Professional Documents
Culture Documents
Chapter 10 - Cryptography
Chapter 10 - Cryptography
Chapter 10 - Cryptography
History of Encryption
Substitution Techniques: Caesar Cipher, Monoalphabetic
Ciphers, Playfair Cipher, Polyalphabetic Ciphers
Transposition Techniques: Rail Fence
Symmetric and asymmetric encryption
Hash
Digital signatures
06/09/2017 2
1
06/09/2017
Classical cryptography
o History of cryptography is over than 3,000 years
o The object of the cryptography is characters
o Encryption/Decryption is performed manually or by
using mechanical principles
o Applied commonly in military
• A series of three rotors from an
Enigma machine, used by Germany
Military during World War II
2
06/09/2017
05/09/2017 5
Secret key: The secret key is also input to the encryption algorithm.
The key is a value independent of the plaintext and of the algorithm.
05/09/2017 6
3
06/09/2017
Goal: confidentiality
Internet Protocol Security (IPSec):
o a set of protocols designed (to operate at the Netw ork layer of the OSI)
to protect the confidentiality and integrity of data as it flows over a
network.
05/09/2017 8
4
06/09/2017
05/09/2017 9
●Break a cipher:
●Uncovering plaintext p from ciphertext c, or,
alternatively, discovering the key
5
06/09/2017
●Brute-force attack
●E.g., try all possible keys
●Cryptanalysis
●Analysis of the algorithm
and data characteristics
●Implementation attacks
●E.g., side channel analysis
●Social-engineering attacks
Cryptanalysis
Brute-force attack • Attack relies on the nature of
• Attacker tries every possible the algorithm plus some
key on a piece of ciphertext until knowledge of the general
an intelligible translation into characteristics of the plaintext
plaintext is obtained • Attack exploits the
• On average, half of all possible characteristics of the algorithm to
keys must be tried to achieve attempt to deduce a specific
success plaintext or to deduce the key
being used
05/09/2017 12
6
06/09/2017
05/09/2017 13
06/09/2017 14
7
06/09/2017
06/09/2017 15
Caesar
Plaintext (bit pattern)
are replaced by other
letters or by numbers or
symbols Monoalphabetic
Pervasive
Playfair
Pervasiv
Rail fence
e
05/09/2017 16
8
06/09/2017
Caesar Cipher,
Monoalphabetic Ciphers,
Playfair Cipher,
Polyalphabetic Ciphers
05/09/2017 18
9
06/09/2017
05/09/2017 19
10
06/09/2017
05/09/2017 21
Brute-Force
Cryptanalysis of Caesar
Cipher
Ex: Decryption
PHHW PH DIWHU WKH
WRJD SDUWB
06/09/2017 22
11
06/09/2017
05/09/2017 23
Ex: plaintext:
UZQSOVUOHXMOPV GPOZPEVSGZWS ZOPFPES XUDBME TS XA IZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHS XEPYEPO
PDZSZUFPOMBZWPFUP ZHMDJUDTMOHMQ
24
12
06/09/2017
05/09/2017 25
13
06/09/2017
05/09/2017 27
Process:
o Fill in letters of keyword from left to right and from top
to bottom, step another letter if a letter repeated
o Fill in the remainder of the matrix with the remaining
letters in alphabetic order
o Note: I & J: same cell
05/09/2017 28
14
06/09/2017
o If both letters fall in the same row, replace each with letter to
right (wrapping back to start from end)
o If both letters fall in the same column, replace each with the letter
below it (wrapping to top from bottom)
05/09/2017 29
05/09/2017 30
15
06/09/2017
05/09/2017 31
* * * * *
* A B C D
* E G H P
* * R S *
* T U X Z
05/09/2017 32
16
06/09/2017
05/09/2017 33
05/09/2017 34
17
06/09/2017
plain
Key text
05/09/2017 35
05/09/2017 36
18
06/09/2017
One locates the first letter of the key in the left column,
and locates on the row the first letter of the ciphered
message. Then go up in the column to read the first
letter, it is the corresponding plain letter.
One continues with the next letters of the message and
the next letters of the key, when arrived at the end of the
key, go back the the first key of the key.
05/09/2017 37
05/09/2017 38
19
06/09/2017
05/09/2017 40
20
06/09/2017
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
05/09/2017 41
06/09/2017 42
21
06/09/2017
06/09/2017 43
22
06/09/2017
A block cipher:
- processes the plaintext input in fixed-size blocks
- produces a block of ciphertext of equal size for each plaintext block.
23
06/09/2017
24
06/09/2017
25
06/09/2017
26
06/09/2017
27
06/09/2017
4
5
2
1. Prepares a message.
2. Generates a random symmetric key that will be used this one time only.
3. Encrypts that message using symmetric encryption the one -time key.
4. Encrypts the one-time key using public-key encryption with Alice’s public key.
5. Attaches the encrypted one-time key to the encrypted message and sends it
Receiver is capable of decrypting the one-time key and recovering the original message.
If Bob obtains Alice’s public key by means of Alice’s public -key certificate, then Bob is
assured that it is a valid key.
28
06/09/2017
History of Encryption
Substitution Techniques: Caesar Cipher, Monoalphabetic
Ciphers, Playfair Cipher, Polyalphabetic Ciphers
Transposition Techniques: Rail Fence
Symmetric and asymmetric encryption
Hash
Digital signatures
06/09/2017 57
05/09/2017 58
29
06/09/2017
05/09/2017 59
30