Professional Documents
Culture Documents
Classical Encryption Techniques
Classical Encryption Techniques
Classical Encryption Techniques
Terminology
• Plaintext – original message
• Cipher Text – coded message
• Enciphering/Encryption – Process of converting from plain
text to cipher text.
• Deciphering/Decryption – restoring plain text from cipher
text.
• Cryptography – schemes used for encryption
• Cryptanalysis – deciphering a message without the
knowledge of encryption schemes – “breaking the code”
• Cryptology – cryptography + cryptanalysis
Symmetric Cipher Model
• A symmetric encryption scheme has 5 ingredients:
1. Plaintext: This is the original intelligible message
2. Encryption algorithm: The encryption algorithm
performs various substitutions and transformations on
the plaintext.
3. Secret key: The secret key is also input to the
encryption algorithm – the encryption algorithm produces different
ciphertext for different key values, for the same input
k is the key
Decryption
• Cryptanalysis easy since:
• 1. The encryption and decryption algorithms
are known.
• 2. There are only 25 keys to try.
• 3. The language of the plaintext is known and
easily recognizable.
Monoalphabetic Ciphers
• Caesar cipher can be made secure by
increasing key size
• By arbitrary substitution
• With 26 characters 26! Keys possible ~~ 4x1026
• Monoalphabetic substitution cipher – one
mapping from plain text to cipher text
Issues
• If nature of plaintext known, eg. English,
cryptanalysis based on regularities of the
language.
• Monoalphabetic cipher easily broken
• Alternatives - encrypt multiple letters of
plaintext, use multiple cipher alphabets
Playfair Cipher
• multiple-letter encryption cipher
• Digrams translated to cipher text
• based on the use of a 5 * 5 matrix of letters
constructed using a keyword
• Rules for encryption:
• 1. Repeating plaintext letters that are in the same pair are separated
with a filler letter, such as x, so that balloon would be treated as ba lx lo
on.
• 2. Two plaintext letters that fall in the same row of the matrix are
each replaced by the letter to the right, with the first element of the
row circularly following the last. For example, ar is encrypted as RM.
• 3. Two plaintext letters that fall in the same column are each replaced
by the letter beneath, with the top element of the column circularly
following the last. For example, mu is encrypted as CM.
• 4. Otherwise, each plaintext letter in a pair is replaced by the letter that
lies in its own row and the column occupied by the other plaintext
letter. Thus, hs becomes BP and ea becomes IM
• Frequency analysis difficult
– 26x26 = 676 digrams
– relativefrequencies of individual letters exhibit a
much greater range than that of digrams
• Used by British Army in World War I and also used by US and
Allies in WWII
• The structure of language still present, hence breakable
Hill Cipher