Professional Documents
Culture Documents
1 Cryptography
CONTENTS
CRYPTOGRAPHY--------------------------------------3
INTRODUCTION---------------------------------------3
ENCRYPTION MODEL-------------------------------6
SUBSTITUTION CIPHER-----------------------------9
TRANPOSiTION CIPHER----------------------------12
TWO FUNDAMENTAL PRINCIPLES ------------13
SECRET KEY ALGORITHM------------------------14
DES--------------------------------------------------------16
CONCLUSION-----------------------------------------18
REFERENCE-------------------------------------------18
2 Cryptography
Cryptography
Introduction
3 Cryptography
Historically three people have contributed to the art of cryptography:
4 Cryptography
listen to the communication channel (Passive intruder) but can also record
messages and play them back later, inject his own messages, or modify
legitimate messages before they get the to the receiver (Active intruder).
The art of breaking cyphers (cryptanalysis) and the art of devicing cyphers
(Cryptography) is collectively known as cryptology. It will often be useful
to have a notation for relating plain text, cypher text, and keys.
Dk(Ek(P))=P
This notation suggests that E and D are just mathematical functions, which
they are. The only tricky part is that both are functions of two parameters,
and we have written one of the parameters ( the key) as a subscript, rather
than as an argument, to distinguish it from the message.
5 Cryptography
figure(1)
figure works. The amout of effort necessary to invent. test and install a new
method every timeteh whole method is compromised or thought to be
compromised has always made it impractical to keep this secret, and
thinking it is secret when it is not does more harm than good.
6 Cryptography
This is where the key enters. The key consists of (relatively)
short strings that selects one of many potential encryptions. In contrast to the
general method, which may only be changed every few years, the key can be
changed as often as required. Thus our basic model is a stable and
completely known general method parametrized by a secret and easily
changed key.
7 Cryptography
analyst
has to deal with. The work factor for breaking the system by exhaustive
search of the keyspace is exponential in the keylength.
8 Cryptography
Substitution Ciphers
9 Cryptography
case, k becomes a key to the general method of circularly shifted alphabets.
The next improvement is to have each of the symbols in the plain text, say,
the 26 letters for simplicity, map onto some other letter. For example,
Plain text: a b cd e f g h i j k lmno p qr s t u vw xy z
Cipher text : Q W E R T Y U I O P A S D F G H J K L Z X C V B N M
This general system is called a mono-alphabetic substitution, with the key
been the 26 letter string correspondidg to the full alphabet. For the key
above, tha plain text attack would be transformed into the cipher text
QZZQEA.
to 4*10^26 possible keys in use. In contrast with the Caeser cipher trying
all of them is not a promising approach. Even at 1 microseconds per
solution, a computer would take 10^13 years to try all the keys.
10 Cryptography
A cryptanalyst trying to break a monoalphabetic substituion cipher
would start out by counting the relative frequencies of all letters in the
ciphertext. Then he might tenatively assign the most common one to e and
the next common to t. he wold then look for trigrams to find a common one
of the form tXe, which strongly suggests that X is h. Similarly , if the pattern
thYt occurs frequently,the Y probably stands for a.by making gusses at
common letters, digrams trigrams, and knowing about likely patterns of
vowels and consonants, the crypt analyst builds up a tenative plain text,letter
by letter.
11 Cryptography
However only two of these,31 and 42, have the next lettern (coressponding
to nin the plain text) repeated in the proper place .Of these two, only 31
also has a correctly positioned , so we know that financial begins at the
position
30. From this point on , deducing the key is easy by using the frequency
statistics for English text.
Transposition ciphers
12 Cryptography
written horizontally, in rows. The ciphertext is read out by columns starting
with the column whose keyletter is the lowest.
MEGABUCK
7 4 5 1 2 8 3 6
c o l l e g e o
f e n g i n e e
r i n g a b c d
Plaintext: collegeofengineering
Ciphertext: lggeiaeecoeilnmoedcfrgnb
13 Cryptography
examined to see if its diagram frequencies match those for English plaintext.
14 Cryptography
any replays send more than 5 minutes later will be rejected as too old.
15 Cryptography
selects one of the 8 lines exiting from the first page and sets it to 1: all the
other lines are zero. The second stage is a keybox.the third stage encodes the
selected input line in binary again. With the wiring shown, if the 8 octal
numbers 01234567 were input one after another, the output sequence would
be 24506713. `In other words,zero has been replaced by two , one has been
replaced by four etc, again by appropriate wiring of the P box inside the S
box , any substitution can be accomplished. The real power of these basic
elements only becomes apparent when we cascade a whole series of boxes to
form a product cipher.
DES
16 Cryptography
widely adopted by industry for use in security products.An out line of DES
is shown in figure .
(a)General outline
17 Cryptography
b)Detail of one iteration
18 Cryptography
these intermediate stages is illustrated in fig.(b).
19 Cryptography
used.
Conclusion
Although the above mentioned are cryptographic techniques
because of their disadvantages they are not used . Instead new techniques
like public key algorithms(RSA) are used.
Reference:
*************************************************************
*
20 Cryptography
21 Cryptography