broken – attacker selects plaintext or ciphertext to en/decrypt Brute Force Search Classical Substitution Ciphers • always possible to simply try every key • letters of plaintext are replaced by other • most basic attack, proportional to key size letters or by numbers or symbols • assume able to know / recognise plaintext or Number of Time Required at 10 9 Time Required at • plaintext is viewed as a sequence of Key size (bits) Cipher Alternative Keys decryptions/s 10 13 decryptions/s 56 DES 256 ᱌ 7.2 x 10 16 255 ns = 1.125 years 1 hour bits, and substitution involves replacing 128 AES 2128 ᱌ 3.4 x 10 38 2127 ns = 5.3 x 10 21 years 5.3 x 10 17 years 168 Triple DES 2168 ᱌ 3.7 x 10 50 2167 ns = 5.8 x 10 33 years 5.8 x 10 29 years plaintext bit patterns with ciphertext bit 192 AES 2192 ᱌ 6.3 x 10 57 2191 ns = 9.8 x 10 40 years 9.8 x 10 36 years patterns 256 AES 2256 ᱌ 1.2 x 10 77 2255 ns = 1.8 x 10 60 years 1.8 x 10 56 years 26 characters Monoalphabetic 26! = 4 x 10 26 2 ᠯ 10 26 ns = 6.3 x 10 9 years 6.3 x 10 6 years (permutation) Caesar Cipher Caesar Cipher • earliest known substitution cipher • can define transformation as: • by Julius Caesar a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C • first attested use in military affairs • mathematically give each letter a number • replaces each letter by 3rd letter along a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 • example: • then have Caesar cipher as: meet me after the toga party c = E(k,p ) = (p + k) mod 26 PHHW PH DIWHU WKH WRJD SDUWB p = D(k,c ) = (c – k) mod 26 Cryptanalysis of Caesar Cipher • only have 25 possible ciphers … 25 keys – a maps to (A),B...Z (obviously avoid a A) • could simply try each in turn • a brute force search • given ciphertext , just try all shifts of letters • do need to recognize when have plaintext • eg. break ciphertext "GCUA VQ DTGCM " Monoalphabetic Cipher Monoalphabetic Cipher Security • rather than just shifting the alphabet • now have a total of 26! = 4 x 10 26 keys • could shuffle (jumble) the letters arbitrarily • with so many keys, might think is secure • each plaintext letter maps to a different random ciphertext letter • but would be !!!WRONG!!! • hence key is 26 letters long • problem is language characteristics Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Ciphertext : WIRFRWAJUHYFTSDVFSFUUFYA Language Redundancy and English Letter Frequencies Cryptanalysis • human languages are redundant • eg " th lrd s m shphrd shll nt wnt " • letters are not equally commonly used • in English E is by far the most common letter – followed by T,R,N,I,O,A,S • other letters like Z,J,K,Q,X are fairly rare • have tables of single, double and triple letter frequencies for various languages Use in Cryptanalysis Example Cryptanalysis • key concept - monoalphabetic substitution • given ciphertext : ciphers do not change relative letter frequencies UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ • discovered by Arabian scientists in 9 th century VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ • calculate letter frequencies for ciphertext • count relative letter frequencies (see text) • compare counts/plots against known values • guess P and Z are e and t • if caesar cipher look for common peaks/troughs • guess ZW is th and hence ZWP is the – peaks at: A-E-I triple, NO pair, RST triple • proceeding with trial and error finally get: – troughs at: JK , X-Z it was disclosed yesterday that several informal but direct contacts have been made with political • for monoalphabetic must identify each letter representatives of the viet cong in moscow – tables of common double/triple letters help Playfair Cipher Playfair Key Matrix • not even the large number of keys in a • a 5X5 matrix of letters based on a keyword monoalphabetic cipher provides security • fill in letters of keyword (no duplicates) • one approach to improving security was to • fill rest of matrix with other letters encrypt multiple letters • eg. using the keyword MONARCHY • the Playfair Cipher is an example • invented by Charles Wheatstone in 1854, M O N A R C H Y B D but named after his friend Baron Playfair E F G I/J K L P Q S T U V W X Z Encrypting and Decrypting Security of Playfair Cipher • plaintext is encrypted two letters at a time • security much improved over monoalphabetic 1. if a pair is a repeated letter, insert filler like ''X’ • since have 26 x 26 = 676 digrams 2. if both letters fall in the same row, replace • would need a 676 entry frequency table to each with letter to right (wrapping back to start analyse (verses 26 for a monoalphabetic ) from end) from end) • and correspondingly more ciphertext 3. if both letters fall in the same column, replace each with the letter below it (wrapping to top • was widely used for many years from bottom) – eg. by US & British military in WW1 4. otherwise each letter is replaced by the letter • it can be broken, given a few hundred letters in the same row and in the column of the other • since still has much of plaintext structure letter of the pair Polyalphabetic Ciphers Vigen ère Cipher • polyalphabetic substitution ciphers • simplest polyalphabetic substitution cipher • improve security using multiple cipher alphabets • effectively multiple caesar ciphers • make cryptanalysis harder with more alphabets • key is many letters long K = k k ... k to guess and flatter frequency distribution 1 2 d • ith letter specifies ith alphabet to use • use a key to select which alphabet is used for each letter of the message • use each alphabet in turn • use each alphabet in turn • repeat from start after d letters in message • repeat from start after end of key is reached • decryption simply works in reverse Example of Vigen ère Cipher Aids to Vigen ère Encryption • write the plaintext out • simple aids can assist with en/decryption • write the keyword repeated above it • a Saint -Cyr Slide is a simple manual aid • use each key letter as a caesar cipher key – a slide with repeated alphabet • encrypt the corresponding plaintext letter – line up plaintext ' A'' withwith keykey letter,letter, egeg '' C'' deceptive • eg . using keyword deceptive – then read off any mapping for key letter key: deceptivedeceptivedeceptive • can bend round into a cipher disk plaintext: wearediscoveredsaveyourself • can bend
Recommended publications
  • Classical Encryption Techniques
    CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Dr. Lo’ai Tawalbeh Fall 2005 Introduction Basic Terminology • plaintext - the original message • ciphertext - the coded message • key - information used in encryption/decryption, and known only to sender/receiver • encipher (encrypt) - converting plaintext to ciphertext using key • decipher (decrypt) - recovering ciphertext from plaintext using key • cryptography - study of encryption principles/methods/designs • cryptanalysis (code breaking) - the study of principles/ methods of deciphering ciphertext Dr. Lo’ai Tawalbeh Fall 2005 1 Cryptographic Systems Cryptographic Systems are categorized according to: 1. The operation used in transferring plaintext to ciphertext: • Substitution: each element in the plaintext is mapped into another element • Transposition: the elements in the plaintext are re-arranged. 2. The number of keys used: • Symmetric (private- key) : both the sender and receiver use the same key • Asymmetric (public-key) : sender and receiver use different key 3. The way the plaintext is processed : • Block cipher : inputs are processed one block at a time, producing a corresponding output block. • Stream cipher: inputs are processed continuously, producing one element at a time (bit, Dr. Lo’ai Tawalbeh Fall 2005 Cryptographic Systems Symmetric Encryption Model Dr. Lo’ai Tawalbeh Fall 2005 2 Cryptographic Systems Requirements • two requirements for secure use of symmetric encryption: 1. a strong encryption algorithm 2. a secret key known only to sender / receiver •Y = Ek(X), where X: the plaintext, Y: the ciphertext •X = Dk(Y) • assume encryption algorithm is known •implies a secure channel to distribute key Dr.
