Professional Documents
Culture Documents
4/22/12
Some terminologies
Sender, S usually is referred as Alice. Is a
intruder/interceptor
4/22/12
Some terminologies
Encryption: or also called as encoding,
encipherment
decipherment.
Some terminologies
Plaintext, p: original form of a message Ciphertext, c: the encrypted form of a
message message
In mathematical form, K
Plain text e C = E k(M) y Encrypt Ciphe rtext ion
K e y Decrypt ion
Original plaintext
4/22/12
Some terminologies
Cryptanalysis: by an attacker, trying to find
out the original message by studying the encryption and encrypted messages. called a cryptanalyst
4/22/12
The intruder
Block message: prevent it from reaching R,
affecting availability
(CIAA)
4/22/12
key and Bob decrypt the message using his private key
4/22/12
4/22/12
Confusion
The cipher must show an avalanche effect. The desired effect is called Strict Avalanche
Criterion (SAC)
bits, it will cause each of the output bit to change with a probability of half (0.5)
permutation.
4/22/12
c i= E(pi) = pi + 3
Decryption using caesar cipher:
p i= D(ci) = ci - 3
4/22/12
Caesar Cipher
Full translation chart of caesar cipher:
Plaintext Ciphertext
A B C D E F G H I d e f g h i j k l
K L M N O P Q R S T U V W X Y Z s t u v w x y z a b c
m n o p q r
Eg: using this encryption, the message TREATY IMPOSSIBLE Would be encoded as P: T R E A T Y I M P O S S I B L E c: w u h d w b l p s r v v l e o h 4/22/12
The ciphertexts retain the space as in the Therefore a cryptanalyst can easily derive a
4/22/12
nonrepeating sequence of numbers that are combined with the plaintext. nonrepeating key, and this key is not reused. In other words, the key is only used once.
4/22/12
Vernam cipher
Eg:
Plaintext V E R N A M C I P H E R 8 15 7 4 17 Numeric equivalent 21 4 17 13 + random number = sum = mod 26 Ciphertext 0 12 2
76 48 16 82 44
3 58 11 60 5 48 88
97 52 33 95 44 15 60 19 75 12 52 105 19 0 7 t a 17 18 15 8 19 23 12 0 1 4/22/12 h r s p i t x m a b
into columns
4/22/12
on a good cipher:
determine the amount of labor appropriate for the encryption and decryption
2. The set of eys and the enciphering algorithm
as simple as possible
4. Errors in ciphering should not propagate and
Stream cipher
Caesar and vernam cipher are stream
ciphers
Block cipher
The cipher operates on a block of bits Harder for a cryptanalyst to break the code. A block cipher encrypts a group of plaintext
4/22/12
encryption: substitution and transposition two techniques, one of top of the other, for a total of 16 cycles. The key is 64 bits long purpose chip.
4/22/12
DES
foundation; uses substitution, transposition, and the shift, exclosive OR, and addition operations.
It also repeats cycles, or also called rounds. There are 10,12 or 14 cycles for keys of
AES
Consists of four steps:
Byte substitution; uses substitution box
structure similar to the DES, substituting each byte of a 128 bit block according to a substitution table
Shift row: a transposition step. Mix column: this step involves shifting left and
AES
Figure:AES Algorithm. You may go here http://www.cs.bc.edu/~ straubin/cs381-05/blockciphers/rijndael_ingles2004.swf to experience the simulation of AES 4/22/12