Classical Substitution Ciphers Letters of plaintext are replaced by other letters, by numbers, or by... Caesar Cipher Earliest known substitution cipher Invented by Julius Caesar
Trang 1Cryptography
Network Systems Security
Mort Anvari
Trang 2 Can be characterized by
type of encryption operations used
substitution / transposition / product
number of keys used
single-key or shared / two-key or public
way in which plaintext is processed
block / stream
Trang 3Security of Cryptography
Unconditional security
no matter how much computer power is
available, the cipher cannot be broken since the ciphertext provides insufficient
information to uniquely determine the
corresponding plaintext
Computational security
given limited computing resources (eg time needed for calculations is greater than age
Trang 4Cryptographic Tools To Be
Used
Shared keys
Public and private keys
Hashing functions and message digest
Nonces
Trang 5Symmetric Encryption
Sender and receiver share a common key
All classical encryption algorithms
belong to this type
Was only type prior to invention of
public-key in 1970’s
Trang 6Basic Terminology
plaintext - the original message
ciphertext - the coded message
cipher - algorithm for transforming plaintext to
cryptography - study of encryption principles/methods
cryptanalysis (codebreaking) - the study of
principles/ methods of deciphering ciphertext without
knowing key
cryptology - the field of both cryptography and
cryptanalysis
Trang 7Types of Cryptanalytic
Attacks
Ciphertext only
only know algorithm, ciphertext, and statistics
can identify plaintext
Trang 8Symmetric Cipher Model
Trang 9 Two requirements for secure use of
symmetric encryption
a strong encryption algorithm
a secret key K known only to sender and receiver
Y = E K (X)
X = D K (Y)
Assume encryption algorithm is known
Imply a secure channel used to
distribute key
Trang 10Classical Substitution
Ciphers
Letters of plaintext are replaced by
other letters, by numbers, or by
Trang 11Caesar Cipher
Earliest known substitution cipher
Invented by Julius Caesar
First attested use in military affairs
Replace each letter by letter three
places down the alphabet
For example,
meet me after the toga party
PHHW PH DIWHU WKH WRJD SDUWB
Trang 12Mechanism of Caesar Cipher
Can define transformation as
Trang 13Cryptanalysis of Caesar
Cipher
Only 26 possible ciphers
“A” maps to “A”, “B”, “Z”
Can easily break with brute-force
Trang 14Monoalphabetic Cipher
Rather than just shifting the alphabet
Can shuffle the letters arbitrarily
Each letter in plain alphabet maps to a different random letter in cipher
Trang 15Monoalphabetic Cipher
Security
Now have a total of 26! ≥ 4 x 1026 keys
With so many keys, might think is
secure
Still has problem: natural language
characteristics
Trang 16Language Characteristics and Cryptanalysis
Letters are not equally commonly used
In English, “E” is by far the most
common letter, followed by “T”, “A”,
“O”, “I”, “N”, “S”, “H”, “R”
Other letters “Z”, “J”, “K”, “Q”, “X” are rarely used
Have tables of single, double & triple letter frequencies
Trang 17English Letter Frequencies
Trang 18Cryptanalysis of Caesar
Cipher and Monoalphabetic
Cipher
not change relative letter frequencies
Discovered by Arabian scientists in 9 th
century
troughs
peaks at: A-E-I triple, NO pair, RST triple
troughs at: JK, X-Z
tables of common double/triple letters help
Trang 20Playfair Cipher
Not even the large number of keys in a monoalphabetic cipher provides security
One approach to improving security was
to encrypt multiple letters
Playfair cipher is an example
Trang 21Playfair Key Matrix
A 5X5 matrix of letters based on a
keyword
Fill in letters of keyword (sans
duplicates)
Fill rest of matrix with other letters
Eg using the keyword MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
Trang 22Encrypting and Decrypting
plaintext encrypted two letters at a
time
1 if a pair is a repeated letter, insert a filler like “X”
eg “balloon” encrypts as “ba lx lo on”
2 if both letters fall in the same row, replace each with letter to right (wrapping back to start from end)
eg “ar” encrypts as “RM”
3 if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) eg “mu” encrypts to “CM”
4 otherwise each letter is replaced by the one in its
row in the column of the other letter of the pair
eg “hs” encrypts to “BP”, and “ea”
to “IM” or “JM” (as desired)
Trang 23Security of Playfair Cipher
Security much improved over
monoalphabetic
Have 26 x 26 = 676 digrams
Would need a 676 entry frequency table
to analyze (verses 26 for a
Trang 24 Use each alphabet in turn
Repeat from start after end of key is reached
Trang 25Vigenère Cipher
Simplest polyalphabetic substitution
cipher which effectively multiply Caesar ciphers
Key is multiple letters long K = k1 k2
kd
i th letter specifies i th alphabet to use
Use each key letter as a Caesar cipher key
Eg using keyword deceptive
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
Trang 26Security of Vigenère
Ciphers
plaintext letter: obscure letter frequencies a bit
see if look monoalphabetic or not
if not, need to determine number of alphabets
which results in the same ciphertext (could
also be random fluke)
Eg repeated “VTW” in previous example
suggests size of 3 or 9
Trang 27Autokey Cipher
prefix keyword to message as key
Trang 28 for any plaintext and any ciphertext there exists
a key mapping one to other
Can only use the key once
Trang 30Rail Fence Cipher
Write message letters out diagonally
over a number of rows
Then read off cipher row by row
For example, write message out as
m e m a t r h t g p r y
e t e f e t e o a a t
and get ciphertext as
MEMATRHTGPRYETEFETEOAAT
Trang 31Row Transposition Ciphers
A more complex scheme
Write letters of message out in rows
over a specified number of columns
Then reorder the columns according to some key before reading off the rows
Trang 32Product Ciphers
are not secure because of language
characteristics
succession to make it harder to break
two substitutions make a more complex
substitution, but still a substitution
two transpositions make a more complex
transposition, but still a transposition
but a substitution followed by a transposition makes
a new much harder cipher
Trang 33Rotor Machines
Before modern ciphers, rotor machines were most common product cipher
Were widely used in WW2
German Enigma, Allied Hagelin, Japanese Purple
Implement a very complex, varying
substitution cipher
Use a series of cylinders, each giving one substitution, which rotate and
change after each letter was encrypted
With 3 cylinders, have 263=17576
Trang 34An Example of Rotor Machine
Trang 35 using only a subset of letters/words in a
longer message marked in some way
using invisible ink
hiding in LSB in graphic image or sound file
Has drawbacks
high overhead to hide relatively few info bits
Trang 36Next Class
Block ciphers
Modern symmetric encryption standard