    [Show full text]
  • Simple Substitution Cipher Evelyn Guo
    Simple Substitution Cipher Evelyn Guo Topic: Data Frequency Analysis, Logic Curriculum Competencies: • Develop thinking strategies to solve puzzles and play games • Think creatively and with curiosity and wonder when exploring problems • Apply flexible and strategic approaches to solve problems • Solve problems with persistence and a positive disposition Grade Levels: G3 - G12 Resource: University of Cambridge Millennium Mathematics Project - NRICH https://nrich.maths.org/4957 Cipher Challenge Toolkit https://nrich.maths.org/7983 Practical Cryptography website http://practicalcryptography.com/ciphers/classical-era/simple- substitution/ Materials: Ipad and Laptop which could run excel spreadsheet. Flip Chart with tips and hints for different levels of players Booklet flyers for anyone taking home. Printed coded message and work sheet (help sheet) with plain alphabet and cipher alphabet (leave blank) Pencils Extension: • Depends on individual player’s interest and math abilities, introduce easier (Atbash Cipher, Caesar Cipher) or harder ways ( AutoKey Cipher) to encrypt messages. • Introduce students how to use the practical cryptography website to create their own encrypted message instantly. • Allow players create their own cipher method. • Understand in any language some letters tend to appear more often than other letters Activity Sheet for Substitution Cipher Opening Question: Which Letters do you think are the most common in English? Start by performing a frequency analysis on some selected text to see which letters appear most often. It is better to use longer texts, as a short text might have an unusual distribution of letters, like the "quick brown fox jumps over the lazy dog" Introduce the Problem: In the coded text attached, every letter in the original message was switched with another letter.
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks
    Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks Nils Kopal University of Siegen, Germany [email protected] Abstract cuits). ANNs found usages in a broad set of dif- ferent applications and research fields. Their main There are many (historical) unsolved ci- purpose is fast filtering, classifying, and process- phertexts from which we don’t know the ing of (mostly) non-linear data, e.g. image pro- type of cipher which was used to encrypt cessing, speech recognition, and language trans- these. A first step each cryptanalyst does lation. Besides that, scientists were also able to is to try to identify their cipher types us- “teach” ANNs to play games or to create paintings ing different (statistical) methods. This in the style of famous artists. can be difficult, since a multitude of ci- Inspired by the vast growth of ANNs, also cryp- pher types exist. To help cryptanalysts, tologists started to use them for different crypto- we developed a first version of an artifi- graphic and cryptanalytic problems. Examples are cial neural network that is right now able the learning of complex cryptographic algorithms, to differentiate between five classical ci- e.g. the Enigma machine, or the detection of the phers: simple monoalphabetic substitu- type of cipher used for encrypting a specific ci- tion, Vigenere,` Playfair, Hill, and transpo- phertext. sition. The network is based on Google’s In late 2019 Stamp published a challenge on the TensorFlow library as well as Keras. This MysteryTwister C3 (MTC3) website called “Ci- paper presents the current progress in the pher ID”.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher
    International Journal of Advanced Technology & Engineering Research (IJATER) www.ijater.com A HYBRID CRYPTOSYSTEM BASED ON VIGENÈRE CIPHER AND COLUMNAR TRANSPOSITION CIPHER Quist-Aphetsi Kester, MIEEE, Lecturer Faculty of Informatics, Ghana Technology University College, PMB 100 Accra North, Ghana Phone Contact +233 209822141 Email: [email protected] / [email protected] graphy that use the same cryptographic keys for both en- Abstract cryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to Privacy is one of the key issues addressed by information go between the two keys. The keys, in practice, represent a Security. Through cryptographic encryption methods, one shared secret between two or more parties that can be used can prevent a third party from understanding transmitted raw to maintain a private information link [5]. This requirement data over unsecured channel during signal transmission. The that both parties have access to the secret key is one of the cryptographic methods for enhancing the security of digital main drawbacks of symmetric key encryption, in compari- contents have gained high significance in the current era. son to public-key encryption. Typical examples symmetric Breach of security and misuse of confidential information algorithms are Advanced Encryption Standard (AES), Blow- that has been intercepted by unauthorized parties are key fish, Tripple Data Encryption Standard (3DES) and Serpent problems that information security tries to solve. [6]. This paper sets out to contribute to the general body of Asymmetric or Public key encryption on the other hand is an knowledge in the area of classical cryptography by develop- encryption method where a message encrypted with a reci- ing a new hybrid way of encryption of plaintext.
