<<

Introduction

Cryptography comes from the two Greek words meaning “secret writing” and is the art and science of concealing meaning. is the breaking of codes. Basically, what we have is

Def: A is a 5-tuple (E, D, M, K, C), where M is the set of plaintexts, K is the set of keys, C is the set of , E: M K C is the set of enciphering functions, and D: C K M is the set of deciphering functions

Cryptography is a collection of mathematical techniques for protecting information. We will not be studying those mathematical techniques in depth. We will be learning about cryptography and how it impacts a system administrator. The process of using cryptography to scramble a message is called . The process of unscrambling the message by use of the appropriate is called decryption. A key is necessary to unlock a message.

Cryptography is used to prevent information from being accessed by an unauthorized recipient. In theory, one a piece of information is encrypted, the encrypted data can be accidentally disclosed or intercepted by a third party without compromising the security of the information, provided that the key necessary to decrypt the information is not disclosed and that the method of encryption will resist attempts to decrypt the message without the key.

Basic Methods

Cryptosystems are based on two techniques for hiding information: substitution and transposition.

Substitution

Substitution is based on the principle of replacing each letter in the message with another letter. The is an example of a . Let’s say that you replace each “a” in the message with a “d”, each “b” with an “e”, and so on. This would be called a 3-shift Caesar cipher because you are taking the third letter after the letter in the message as the letter to substitute. e.g. We have ABCDEFGHIJKLMNOPQRSTUVWXYZ

Let’s do a 4-shift cipher for G O T I G E R S

For our cipher text we would have

Note: Substitution are susceptible to statistical attacks.

Transposition Cipher

A is based on scrambling the characters that are in the message. One transposition system involves writing a message into a table row by row and then reading it out column by column. Double transposition ciphers involved using two such transformations. This is really a permutation function. An example of a transposition cipher is the . e.g. Plain text: H E L L O W O R L D

H L W L E O O D L R

Cipher text: H L W L E O O D L R

Note: Transposition ciphers are susceptible to frequency of occurrence to discover the transposition.

Cryptography Concepts

There are two additional important cryptography concepts, namely

Confusion An encrypting should take the information from the plaintext and transform it so that the interceptor cannot readily recognize the message. The interceptor should not be able to predict what will happen to the by changing one character in the plaintext. We call this characteristic confusion. An algorithm providing good confusion has a complex function relationship between the plaintext/key pair and the ciphertext.

Diffusion The cipher should also spread the information from the plaintext over the entire ciphertext so that changes in the plaintext affect many parts of the ciphertext. This principle is called diffusion, the characteristic of distributing the information from single plaintext letters over the entire ciphertext. Good diffusion means that the interceptor needs access to much of the ciphertext to be able to infer the algorithm.