Model of Conventional Encryption
Model of Conventional Encryption
, University of Windsor
X^
Cryptanalyst
Y^
Message
Source
Encryption
Algorithm
Decryption
Algorithm
Destination
K
Secure Channel
Key
Source
Figure. 1:
Sep. 23.2003
Referring to Fig. 1 above, with the message X and the encryption key K as input,
the encryption algorithm forms the ciphertext.
Y=Ek (X)
The intended receiver, in possession of the key is able to invert the
transformation
X=Dk (Y)
An opponent, observing Y but not having access to K or X, may attempt to
recover X or K or both X and K. It is assumed that the opponent knows the
encryption (E) and decryption (D) algorithms. If the opponent is interested in only
this particular message, then the focus of the effort is to recover X by generating
a plaintext estimate X^. Often, however, the opponent is interested in being able
to read future messages as well, in which case an attempt is made to recover K
by generating an estimate K^.
2.3-2 Cryptanalysis
The process of attempting to discover X or Y or both is known as cryptanalysis.
The strategy used by the cryptanalysis depends on the nature of the encryption
scheme and the information available to the cryptanalyst.
The following table summarizes the various types of cryptanalytic attacks based
on the amount of information known to the cryptanalyst.
Chosen Plaintext
Sep. 23.2003
Encryption algorithm
Ciphertext to be decoded
Encryption algorithm
Ciphertext to be decoded
One or more plaintext-ciphertext pairs formed with
the same secret key
Encryption algorithm
Ciphertext to be decoded
Plaintext message chosen by cryptanalyst, together
with its corresponding ciphertext generated with
Chosen Ciphertext
Chosen text
Example 1:
Plaintext: last nite was heaven please marry me
We use a 5x6 grid to write the plaintext as:
Read
down
L
T
E
L
A
A
E
A
E
R
S
W
V
A
R
T
A
E
S
Y
N
S
N
E
M
I
H
P
M
E
To encipher the text, we only read letters down the first column, then letters down
from the second column, and so on. The ciphered letters are the same as the
plaintext letters except that they are positioned to form a new pattern, as given
below.
Ciphertext:
To decipher the received ciphertext, the receiver must know two things: the
length and width of the grid and the way letters are read from the grid.
Sep. 23.2003
Note 1:
The transposition cipher is also known as permutation cipher. We
know give the mathematical description of the permutation cryptosystem as
follows:
Def:
Permutation Cipher
Let m be a positive integer. Let P =C = (Z26)m and let K consist of all permutations
of {1, , m}. For a key (i.e., a permutation) , we define
e (x1, , x m)=( x(1), , x(m)) and
d (y1, , ym)=( y-1(1), , y-1(m)) ,
where -1 is the inverse permutation to .
Example 2: Suppose m = 6 and the key is the following permutation :
x
(x)
1
3
2
6
3
1
4
5
5
2
6
4
Note that the first row of this diagram lists the values of x, 1 x 6, and the 2nd
row lists the corresponding values of (x).
The inverse permutation -1 can be constructed by interchanging the two rows in
this diagram, and rearranging the columns so that the first row is in increasing
order. Thus, carrying out these operations, we get the following decryption
permutation -1 as:
x
(x)
-1
1
3
2
5
3
1
4
6
5
4
6
2
Sep. 23.2003
1
E
S
L
H
2
E
A
S
S
3
S
L
H
Y
4
L
S
B
E
5
S
E
L
E
6
H
S
E
T
k12
k22
k32
k13 x1
k23 x2
k33 x3
or in a compact form
Y=KX
Where Y and X are column vectors of length 3, representing the ciphertext and
plaintext letters, and K is a 33 matrix, representing the encryption key.
Operations are performed mod26. Decryption requires using the inverse of matrix
K.
Example 1: Consider the plaintext paymoremoney, and use the
encryption key
Sep. 23.2003
17 17 5
K 21 18 21
2 2 19
paymoremoney
15 0 24
The first three letters of the plaintext are represented by vector (x1, x2, x3)=(15, 0,
24)
Thus:
y1
x1 17 17 5 15
y2 K x2 21 18 21 0
y
x 2 2 19 24
3
3
That is:
y1 375
11 L
y2 819 mod 26 13 N
18 S
y 489
Continuing in this fashion, the ciphertext for the entire plaintext is:
Ciphertext: LNSHDLEWMTRW
Q.E.D.
Decryption requires using the inverse of the matrix K. The inverse K of a matrix
K is defined by the equation K K1= K1K =I, where I is the diagonal matrix that is
all zeros except for ones along the main diagonal from upper left to lower right.
1
Note 2:
The inverse of a matrix does not always exist, but when it does, it
satisfies the preceding equation.
Exercise 1:
Sep. 23.2003
4 9 15
15 17 6
24 0 17
Note 3:
It is easily shown that if the matrix K1 is applied to the above
resulting ciphertext, then the plaintext can be recovered.