    [Show full text]
  • EVOLUTIONARY COMPUTATION in CRYPTANALYSIS of CLASSICAL CIPHERS 1. Introduction
    Ø Ñ ÅØÑØÐ ÈÙ ÐØÓÒ× DOI: 10.1515/tmmp-2017-0026 Tatra Mt. Math. Publ. 70 (2017), 179–197 EVOLUTIONARY COMPUTATION IN CRYPTANALYSIS OF CLASSICAL CIPHERS Eugen Antal — Martin Elia´ˇs ABSTRACT. Evolutionary computation has represented a very popular way of problem solving in the recent years. This approach is also capable of effectively solving historical cipher in a fully automated way. This paper deals with empirical cryptanalysis of a monoalphabetic substitution using a genetic algorithm (GA) and a parallel genetic algorithm (PGA). The key ingredient of our contribution is the parameter analysis of GA and PGA. We focus on how these parameters affect the success rate of solving the monoalphabetic substitution. 1. Introduction Historical (also called classical) ciphers belong to historical part of cryptology. They had been used until the expansion of computers and modern cryptosys- tems. Under a classical cipher we can consider a standard cryptosystem based on commonly used definition [6]. Comparing the main properties of classical ciphers to modern cryptosystems (used nowadays) leads to major differences in their properties. Some selected differences [5] are: • The encryption algorithm of classical ciphers can be performed using paper and pencil (or some mechanical device) easily. • Classical ciphers are mostly used to encrypt text written in some natural language. • Classical ciphers are vulnerable to statistical analysis. c 2017 Mathematical Institute, Slovak Academy of Sciences. 2010 M a t h e m a t i c s Subject Classification: 94A60,68P25. K e y w o r d s: historical ciphers, grid, MPI, genetic algorithm, parallel genetic algorithm. This work was partially supported by grants VEGA 1/0159/17.
    [Show full text]
  • Decrypt Cryptotexts: GBLVMUB JOGPSNBUJLZ VMNIR RPNBMZ EBMFLP OFABKEFT Decrypt: VHFUHW GH GHXA VHFUHW GH GLHX, VHFUHW GH WURLV VH
    PROLOGUE - I. Decrypt cryptotexts: Part IV GBLVMUB JOGPSNBUJLZ Secret-key cryptosystems VMNIR RPNBMZ EBMFLP OFABKEFT prof. Jozef Gruska IV054 4. Secret-key cryptosystems 2/99 PROLOGUE - II. CHAPTER 4: SECRET-KEY (SYMMETRIC) CRYPTOGRAPHY Decrypt: In this chapter we deal with some of the very old, or quite old, classical (secret-key or symmetric) cryptosystems and their cryptanalysis that were primarily used in the pre-computer era. VHFUHW GH GHXA These cryptosystems are too weak nowadays, too easy to break, especially VHFUHW GH GLHX, with computers. However, these simple cryptosystems give a good illustration of several of the VHFUHW GH WURLV important ideas of the cryptography and cryptanalysis. Moreover, most of them can be very useful in combination with more modern VHFUHW GH WRXV. cryptosystem - to add a new level of security. prof. Jozef Gruska IV054 4. Secret-key cryptosystems 3/99 prof. Jozef Gruska IV054 4. Secret-key cryptosystems 4/99 BASICS CRYPTOLOGY - HISTORY + APPLICATIONS Cryptology (= cryptography + cryptanalysis) has more than four thousand years long history. Some historical observation People have always had fascination with keeping information away from others. Some people – rulers, diplomats, military people, businessmen – have always had needs to keep some information away from others. BASICS Importance of cryptography nowadays Applications: cryptography is the key tool to make modern information transmission secure, and to create secure information society. Foundations: cryptography gave rise to several new key concepts of the foundation of informatics: one-way functions, computationally perfect pseudorandom generators, zero-knowledge proofs, holographic proofs, program self-testing and self-correcting, . prof. Jozef Gruska IV054 4. Secret-key cryptosystems 5/99 prof.
