Cryptography and Network Security: Sixth Edition by William Stallings
Cryptography and Network Security: Sixth Edition by William Stallings
Cryptography and Network Security: Sixth Edition by William Stallings
and Network
Security
Sixth Edition
by William Stallings
Chapter 2
• Plaintext
• The original message
• Cryptographic system or cipher
• Schemes used for encryption
• Ciphertext
• The coded message
• Cryptanalysis
• Techniques used for deciphering
• Enciphering or encryption a message without any
• Process of converting from plaintext to ciphertext knowledge of the enciphering
details
• Deciphering or decryption
• Restoring the plaintext from the ciphertext • Cryptology
• Areas of cryptography and
• Cryptography cryptanalysis together
• Study of encryption
More Definitions
• unconditional security
• no matter how much computer power or time is available, the cipher cannot
be broken since the ciphertext provides insufficient information to uniquely
determine the corresponding plaintext
• computational security
• given limited computing resources (eg time needed for calculations is greater
than age of universe), the cipher cannot be broken
Cryptography
The type of
operations used for The number of keys The way in which the
transforming plaintext used plaintext is processed
to ciphertext
Symmetric, single-
key, secret-key,
Substitution Block cipher
conventional
encryption
Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption
Cryptanalysis
• cryptanalysis
• rely on nature of the algorithm
• plus some knowledge of plaintext characteristics
• even some sample plaintext-ciphertext pairs
• exploits characteristics of algorithm to deduce specific plaintext or key
• brute-force attack
• try all possible keys on some ciphertext until get an intelligible translation into
plaintext
Brute-Force Attack
Key Size (bits) Number of Alternative Time required at 1 Time required at 106
Keys decryption/µs decryptions/µs
32 232 = 4.3 109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2 1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
Exhaustive Key Search
Encryption Scheme Security
• Unconditionally secure
• No matter how much time an opponent has, it is impossible for him or her to
decrypt the ciphertext simply because the required information is not there
• Computationally secure
• The cost of breaking the cipher exceeds the value of the encrypted
information
• The time required to break the cipher exceeds the useful lifetime of the
information
Substitution Technique
• Permutation
• Of a finite set of elements S is an ordered sequence of all
the elements of S , with each element appearing exactly
once
• given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
• count relative letter frequencies (see text)
• guess P & Z are e and t
• guess ZW is th and hence ZWP is the
• proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
Monoalphabetic Ciphers
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Encrypting and Decrypting
• an alternative to encryption
• hides existence of message
• using only a subset of letters/words in a longer message marked in some way
• using invisible ink
• hiding in LSB in graphic image or sound file
• has drawbacks
• high overhead to hide relatively few info bits
• advantage is can obscure encryption use
Steganography
• Character marking
• Selected letters of printed or
typewritten text are over-written in
pencil
• The marks are ordinarily not visible
unless the paper is held at an angle
to bright light
Other Steganography
Techniques • Invisible ink
• A number of substances can be used
for writing but leave no visible trace
until heat or some chemical is
applied to the paper
• Pin punctures
• Small pin punctures on selected
letters are ordinarily not visible
unless the paper is held up in front
of a light
• Typewriter correction ribbon
• Used between lines typed with a
black ribbon, the results of typing
with the correction tape are visible
only under a strong light
Summary