Exercise 2:
LNSHDLEWMTRW
He has also estimated the decryption matrix from some previous analysis for this
Hill Cipher to be:
4 9 15
1
K 15 17 6
24 0 17
C = EK(P)=KP
P = DK(C) = K1 C= K1 KP = P
Note 1:
Hill Cipher completely hides single-letter frequencies. Use of a
larger matrix hides more frequency information.
Sep. 23.2003
Note 2:
The weakness of the Hill Cipher is that it is easily broken with a
known plaintext attack.
To show this, suppose we have m plaintext-ciphertext pairs, each of length m.
Let
Pj=(P1j, P2j, , Pmj)
Cj=(C1j, C2j, , Cmj)
Therefore, we can write
Cj=KPj
1jm
f
15
P
15
r
17
Q
16
i
8
C
2
d
3
F
5
a y
0 24
K U
10 20
For the unknown key matrix is K, we can write the following plaintext-ciphertext
pairs:
KPj = Cj
Sep. 23.2003
1jm
Using the first two plaintext-ciphertext pairs, we can write the following matrix
equation:
15 16 5 17
K
2 5 8 3
mod 26
5 17 15 16
K =
8 3 2 5
9 1 15 16
=
2 15 2 5
mod 26
mod 26
7 19
=
8 3
Therefore, we obtained the key matrix! The result can be verified by testing the
remaining plaintext- ciphertext pair.
From the above example and other examples worked out so far, we
may conclude that neither cipher schemes of Substitution nor Transposition are
strong enough to stand cryptanalytic attacks. One may find that using the two
types together creates much better concealment than either method above. In
fact, using substitution and transposition cipher methods repeatedly on ciphertext
provides strong disguising patterns.
Note 3 :
Answer:
Transposition can be looked at a set of instructions, one instruction
for each letter, easily implemented by a computer and can be difficult to crack if
they are repeatedly used on the same plaintext!
Exercise 3: Repeat the transposition cipher used in Exercise 1 (on page 17)
twice for the plaintext used:
Solution:
Sep. 23.2003
Plaintext:
lastnitewasheavenpleasemarryme
1st transposed ciphertext: LTELAAEAERSWVARTAESYNSNEMIHPME
2nd transposed ciphertext: LEVSMTAAYIEERNHLRTSPASANMAWEE
LTELA AEAER SWVAR TAESY
NSNEM I HPME
Sep. 23.2003
(b) The ou
10
Cryptography:
Cryptographic systems are characterized along
three independent dimensions.
The type of operations used for
transforming plain text to cipher text. All
encryption algorithms are based on two general
principles: substitution, in which each element in
the plaintext (bit, letter, group of bits or letters)
is mapped in to another element, and
transposition, in which elements in the plaintext
are rearranged. The fundamental requirement is
that no information be lost. Most systems,
referred to as product systems, involve multiple
stages of substitutions and transpositions.
The number of keys used. If both sender
and receiver use the same key, the system is
referred to as symmetric, single-key, secret-key,
or conventional encryption. If the sender and
receiver each use a different key, the system is
referred to as asymmetric, two-key, or publickey encryption.
Sep. 23.2003
11
Sep. 23.2003
12
Brute-force attack:
The attacker tries every possible key on a piece
of cipher text until an intelligible translation into
plaintext is obtained. On average, half of all
possible keys must be tried to achieve success.
Classical Encryption Techniques:
A study of these techniques unable us to
illustrate the basic approaches to symmetric
encryption used today and the types of
cryptanalytic that must be anticipated.
The two basic building blocks of all encryption
techniques are substitution and transposition.
We examine these in the next two sections.
Finally, we discuss a system that combines both
substitution and transposition.
Substitution Techniques:
A substitution technique is one in which the
letters of plaintext are replaced by other letters
or by numbers or symbols. If the plaintext is
viewed as a sequence of bits, then substitution
Sep. 23.2003
13
Sep. 23.2003
14
Sep. 23.2003
15
Sep. 23.2003
16
Key: 4 3 1 2 5 6 7
Plaintext: a t t a c k p
ostpone
duntIlt
woamxyz
Cipher
text: TTNAAPTMTSUOAODWCOIXKNLYPETZ
A pure transposition cipher is easily recognized
because it has the same letter frequencies as
the original plaintext. For the type of columnar
transposition just shown, cryptanalysis is fairly
straightforward and involves laying out the
cipher text in a matrix and playing around with
column positions. Digram and trigram frequency
tables can be useful.
The transposition cipher can be made
significantly more secure by performing more
than one stage of transposition. The result is a
more complex permutation that is not easily
Sep. 23.2003
17
18
19
Yn = S mn + i (mod 26)
Sep. 23.2003
20
i=1
21
Sep. 23.2003
22