Slide 2
Slide 2
Symmetric Encryption
- -
Some Basic Terminology
- -
Symmetric Cipher Model
- -
Requirements
- -
Cryptography
- -
Cryptanalysis
- -
More Definitions
• unconditional security
– no matter how much computer power or time is available, the cipher
cannot be broken since the ciphertext provides insufficient information
to uniquely determine the corresponding plaintext
• computational security
– given limited computing resources (eg time needed for calculations is
greater than age of universe), the cipher cannot be broken
- -
Brute Force Search
Key Size (bits) Number of Alternative Keys Time required at 1 decryption/µs Time required at 106 decryptions/µs
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
- -
Classical Substitution Ciphers
- -
Caesar Cipher
- -
Caesar Cipher
- -
Monoalphabetic Cipher
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
- -
Monoalphabetic Cipher Security
- -
Language Redundancy and Cryptanalysis
- -
YE CUE AUSGBK AM REXGWFEU C AEQA IEAD DEE YE XCB TE DHXXEERER.
- -
English Letter Frequencies
- -
Use in Cryptanalysis
• key concept - monoalphabetic substitution ciphers do not change relative
letter frequencies
• discovered by Arabian scientists in 9th century
• calculate letter frequencies for ciphertext
• compare counts/plots against known values
• if caesar cipher look for common peaks/troughs
– peaks at: A-E-I triple, NO pair, RST triple
– troughs at: JK, X-Z
• for monoalphabetic must identify each letter
– tables of common double/triple letters help
- -
Example Cryptanalysis
• given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
• count relative letter frequencies (see text)
• guess P & Z are e and t
• guess ZW is th and hence ZWP is the
• proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
- -
Vigenère Cipher
- -
Example of Vigenère Cipher
- -
Security of Vigenère Ciphers
- -
Autokey Cipher
• ideally want a key as long as the message
• Vigenère proposed the autokey cipher
• with keyword is prefixed to message as key
• knowing keyword can recover the first few letters
• use these in turn on the rest of the message
• but still have frequency characteristics to attack
• eg. given key deceptive
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext:ZICVTWQNGKZEIIGASXSTSLVVWLA
- -
One-Time Pad
• if a truly random key as long as the message is used, the cipher will be
secure
• called a One-Time pad
• is unbreakable since ciphertext bears no statistical relationship to the
plaintext
• since for any plaintext & any ciphertext there exists a key mapping one
to other
• can only use the key once though
• problems in generation & safe distribution of key
- -
Transposition Ciphers
- -
Rail Fence cipher
- -
Row Transposition Ciphers
- -
Product Ciphers
- -
Rotor Machines
- -
Hagelin Rotor Machine
- -
Steganography
• an alternative to encryption
• hides existence of message
– using only a subset of letters/words in a longer message marked in
some way
– using invisible ink
– hiding in LSB in graphic image or sound file
• has drawbacks
– high overhead to hide relatively few info bits
- -
Summary
• have considered:
– classical cipher techniques and terminology
– monoalphabetic substitution ciphers
– cryptanalysis using letter frequencies
– Playfair cipher
– polyalphabetic ciphers
– transposition ciphers
– product ciphers and rotor machines
– stenography
- -