Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
3
School of Information Technology, JNTUH, Hyderabad, India,
sdurga.bhavani@gmail.com
(11)
This completes the process of interlacing.
It may be noted here that inverse interlacing is a reverse
(6)
process to interlacing.
In the process of interlacing, we associate the binary
In what follows, we present the algorithms for
bits given above, in a column wise manner. Thus we get the
encryption, and decryption.
new Pi as the first m columns of the matrix in (6), the new
Qi as the next m columns of the matrix in (6), and so on. For Algorithm for Encryption
example,
(7)
In a similar manner, we can obtain Qi to Wi.
Let us illustrate the above process by considering a simple
example. Let
(8)
This can be written in the binary form as shown below.
(10)
Here, the first row contains the first four columns of (9),
the second row contains the next four columns of (9) and so
on. Thus we get
72 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 9, September 2010
3. Illustration of the cipher If we assume that the process of encryption with each
key requires 10–7 seconds, then the time required for the
Consider the plain text given below. computation with all possible keys is equal to
“Dear brother! I have passed my B. Tech (ECE) with
distinction. All this is due to the scholarship sanctioned by
our Government. Now I want to enter into politics”
(12) As this process of computation is taking a very long
Let us focus our attention on the first 32 characters. time, the brute-force attack is totally impossible.
This is given by Let us now study the known plain text attack. In this
“Dear brother! I have passed my B” (13) case, we are having as many plain text and cipher text pairs
On using EBCDIC code, (13) can be written in the form as we require. Here, in carrying out the encryption process,
as the m decimal numbers in each of the 2m decimal
(14) numbers are multiplied by the key and as the portions of the
Let us consider a square key matrix K of size 4. We modified plain text are interlaced at the end of each round of
have the iteration process, the key K cannot be determined by any
means.
(15) In the last two cases, that is, in the chosen plain text
attack and in the chosen cipher text attack, intuitively no
On using (14) and (15) and applying the encryption special choice appears as a possible one, as the process of
algorithm, given in section 2, with n = 16, we get the cipher encryption is a complex one.
text C in the form In the light of the above analysis, we conclude that the
cipher cannot be broken by any attack.
(16)
On applying the decryption algorithm (See Section 2),
we get back the original plain text given by (13). 5. Computations and Conclusions
Now, let us study the avalanche effect for determining In this paper, we have developed a block cipher by using a
the strength of the algorithm. Let us change the 24th Feistel structure. In this, we have taken a plain text of length
character ‘s’ to ‘t’ in (13). Due to this, 162 in (14) becomes 256 binary bits and made use of a key K containing 128 bits.
163 and hence, the P0 undergoes a change of 1 binary bit. The programs for encryption and decryption are written in C
Thus the entire plain text comprising P0 to W0 also language.
undergoes a change of 1 binary bit. Now, on applying the On adopting the procedure discussed in section 3, the
encryption algorithm on the modified plain text, we get cipher text corresponding to the rest of the plain text (which
(17) can be divided into four parts) can be obtained as
On comparing the cipher texts given by (16) and (17),
after converting them into binary form, we find that they
differ by 130 bits. As a change of 1 bit in the plain text is
leading to a change of 130 bits (out of 256 bits) in the cipher
texts, we notice that the cipher is a strong one.
Now let us consider the effect of changing the key by The avalanche effect mentioned in section 3 and the
one binary bit. This can be done by replacing 126 (the 2nd cryptanalysis discussed in section 4, clearly indicate that the
row 2nd column element of the key) by 127. Now on cipher is a strong one, and it cannot be broken by any
applying the process of encryption on the original plain text cryptanalytic attack.
(14), we get the new C given by
(18)
References
On comparing the cipher text C given in (16) and (18), [1] William Stallings, Cryptography and Network Security,
we notice that they differ by 138 bits (out of 256 bits). This Principles and Practice, Third Edition, Pearson, 2003.
also shows that the cipher is a strong one. [2] Schaefer, E., “A Simplified Data Encryption Standard
Algorithm”, Cryptologia, Jan 1996.
4. Cryptanalysis [3] H. Feistel, “Cryptography and Computer Privacy”,
Scientific American, May 1973.
In the study of cryptography [6] the well known methods for [4] Feistel, H., Notz, W., and Smith, J., “Some
cryptanalysis are: Cryptographic Techniques for Machine-to-Machine
1. Cipher text only (brute-force) attack Data Communications”, Proceedings of the IEEE, Nov.
2. Known Plain text attack 1975.
3. Chosen Plain text attack [5] R. C. W. Phan, and Mohammed Umar Siddiqi, “A
4. Chosen Cipher text attack Framework for Describing Block Cipher
In all these attacks, it is assumed that the encryption Cryptanalysis”, IEEE Transactions on Computers, Vol.
algorithm and the cipher text are known to the attacker. 55, No. 11, pp. 1402 – 1409, Nov. 2006.
In the brute-force attack, as the key is containing 128 [6] D Denning, “Cryptography and Data Security”,
binary bits, the size of the key space is Addison-Wesley, 1982.
2128 = (210)12.8 ≈ 1038.4