Lecture 2 - Traditional Symmetric Cryptography
Lecture 2 - Traditional Symmetric Cryptography
Computers and
Information Security
Fall 2023/2024
Lecture # 2
Traditional Symmetric-
Key Ciphers
Chapter Objectives
Known-Plaintext
Attack
Cryptanalysis
Chosen-Plaintext
Attack
Chosen-Ciphertext
Attack
Substitution Cipher
Substitution Cipher
• A substitution cipher replaces one symbol with another. Substitution
ciphers can be categorized as either monoalphabetic ciphers or
polyalphabetic ciphers.
o The following shows a plaintext and its corresponding ciphertext. The cipher is not
monoalphabetic because each l (el) is encrypted by a different character.
Additive Ciphers
• The simplest monoalphabetic cipher is the additive cipher. This cipher
is sometimes called a shift cipher and sometimes a Caesar cipher, but
the term additive cipher better reveals its mathematical nature.
• When the cipher is additive, the plaintext, ciphertext, and key are
integers in Z26.
Additive Ciphers
• Examples:
• Use the additive cipher with key = 15 to encrypt the message “hello”.
• Use the additive cipher with key = 15 to decrypt the message “WTAAD”.
Additive Ciphers
• Examples (Brute Force attack):
• Eve has intercepted the ciphertext “UVACLYFZLJBYL”. Show how she can use a brute-force
attack to break the cipher.
➢ Eve tries keys from 1 to 7. With a key of 7, the plaintext is “not very secure”, which makes
sense.
Statistical Attack Table 3.1 Frequency of characters in English
• When Eve tabulates the frequency of letters in this ciphertext, she gets: I =14, V =13,
S =12, and so on. The most common character is I with 14 occurrences. This means
key = 4.
Multiplicative Ciphers
• In a multiplicative cipher, the plaintext and ciphertext are integers in
Z26; the key is an integer in Z26*.
• Example:
• Use the affine cipher to decrypt the message “ZEBBW” with the key pair (7, 2) in modulus 26.
Monoalphabetic Substitution Cipher
• Because additive, multiplicative, and affine ciphers have small key
domains, they are very vulnerable to brute-force attack.
• A better solution is to create a mapping between each plaintext
character and the corresponding ciphertext character. Alice and Bob
can agree on a table showing the mapping for each character.
• Example:
• We can use the key in the above figure to encrypt the message
Polyalphabetic Ciphers
• In polyalphabetic substitution, each occurrence of a character may
have a different substitute. The relationship between a character in the
plaintext to a character in the ciphertext is one-to-many.
• Let us encrypt the plaintext “hello” using the key in the above Figure.
Vigenère Cipher
• We can encrypt the message “She is listening” using the 6-character keyword
“PASCAL”. The initial key stream is (15, 0, 18, 2, 0, 11). The key stream is the
repetition of this initial key stream (as many times as needed).
Vigenère Cipher - Cryptanalysis
• Let us assume we have intercepted the following ciphertext:
• The Kasiski test for repetition of three-character segments yields the results shown
in Table 3.4.
Vigenère Cipher - Cryptanalysis
• The greatest common divisor of differences is 4, which means that the key length
is multiple of 4. First try m = 4.
• The key matrix in the Hill cipher needs to have a multiplicative inverse.
Hill Cipher
• For example, the plaintext “code is ready” can make a 3 × 4 matrix
when adding extra bogus character “z” to the last block and removing
the spaces. The ciphertext is “OHKNIHGKLISS”.
Hill Cipher - Cryptanalysis
• Assume that Eve knows that m = 3. She has intercepted three
plaintext/ciphertext pair blocks (not necessarily from the same
message) as shown in Figure below.
Hill Cipher - Cryptanalysis
• She makes matrices P and C from these pairs. Because P is invertible,
she inverts the P matrix and multiplies it by C to get the K matrix as
shown in Figure below.
• Now she has the key and can break any ciphertext encrypted with that
key.
One-Time Pad
• One of the goals of cryptography is perfect secrecy.
• A study by Shannon has shown that perfect secrecy can be achieved if
each plaintext symbol is encrypted with a key randomly chosen from a
key domain.
• This idea is used in a cipher called one-time pad, invented by Vernam.
Rotor Cipher
Enigma Machine
Transposition Ciphers
Transposition Cipher
• A transposition cipher does not substitute one symbol for another,
instead it changes the location of the symbols.
• A transposition cipher reorders symbols.
• Keyless Transposition Ciphers - The keyless ciphers permute the
characters by using writing plaintext in one way and reading it in
another way The permutation is done on the whole plaintext to create
the whole ciphertext.
• Keyed Transposition Ciphers - Another method is to divide the
plaintext into groups of predetermined size, called blocks, and then use
a key to permute the characters in each block separately.
Keyless Transposition Ciphers
• A good example of a keyless cipher using the first method is the rail
fence cipher. The ciphertext is created reading the pattern row by row.
• For example, to send the message “Meet me at the park” to Bob, Alice
writes:
• Although the characters are permuted, there is a pattern in the permutation: (01,
05, 09, 13), (02, 06, 10, 13), (03, 07, 11, 15), and (08, 12). In each section, the
difference between the two adjacent numbers is 4.
Keyed Transposition Ciphers
• Example: Alice needs to send the message “Enemy attacks tonight” to
Bob.