Ch03 Crypto7e
Ch03 Crypto7e
by William Stallings
Chapter 3
Classical Encryption
Techniques
© 2017 Pearson Education, Ltd., All rights reserved.
Definitions
Plaintext Ciphertext Enciphering/
• An original • The coded
encryption
• The process of
message message converting from
plaintext to
ciphertext
Cryptanalysis Cryptology
• Techniques used for • The areas of
deciphering a cryptography and
message without any cryptanalysis
knowledge of the
enciphering details
© 2017 Pearson Education, Ltd., All rights reserved.
© 2017 Pearson Education, Ltd., All rights reserved.
Symmetric Cipher
Model
• There are two requirements for secure
use of conventional encryption:
• A strong encryption algorithm
Symmetric,
single-key,
Substitution secret-key, Block cipher
conventional
encryption
Asymmetric,
two-key, or
Transposition Stream cipher
public-key
encryption
Types of
Attacks
on
© 2017 Pearson Education, Ltd., All rights reserved.
Encryption Scheme
Security
• Unconditionally secure
• No matter how much time an opponent
has, it is impossible for him or her to
decrypt the ciphertext simply because
the required information is not there
• Computationally secure
• The cost of breaking the cipher exceeds
the value of the encrypted information
• The time required to break the cipher
exceeds the useful lifetime of the
information
© 2017 Pearson Education, Ltd., All rights reserved.
Brute-Force Attack
O
n
a
v
e
r
a
g
e
,
h
a
lf
o
f
a
l
p
o
s
s
i
b
l
e
k
e
y
s
m
u
s
t
b
e
tri
e
d
t
o
a
c
h
i
e
v
e
s
u
c
c
e
s
s
T
o
s
u
p
p
l
e
m
e
n
t
t
h
e
b
r
u
t
e
-
f
o
r
c
e
a
p
p
r
o
a
c
h
,
s
o
m
e
d
e
g
r
e
e
o
f
k
n
o
w
l
e
d
g
e
a
b
o
u
t
t
h
e
e
x
p
e
c
t
e
d
p
l
a
i
n
t
e
x
t
i
s
n
e
e
d
e
d
,
a
n
d
s
o
m
e
m
e
a
n
s
o
f
a
u
t
o
m
a
t
i
c
a
l
l
y
d
i
s
t
i
n
g
u
i
s
h
i
n
g
p
l
a
i
n
t
e
x
t
f
r
o
m
g
a
r
b
l
e
i
s
a
l
s
o
n
e
e
d
p = D(k , C ) = (C - k ) mod 26
© 2017 Pearson Education, Ltd., All rights reserved.
Figure 3.3
Brute-Force
Cryptanalysi
s
of
Caesar
Cipher
(This chart can be found on page 75 in the
textbook)
• Digram
• Two-letter combination
• Most common is th
• Trigram
• Three-letter combination
• Most frequent is the
© 2017 Pearson Education, Ltd., All rights reserved.
Playfair Cipher
• Best-known multiple-letter encryption cipher
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
© 2017 Pearson Education, Ltd., All rights reserved.
Vigenère Autokey System
• A keyword is concatenated with the plaintext
itself to provide a running key
• Example:
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA
• Steganography
© 2017 Pearson Education, Ltd., All rights reserved.