0% found this document useful (0 votes)
7 views12 pages

CY2001 Lecture 2

This document provides an overview of cryptography concepts through examples. It discusses the history of cryptography and encryption schemes like Caesar cipher, substitution cipher, and Vigenere cipher. The document also introduces public key cryptography schemes like RSA that allow encryption with a public key and decryption with a separate private key, avoiding the need to share secret keys. The Enigma cipher is presented as an example of a mechanical cipher used in World War II that implemented multiple substitution ciphers through wired rotors.

Uploaded by

cogeto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views12 pages

CY2001 Lecture 2

This document provides an overview of cryptography concepts through examples. It discusses the history of cryptography and encryption schemes like Caesar cipher, substitution cipher, and Vigenere cipher. The document also introduces public key cryptography schemes like RSA that allow encryption with a public key and decryption with a separate private key, avoiding the need to share secret keys. The Enigma cipher is presented as an example of a mechanical cipher used in World War II that implemented multiple substitution ciphers through wired rotors.

Uploaded by

cogeto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CY2001: Network and Cyber Security – I (3+0)

WEEK-3
LECTURE-2 CRYPTOGRAPHY
2
Cryptography
History of 2500- 4000 years.

Throughout most of this history:


cryptography = “secret writing”:
“Scramble” (encrypt) text such that it is hopefully unreadable by
anyone except the intended receiver that can decrypt it.

Recurring theme: (until 1970’s)


 Secret code invented
 Typically claimed “unbreakable” by inventor
 Used by spies, ambassadors, kings, generals for crucial tasks.
 Broken by enemy using cryptanalysis.

3
Encryption Schemes
Alice wants to send Bob a secret message.

c = E(m,k) m’ = D(c,k)

They agree in advance on 3 components:


 Encryption algorithm: E
 Decryption algorithm: D
 Secret key: k

To encrypt plaintext m, Alice sends c = E(m,k) to Bob.


To decrypt a cyphertext c, Bob computes m’ = D(c,k).

 A scheme is valid if m’=m


 Intuitively, a scheme is secure if eavesdropper can not learn m from c.
4
Example 1: Caesar’s Cipher
Key: k = no. between 0 and 25.
Encryption: encode the ith letter as the (i+k) th letter.
(working mod 26: z+1=a )

Decryption: decode the jth letter to the (j-k) th letter.

Plain-text: S E N D R E I N F O R C E M E N T
Key: 2
Cipher-text: U G P F T F K P H Q T E G O G P V

Problem: only 26 possibilities for key – can be broken in short time.

Kerchoff’s Principle (1883): System should be secure even if


algorithms are known, as long as key is secret.

In other words: “security through obscurity” does not work.

5
Example 2: Substitution Cipher
Key: k = table mapping each letter to another letter

A B C Z
U R B E

Encryption and decryption: letter by letter according to table.

# of possible keys: 26! ( = 403,291,461,126,605,635,584,000,000 )

However – substitution cipher is still insecure!


Key observation: can recover plaintext using statistics on letter
frequencies.

HereUpOnLeGrandAroseWithAGraveAndStatelyAirAndBrought
Here
He e e r
ra a e h
ha a eea t t
tat a r
ra r ht
LIVITCSWPIYVEWHEVSRIQMXLEYVEOIEWHRXEXIPFEMVEWHKVSTYLX
MeTheBeetleFromAGlassCaseInWhichItWasEnclosedItWasABe
ethe eet e r a a e h h t a e e t a a e
ZIXLIKIIXPIJVSZEYPERRGERIMWQLMGLMXQERIWGPSRIHMXQEREKI
I – most common letter I=e L=h X=t
LI – most common pair V=r E=a Y=g
XLI – most common triple
6
Example 3- Vigenere (Belaso, 1553)

“Multi-Caesar Cipher” – A statefull cipher

Key: k = (k1,k2,…,km) list of m numbers between 0 and 25

Encryption: n1thst letter


letter
encoded
encoded
w/ key=k
as Caesar i  I +1 k
w/: key=k
(n mod m)  Im)
: (ni mod + (mod
k1 (mod
26)26)

Decryption: In2nd
the natural
letter encoded
way as Caesar w/ key=k2 : i  I + k2 (mod 26)


Important Property: Can no longer break using letter frequencies alone.
mth letter encoded as Caesar w/ key=km : i  I + km (mod 26)
‘e’ will be mapped to ‘e’+k1,‘e’+k2,…,‘e’+km according to location.
m+1th letter encoded as Caesar w/ key=k1 : i  I + k1 (mod 26)
Considered “unbreakable” for 300 years (broken by Babbage, Kasiski 1850’s)

7
Example 3- Vigenere (Belaso, 1553)

“Multi-Caesar Cipher” – A statefull cipher

Key: k = (k1,k2,…,km) list of m numbers between 0 and 25

Encryption: nth letter encoded w/ key=k(n mod m) : i  I + k(n mod m) (mod 26)

Decryption: In the natural way


Breaking Vigenere:
LIVITCSWPIYVEWHEVSRIQMXLEYVEOIEWHRXEXIPFEM VEWHKV

Step 1: Guess the length of the key m

Step 2: Group together positions {1, m+1, 2m+1, 3m+1,…}


{2, m+2, 2m+2, 3m+2,…}

{m-1, 2m+m-1, 3m+m-1,…}

8
Example 3- Vigenere (Belaso, 1553)

“Multi-Caesar Cipher” – A statefull cipher

Key: k = (k1,k2,…,km) list of m numbers between 0 and 25

Encryption: nth letter encoded w/ key=k(n mod m) : i  i + k(n mod m) (mod 26)

Decryption: In the natural way


Breaking Vigenere:
LIVITC
SWPIYV
EWHEVS Step 1: Guess the length of the key m
RIQMXL
EYVEOI Step 2: Group together positions 1, m+1, 2m+1, 3m+1,…
EWHRXE
XIPFEM {2, m+2, 2m+2, 3m+2,…}
VEWHKV …
{m-1, 2m+m-1, 3m+m-1,…}

Step 3: Frequency-analyze each group independently.

9
Example 4 - The Enigma
A mechanical statefull cipher.
Used by Germany in WWII for top-secret communication.

Roughly: composition of 3-5 substitution ciphers


implemented by wiring.
Wiring on rotors moving in different schedules,
making cipher statefull

Key: 1) Wiring of machine (changed infrequently)


2) Daily key from code books
3) New operator-chosen key for each message

10
Review of Encryption Schemes
Alice wants to send Bob a secret message.

c = E(m,k) m’ = D(c,k)

 Encryption algorithm: E To encrypt m, Alice sends c = E(m,k) to Bob.


 Decryption algorithm: D To decrypt c, Bob computes m’ = D(c,k).
 Secret key: k

Q: Can Bob send Alice the secret key over the net?
A: Of course not!! Eve could decrypt c!

11
Public Key Cryptography [DH76,RSA77]
Alice wants to send Bob a secret message.

c
choose d,e
c = E(m,e)
m’ = D(c,d)

 Encryption algorithm: E
 Decryption algorithm: D
 Key: Bob chooses two keys:  Secret key d for decrypting messages.
 Public key e for encrypting messages.
To encrypt m, Alice sends c = E(m,e)
Even
to Bob.
if Eve knows the key e!
Should be safe to send e “in the clear”!
To decrypt c, Bob computes m’ = D(c,d).

 A scheme is valid if m’=m


 Intuitively, a scheme is secure if eavesdropper can not learn m from c. 12

You might also like