Classical Encryption Techniques
Classical Encryption Techniques
y and
Network
Security
Sixth Edition
by William Stallings
Chapter 2
Classical Encryption
Techniques
"I am fairly familiar with all the forms of
secret writings, and am myself the author
of a trifling monograph upon the subject,
in which I analyze one hundred and sixty
separate ciphers," said Holmes.
Asymmetric,
two-key, or
Transposition Stream cipher
public-key
encryption
Brute-force Cryptanalysis
attack • Attack relies on
• Attacker tries the nature of
the algorithm
every possible
plus some
key on a piece
knowledge of
of ciphertext
the general
until an
characteristics
intelligible
of the plaintext
translation into
• Attack exploits
plaintext is
obtained the
• On average, characteristics
of the
half of all
algorithm to
possible keys
attempt to
must be tried
deduce a
to achieve
specific
success
plaintext or to
deduce the key
being used
Brute-Force Attack
Cryptanalysis and
Table 2.1
Types of
Attacks
on
Encrypted
Messages
Encryption Scheme
Security
• Unconditionally secure
• No matter how much time an opponent
has, it is impossible for him or her to
decrypt the ciphertext simply because
the required information is not there
• Computationally secure
• The cost of breaking the cipher exceeds
the value of the encrypted information
• The time required to break the cipher
exceeds the useful lifetime of the
information
Brute-Force Attack
Involves trying every possible key until an
intelligible translation of the ciphertext into
plaintext is obtained
p = D(k , C ) = (C - k ) mod 26
Brute-Force
Cryptanalysis
of Caesar
Cipher
• Digram
• Two-letter combination
• Most common is th
• Trigram
• Three-letter combination
• Most frequent is the
Playfair Cipher
• Best-known multiple-letter encryption cipher
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
Vigenère Autokey System
• A keyword is concatenated with the plaintext
itself to provide a running key
• Example:
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA
• Steganography