Professional Documents
Culture Documents
CRYPTOLOGY
CRYPTOLOGY
Classical Cryptography
Cryptosystem 1.1. Shift Cipher [22]
Cryptosystem 1.2. Permutation Cipher [22]
There are five components to any cryptosystem: plaintext, ciphertext, keyspace, encryption rule, and
decryption rule.
Most modern block ciphers are based on iterative product ciphers proposed by Shannon in [20].
Iterative block ciphers incorporate a combination of permutations and substitutions and are used to
encrypt large amounts of data.
the publication of an iterative block cipher known as Date Encryption Standard (DES) was a major
influence in the development of cryptanalysis. DES paved the way to the creation of many block ciphers
which are classified as substitution-permutation networks (SPN). SPN’s significant contribution to
cryptography is the ability to implement encryption efficiently in hardware.
Advanced Encryption System (AES), a type of SPN based on the Rijndael cipher, is specified
for use in the encryption of electronic data and is used worldwide.[22]
Once the encrypter encrypts his message with the decrypters public encryption key, the
message is locked. The only way to unlock the message is to use the decryption key, which is
kept private and is only known by the decrypter.
A well known example of a public-key cryptosystem is the RSA Cryptosystem. The idea behind RSA
is it is easy to multiply two large prime numbers, however, factoring two large prime numbers is a very
challenging problem.
Cryptanalysis
Cryptanalysis is the study of analyzing a cryptosystem to gain information about the secret key.
Provable security provides proof of security relative to a simpler problem. This is not
an absolute proof as it is a proof by reduction. Instead, it proves that determining the
key is at least as challenging to break as another problem.
Shannon discusses in [20] that confusion and diffusion are two elements which help
obstruct the statistical analysis of a cryptosystem and therefore can make a cryptosystem
more secure.
Diffusion is a process that disperses the statistical data. To successfully diffuse the statistical
data, the non-uniformity of the plaintext must be dispersed across the ciphertext to make the
non-uniformity less detectable
In practice, if one element of the plaintext is changed, then multiple elements of the
ciphertext should be affected and also changed.
Confusion is a process which makes the secret key of the cryptosystem relate to the plaintext
in a more complex way.
In the case of confusion, the relationship between the ciphertext and the secret key should be
as complex and as involved as possible.
To ensure a system has both confusion and diffusion, many cryptosystems use multiple
rounds of a combination of substitution (replacement of elements based on a set of rules) and
permutations (manipulation of the order of elements).
In many cases, a dynamical system is the approximation of a system’s true dynamics which
can be altered by interactions with other systems or by time scales that cannot be
incorporated into the model.
As the nonlinearities of a system become stronger, those outcomes become less predictable
Dynamical systems are mathematical models that provide a rule for how the system changes
relative to time [9].
This shows that xt+1 maps to two different values for xt.
The remaining examples will focus around the logistic map in order to simplify the
discussion of dynamical systems
The dynamics of these systems are based on the nth-dimensional composition of the
function. Figure 1.3 is a visual representation of this. It can be mathematically represented by
the function fn(x0) = f(f(_ _ _ f(f(x0)))) = xn, where the initial state, or condition, x0 is
iterated n times.
Discrete time systems can be visualized with maps that show the orbit of an initial condition
as a set of disconnected points [14]. Figure 1.4 shows the possible inputs and outputs for the
logistic map plotted as a green curve.
One way to graphically represent the orbit of discrete maps is with cobweb plots.
1.2.1 Concepts of Dynamical Systems
The fundamental concepts in the study of dynamical systems are finding and understanding
the orbits of dynamical systems. These topics include stability of equilibrium points, orbits,
periodic points/orbits, and bifurcations.
Another way to discuss stability is by looking at the Lyapunov exponents of the system.
Lyapunov exponents provide a measure of the stability of a trajectory, the orbit or path taken
by an initial condition for a dynamical system with a given parameter value. The orbits that
end at a fixed point are considered stable.
The stability of the system cannot be determined when |f’(p)| = 1 because this implies the
function experiences a change for this parameter value called a bifurcation.
Saddle-node bifurcations occur when one fixed point changes stability giving way to an
additional fixed point.
Period-doubling bifurcations occur when one stable fixed point becomes unstable and leads
to multiple stable fixed points [1].
1.2.2 Chaos
chaotic dynamics occurs when nearby trajectories separate at an exponential rate making the
motion appear asymptotically unstable [9]. A geometric representation of chaotic motion in a
nonlinear dynamical system is a screen-saver image that continually bounces off the side of the
screen in different directions, but remains forever on the screen. In a nonlinear dynamical
system, the orbit of an initial condition separates exponentially, however, the motion of the
orbit folds back on itself limiting the phase space to a bounded region [9]. In [1], a chaotic orbit
is described as “one that forever continues to experience the unstable behavior that an orbit
exhibits near an unstable point, but that is not itself fixed or periodic.” Unlike periodic orbits,
chaotic orbits never repeat the same behavior.
In fact, an initial condition in a chaotic system can be iterated infinite many times without
ever reaching the same output twice.