
e-PG Pathshala Information Technology Information security Module 4: polyalphabetic ciphers –Vigenere Cipher, Autokey system, One- Time pad, Transposition techniques, steganography Homophonic substitution ciphers: Homophonic substitution cipher maps a character to more than one code. For example, “A” could correspond to 3, 15, 23; while for “B” this could be 5, 17, 21. This type of substitution makes cryptanalysis or brute force harder but it doesn’t hide all statistical properties. With the help of powerful computer this can be broken in a few seconds. Polyalphabetic Cipher: Monoalphabetic substitution rules are used. Key decides which monoalphabetic substitution is to be performed. Vigenere Cipher: P=p0p1p2……pn-1 K=k0k1k2……km-1 C=C0C1C2……Cn-1 C=E(K,P) = E[(k0k1k2……km-1, p0p1p2……pn-1)] =(p0+k0) mod 26, (p1+k1) mod 26, …(pm-1+km-1) mod 26, (pm+k0) mod 26 … K is of length m. For m letters of plaintext , key is used. For the next m letters of plaintext, the key letters are repeated until all plaintext letters are used. Pi=(Ci – ki mod m) mod 26 Numeric value for each alphabet: a b c d e f g h i j k l m 0 1 2 3 4 5 6 7 8 9 10 11 12 e-PG Pathshala Information Technology Information security n o p q r s t u v w x y z 13 14 15 16 17 18 19 20 21 22 23 24 25 Vigenere Cipher: Key : mask Plaintext : meetmeatfield Ciphertext : key 12 0 18 10 12 0 18 10 12 0 18 10 12 plaintext 12 4 4 19 12 4 0 19 5 8 4 11 3 ciphertext 24 4 22 3 24 4 12 19 23 18 16 11 21 Strength of Vigenere Cipher: The letter frequency is masked. But key is repeated so for the same plaintext letter and key letter – same ciphertext letter is achieved. For meet and me – me generates same ciphertext ye because key is repeated. Autokey system: Periodic nature of the keyword can be overcomed by nonrepeating keyword that is as long as an autokey system. Key word is concatenated with plaintext to provide a running key. Key : mask meet meatf e-PG Pathshala Information Technology Information security Plaintext : meetmeatfield Ciphertext : key 12 0 18 10 12 4 4 19 12 4 0 10 5 plaintext 12 4 4 19 12 4 0 19 5 8 4 11 3 ciphertext 24 4 22 3 24 8 4 13 17 12 4 21 8 VERNAM cipher: Cipher works on binary data(bits) ci=pi ki Where Pi = ith binary digit of plaintext Ki = ith binary digit of key ci = ith binary digit of ciphertext = exclusive – or (XOR) operation pi=ci ki One – Time pad: The key is used to encrypt and decrypt a single message, then key is discarded. Each new message requires a new key of the same length as the new message. Such a scheme, is known as a one-time pad. One time pad is unbreakable. No statistical relationship to the plaintext. Includes space so 27 characters scheme. One – Time pad Example: e-PG Pathshala Information Technology Information security Plaintext : mr mustard key : pxlmvmsydo Ciphertext : ANKYODKYUR Plaintext : miss scarl Key : pftgpmiydg Ciphertext : ANKYODKYUR Cryptanalyst can find keys and can not decide which plaintext is true and which key is correct. One Time pad – Difficulties in using: Practically difficult to generate large quantities of random keys. How to distribute key and protect them. Because for every message , equal length of key is to be sent to sender and receiver. One time pad gives perfect secrecy. But limited use . Used only for highly secure low bandwidth channels. Transposition Techniques. – permutation of plaintext letters : Rail fence cipher: Message “ all gather at lawn”. Rail fence depth 2 a l a h r t a n l g t e a l W The encrypted message : ALAHRTANLGTEALW. Cryptanalyst can break this. e-PG Pathshala Information Technology Information security Transposition Techniques. –– Complex scheme: permutation of plaintext letters Write the message row by row , read column by column. Permutation is done by order of the column. Plaintext : discusstheformulainmeeting Key :3214 3 2 1 4 Plaintext d i s c u s s t h e f o r m u l a i n m e e t i n g x y Ciphertext : ssfuntxisemiegduhraenctolmiy For key 3214, start with column labeled 1- column 3 in table. Write all the letters then column labeled 2 – column 2 in the table. Then column labeled 3 and 4. This type of transposition cipher is not secure because letter frequencies in ciphertext are same as plaintext. Cryptanalyst can put ciphertext in a matrix and play with column position. Stegnography: Plaintext message is hidden. e-PG Pathshala Information Technology Information security Simple method – An arrangement of words or letters in the message can give real message. Text : Driveon Road Open passage. Hidden message : First letter of each word - DROP Stegnography techniques: Character Marking – Selected letters are overwritten in pencil and not visible unless hold at an angle to bright light Invisible ink – leave no visible trace until heat or some chemical is applied to the paper. Pin punctures – pin punctures on selected letters. Not visible unless the paper is held up in light. Advantage : hide the secret communication Disadvantage : Lot of overhead to hide few bits of information .
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-