cryptography
cryptography
• Characterization
• The type of operations used for transforming plaintext to
ciphertext.
• Substitutions / Transpositions
• The number of keys used.
• Symmetric, single-key, secret-key, or conventional encryption.
• Asymmetric, two-key, or public-key encryption.
• The way in which the plaintext is processed.
• Block Cipher / Stream Cipher
Cryptanalysis and Brute-Force
Attack
• Attacking a Cryptosystem
• Cryptanalysis - nature of the algorithm, some knowledge of the
general characteristics of the plaintext or even some sample
plaintext–ciphertext pairs.
• Brute-force attack - The attacker tries every possible key.
Security of an Encryption scheme
• Unconditionally secure
• If the ciphertext generated by the scheme does not contain
enough information to determine uniquely the corresponding
plaintext, no matter how much ciphertext is available.
• The cost of breaking the cipher exceeds the value of the
encrypted information.
• The time required to break the cipher exceeds the useful
lifetime of the information.
• Computationally secure if either of the above two criteria are
met.
SUBSTITUTION TECHNIQUES
• The letters of plaintext are replaced by other letters or
by numbers or symbols.
• If the plaintext is viewed as a sequence of bits,
• replacing plaintext bit patterns with ciphertext bit
patterns.
Caesar Cipher
• Julius Caesar.
• Replacing each letter of the alphabet with the letter standing three
places further down.
C = E(3, p) = (p + 3) mod 26
C = E(k, p) = (p + k) mod 26
Monoalphabetic Ciphers