Professional Documents
Culture Documents
Lecture 3
Lecture 3
Classical Cryptography
Classical cipher systems
• The Vernam cipher (1917) (One-time pad)
– Key: binary random sequence used only once.
– Mathematical representation:
• Encipherment: 0 1
• Decipherment: y i xi z i
0 0 1
– Example - plaintext:
xi come
yi z i soon (Encoding ITA-2 : 1 1 0
Plaintext 01110 11000 11100 00001 00100 00101 11000 11000 01100
Key 11011 00101 01011 00110 01111 10110 10101 01100 10010
Ciphertext 10101 11101 10111 00111 01011 10011 01101 10100 11110
2/71
Classical cipher systems
3/71
Classical cipher systems
4/71
Classical cipher systems
• ITA-2
Binary Decimal LETTERS NUMBERS Binary Decimal LETTERS NUMBERS
----------------------------------------------------- ----------------------------------------------------
00000 0 BLANK BLANK 10000 16 T 5
00001 1 E 3 10001 17 Z "
00010 2 LF LF 10010 18 L )
00011 3 A - 10011 19 W 2
00100 4 SP SP 10100 20 H #
00101 5 S BELL 10101 21 Y 6
00110 6 I 8 10110 22 P 0
00111 7 U 7 10111 23 Q 1
01000 8 CR CR 11000 24 O 9
01001 9 D $ 11001 25 B ?
01010 10 R 4 11010 26 G &
01011 11 J ‘ 11011 27 FIGS FIGS
01100 12 N , 11100 28 M .
01101 13 F ! 11101 29 X /
01110 14 C : 11110 30 V ;
01111 15 K ( 11111 31 LTRS LTRS
5/71
Cryptographic security
6/71
Cryptographic security
• Example: any monoalphabetic cipher
– 26 letters alphabet
– Each key (a permutation of the alphabet) equally
likely
– Relatively long plaintext (>25 letters for English)
7/71
Cryptographic security
• Example (cont.):
– 1 ns (10-9s) to check one out of 26! possible keys
– Then we need 1.281010 years to try all the keys.
– Is the system secure? No!
– We can break it by statistical means, without trying
any key.
8/71
Cryptographic security
9/71
Cryptographic security
10/71
Cryptographic security
11/71
Cryptographic security
12/71
Cryptographic security
• Example (cont.)
– Then there is exactly one key transforming each
plaintext to each cryptogram.
– Even if the cryptanalyst can try all the possible
keys, there is no way of telling whether the
obtained plaintext is the right one or not, since all
the plaintexts obtained by trying the keys will
belong to the set X.
13/71
Cryptographic security
15/71
Cryptographic security
G, O 4%
18/71