Number
Number
Michael J. Fischer
Lecture 5
September 15, 2020
Substitution Ciphers
Rotor Machines
Polygraphic Ciphers
Adversary Powers
Computationally limited adversaries
Kinds of attacks
Substitution Ciphers
Affine ciphers
Affine ciphers generalize simple shift ciphers such as Caesar.
Let α and β be two integers with gcd(α, 26) = 1.
A key is a pair k = (α, β).
There are 12 possible choices for α (1, 3, 5, 7, 9, 11, 15, 17, 19,
21, 23, 25) and 26 possibilites for β, so |K| = 12 × 26 = 312.
Encryption: Ek (m) = αm + β mod 26.
Decryption: Dk (c) = α−1 (c − β) mod 26.
Here, α−1 is the multiplicative inverse of α in the ring of integers
Z26 . For example, 5−1 = 21 since 21 × 5 = 105 ≡ 1 (mod 26).
α−1 exists precisely when gcd(α, 26) = 1.
Polyalphabetic ciphers
Vigenère cipher
Vigenère example
Rotor Machines
Rotor machines
Keystream generation
History
Several different kinds of rotor machines were built and used, both
by the Germans and by others, some of which work somewhat
differently from what I described above.
However, the basic principles are the same.
The interested reader can find much detailed material on the web
by searching for “enigma cipher machine” and “rotor cipher
machine”. Nice descriptions may be found at
http://en.wikipedia.org/wiki/Enigma_machine and
http://www.quadibloc.com/crypto/intro.htm.
Polygraphic Ciphers
Hill cipher
Adversary Powers
Short keys
Feasibility
Attacks
Eve’s information
Until now, we’ve implicitly assumed that Eve has no information
about the cryptosystem except for the encryption and decryption
methods and the ciphertext c.
In practice, Eve might know much more.
I She probably knows (or has a good idea) of the message
distribution.
I She might have obtained several other ciphertexts.
I She might have learned the decryptions of earlier ciphertexts.
I She might have even chosen the earlier messages or
ciphertexts herself.
This leads us to consider several attack scenarios.
Attacks
Attack scenarios
Attacks
Attacks
Attacks
1
Nothing we have said implies that Eve is unknown to Alice and Bob or that
she isn’t also a legitimate participant in the protocol.
2
We will see such protocols later in the course.
Attacks