Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Symmetric Encryption
or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key was only type prior to invention of public-key in 19 !"s and by far most widely used
(e)uirements
two re)uirements for secure use of symmetric encryption*
a strong encryption algorithm a secret key known only to sender / receiver
mathematically have*
Y + E,-. X/ X + 0,-. Y/
&ryptography
can characteri1e cryptographic system by*
type of encryption operations used
substitution transposition
&ryptanalysis
ob2ective to recover key not 2ust message general approaches*
cryptanalytic attack brute-force attack
&ryptanalytic 3ttacks
ciphertext only
only know algorithm 4 cipherte%t. is statistical. know or can identify plainte%t
known plaintext
know/suspect plainte%t 4 cipherte%t
chosen plaintext
select plainte%t and obtain cipherte%t
chosen ciphertext
select cipherte%t and obtain plainte%t
chosen text
select plainte%t or cipherte%t to
'ore 0efinitions
unconditional security
no matter how much computer power or time is available. the cipher cannot be broken since the cipherte%t provides insufficient information to uni)uely determine the corresponding plainte%t
computational security
given limited computing resources ,eg time needed for calculations is greater than age of universe/. the cipher cannot be broken
&aesar &ipher
earliest known substitution cipher by 6ulius &aesar first attested use in military affairs replaces each letter by 7rd letter on e%ample*
meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB
&aesar &ipher
can define transformation as*
a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
'onoalphabetic &ipher
rather than 2ust shifting the alphabet could shuffle ,2umble/ the letters arbitrarily each plainte%t letter maps to a different random cipherte%t letter hence key is 29 letters long
Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
other letters like @.6.-.A.B are fairly rare have tables of single. double 4 triple letter fre)uencies for various languages
Cse in &ryptanalysis
key concept - monoalphabetic substitution ciphers do not change relative letter fre)uencies discovered by 3rabian scientists in 9th century calculate letter fre)uencies for cipherte%t compare counts/plots against known values
Dlayfair &ipher
not even the large number of keys in a monoalphabetic cipher provides security one approach to improving security was to encrypt multiple letters the Play air !ipher is an e%ample invented by &harles Eheatstone in 1FG<. but named after his friend #aron Dlayfair
it can be broken. given a few hundred letters since still has much of plainte%t structure
Dolyalphabetic &iphers
polyalphabetic substitution ciphers improve security using multiple cipher alphabets make cryptanalysis harder with more alphabets to guess and flatter fre)uency distribution use a key to select which alphabet is used for each letter of the message use each alphabet in turn repeat from start after end of key is reached
LigenMre &ipher
simplest polyalphabetic substitution cipher effectively multiple caesar ciphers key is multiple letters long - + k1 k2 HHH kd ith letter specifies ith alphabet to use use each alphabet in turn repeat from start after d letters in message
Lernam &ipher
ultimate defense is to use a key as long as the plainte%t with no statistical relationship to it invented by 3$4$ engineer Nilbert Lernam in 191F originally proposed using a very long but eventually repeating key
?ne-$ime Dad
if a truly random key as long as the message is used. the cipher will be secure called a ?ne-$ime pad is unbreakable since cipherte%t bears no statistical relationship to the plainte%t since for any plaintext 4 any ciphertext there e%ists a key mapping one to other can only use the key once though problems in generation 4 safe distribution of key
Iill &ipher
& + D- mod ,29/ D + &--1 mod ,29/
$ransposition &iphers
now consider classical transposition or permutation ciphers these hide the message by rearranging the letter order without altering the actual letters used can recognise these since have the same fre)uency distribution as the original te%t
giving cipherte%t
MEMATRHTGPRYETEFETEOAAT
Droduct &iphers
ciphers using substitutions or transpositions are not secure because of language characteristics hence consider using several ciphers in succession to make harder. but*
two substitutions make a more comple% substitution two transpositions make more comple% transposition but a substitution followed by a transposition makes a new much harder cipher
(otor 'achines
before modern ciphers. rotor machines were most common comple% ciphers in use widely used in EE2
Nerman Enigma. 3llied Iagelin. 6apanese Durple
implemented a very comple%. varying substitution cipher used a series of cylinders. each giving one substitution. which rotated and changed after each letter was encrypted
Summary
have considered*
classical cipher techni)ues and terminology monoalphabetic substitution ciphers cryptanalysis using letter fre)uencies Dlayfair cipher polyalphabetic ciphers transposition ciphers stegnography