    [Show full text]
  • Language, Probability, and Cryptography
    Language, Probability, and Cryptography Adriana Salerno [email protected] Bates College MathFest 2019 I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Example 1: Random permutation of beginning of Pride and Prejudice HR HD V RBXRN XSHMKBDVYYJ VCUSOIYKPQKP RNVR V DHSQYK ZVS HS AODDKDDHOS OG V QOOP GOBRXSK ZXDR FK HS IVSR OG V IHGK NOIKMKB YHRRYK USOIS RNK GKKYHSQD OB MHKID OG DXCN V ZVS ZVJ FK OS NHD GHBDR KSRKBHSQ V SKHQNFOXBNOOP RNHD RBXRN HD DO IKYY GHTKP HS RNK ZHSPD OG RNK DXBBOXSPHSQ GVZHYHKD RNVR NK HD COSDHPKBKP RNK BHQNRGXY ABOAKBRJ OG DOZK OSK OB ORNKB OG RNKHB PVXQNRKBD ZJ PKVB ZB FKSSKR DVHP NHD YVPJ RO NHZ OSK PVJ NVMK JOX NKVBP RNVR SKRNKBGHKYP AVBU HD YKR VR YVDR ZB FKSSKR ..
    [Show full text]
  • 1. History of Cryptography Cryptography (From Greek , Hidden
    1. History of cryptography Cryptography (from Greek , hidden, and , writing), is the practice and study of secret writing(or hidden information). Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). History is filled with examples where people tried to keep information secret from adversaries. Kings and generals communicated with their troops using basic cryptographic methods to prevent the enemy from learning sensitive military information. In fact, Julius Caesar reportedly used a simple cipher, which has been named after him. As society has evolved, the need for more sophisticated methods of protecting data has increased. As the word becomes more connected, the demand for information and electronic services is growing, and with the increased demand comes increased dependency on electronic systems. Already the exchange of sensitive information, such as credit card numbers, over the internet is common practice. Protecting data and electronic system is crucial to our way of living. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. It is necessary to distinct cryptography, crypto analysis and cryptology. Cryptography is a branch of cryptology dealing with the design of system for encryption and decryption intended to ensure confidentiality, integrity and authenticity of message.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Traditional Symmetric-Key Ciphers
    Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel is called the ciphertext. To create the ciphertext from the plaintext, Alice uses an encryption algorithm and a shared secret key. To create the plaintext from ciphertext, Bob uses a decryption algorithm and the same secret key. If P is the plaintext, C is the ciphertext, and K is the key, We assume that Bob creates P1; we prove that P1 = P: Locking and unlocking with the same key Kerckhoff’s Principle Based on Kerckhoff’s principle, one should always assume that the adversary, Eve, knows the encryption/decryption algorithm. The resistance of the cipher to attack must be based only on the secrecy of the key. Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. Cryptanalysis attacks Ciphertext-Only Attack Ciphertext-only attack Known-Plaintext Attack Known-plaintext attack Chosen-Plaintext Attack Chosen-plaintext attack Chosen-Ciphertext Attack Chosen-ciphertext attack SUBSTITUTION CIPHERS A substitution cipher replaces one symbol with another. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Note A substitution cipher replaces one symbol with another. 1 Monoalphabetic Ciphres 2 Polyalphabetic Ciphers Monoalphabetic Ciphers Note In monoalphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the ciphertext is always one-to-one. Example The following shows a plaintext and its corresponding ciphertext.
    [Show full text]