SlideShare a Scribd company logo
1 of 30
Download to read offline
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Chapter 2
Classical Encryption Techniques
(2 hours)
CO1:Apply the basics of number theory concepts and classical encryption techniques(K3)
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Learning Objectives
After studying this chapter, you should be able to:
• Present an overview of the main concepts of symmetric cryptography.
• Explain the difference between cryptanalysis and brute-force attack.
• Understand the operation of a monoalphabetic substitution cipher.
• Understand the operation of a polyalphabetic cipher.
• Present an overview of the Hill cipher.
• Describe the operation of a Transposition Technique.
!3
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Basic Terms
• An original message is known as the plaintext
• The coded message is called the ciphertext
• The process of convert- ing from plaintext to ciphertext is known as enciphering or
encryption
• Restoring the plaintext from the ciphertext is deciphering or decryption
• The area of study known as cryptography
• Techniques used for deciphering a message without any knowledge of the enciphering
details fall into the area of cryptanalysis [“breaking the code”]
• The areas of cryptography and cryptanalysis together are called cryptology
!4
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Simplified Model of Symmetric Encryption
!5
Plaintext
input
Y = E(K, X) X = D(K, Y)
X
K K
Transmitted
ciphertext
Plaintext
output
Secret key shared by
sender and recipient
Secret key shared by
sender and recipient
Encryption algorithm
(e.g., AES)
Decryption algorithm
(reverse of encryption
algorithm)
Figure 3.1 Simplified Model of Symmetric Encryption
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Symmetric Cipher Model
There are two requirements for secure use of conventional encryption:
•A strong encryption algorithm
•Sender and receiver must have obtained copies of the secret key in a secure
fashion and must keep the key secure
!6
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Model of Symmetric Cryptosystem
!7
Message
Source
Cryptanalyst
Key
Source
Destination
X X
X
^
K
^
Y = E(K, X)
Secure Channel
K
Encryption
Algorithm
Decryption
Algorithm
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Cryptographic Systems
!8
Characterized along three independent dimensions:
The way in
which the
plaintext is
processed
Block
cipher
Stream
cipher
The type of operations
used for transforming
plaintext to ciphertext
The number of keys
used
Transposition
Substitution
Symmetric, single-key,
secret-key, conventional
encryption
Asymmetric, two-key, or
public-key encryption
1
2
3
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Cryptanalysis and Brute-Force Attack
• Cryptanalysis: Cryptanalytic attacks rely on the nature of the
algorithm plus perhaps some knowledge of the general characteristics
of the plaintext or even some sample plaintext–cipher text pairs. This
type of attack exploits the characteristics of the algorithm to attempt
to deduce a specific plaintext or to deduce the key being used. 

• Brute-force attack: The attacker tries every possible key on a piece
of cipher- text until an intelligible translation into plaintext is
obtained. On average, half of all possible keys must be tried to
achieve success. 

!9
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Types of
Attacks on
Encrypted
Messages
(This table is found on page
32 in textbook)
!10
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Substitution Technique
!11
If the plaintext is viewed as a sequence of bits, then
substitution involves replacing plaintext bit patterns with
ciphertext bit patterns
Is one in which the letters of plaintext are replaced by other
letters or by numbers or symbols
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Caesar Cipher
• Simplest and earliest known use of a substitution cipher
• Used by Julius Caesar
• Involves replacing each letter of the alphabet with the letter standing three
places further down the alphabet
• Alphabet is wrapped around so that the letter following Z is A
plain: meet me after the toga party
cipher: PHHW PH DIWHU WKH WRJD SDUWB
!12
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Caesar Cipher Algorithm
Can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
•
!13
Algorithm can be expressed as
c = E(3, p) = (p + 3) mod (26)
A shift may be of any amount, so that the
general Caesar algorithm is
C = E(k , p ) = (p + k ) mod 26
Where k takes on a value in the range 1 to 25;
the decryption algorithm is simply
p = D(k , C ) = (C - k ) mod 26
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Brute-Force Cryptanalysis of Caesar Cipher
!14
Three important characteristics of
this problem enabled us to use a
brute- force cryptanalysis:
1. The encryption and decryption
algorithms are known
2. There are only 25 keys to try.
3. The language of the plaintext is
known and easily recognisable.
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Monoalphabetic Cipher
• Rather than just shifting the alphabet
• Could shuffle (jumble) the letters arbitrarily
• Each plaintext letter maps to a different random cipher text letter
• hence key is 26 letters long
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Cipher text: WIRFRWAJUHYFTSDVFSFUUFYA
!15
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Monoalphabetic Cipher Security
• Now have a total of 26! keys
• With so many keys, might think the system is secure
• But would be !!!WRONG!!!
• Problem is the regularities of the language
!16
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Language Redundancy and
Cryptanalysis
!17
• Human languages are redundant
• Letters are not equally commonly used
• The English letter e is by far the most common letter
• Then T,R,N,I,O,A,S
• Other letters are fairly rare
• Z,J,K,Q,X
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
English Letter
Frequencies
!18
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Playfair Cipher
!19
• Not even the large number of keys in a monoalphabetic cipher provides security
• One approach to improving security was to encrypt multiple letters
• Invented by Charles Wheatstone in 1854, but named after his friend Baron
Playfair
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Playfair Key Matrix
!20
• A 5X5 matrix of letters based on a
keyword
• Fill in letters of keyword
• Fill rest of matrix with other letters
• eg. using the keyword MONARCHY
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Encrypting and Decrypting
!21
Plaintext encrypted two letters at a time:
–if a pair is a repeated letter, insert a filler like 'X',
eg. "balloon" encrypts as "ba lx lo on"
–if both letters fall in the same row, replace each with letter to right (wrapping back
to start from end),
eg. “ar" encrypts as “RM”
–if both letters fall in the same column, replace each with the letter below it (again
wrapping to top from bottom),
eg. “mu" encrypts to "CM"
–otherwise each letter is replaced by the one in its row in the column of the other
letter of the pair, eg. “hs" encrypts to "BP", and “ea" to "IM" or "JM"
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Security of the Playfair Cipher
!22
• Security much improved over monoalphabetic
• Since have 26 x 26 = 676 digrams
• Need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic)
• Correspondingly more ciphertext
• Widely used for many years (eg. US & British military in WW1)
• It can be broken, given a few hundred letters
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Polyalphabetic Ciphers
Polyalphabetic substitution cipher
• Improves on the simple monoalphabetic technique by using different
monoalphabetic substitutions as one proceeds through the plaintext
message
!23
All these techniques have the following features in common:
• A set of related monoalphabetic substitution rules is used
• A key determines which particular rule is chosen for a given transformation
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Vigenère Cipher
• Best known and one of the simplest polyalphabetic substitution ciphers
• In this scheme the set of related monoalphabetic substitution rules consists of the
26 Caesar ciphers with shifts of 0 through 25
• Each cipher is denoted by a key letter which is the ciphertext letter that substitutes
for the plaintext letter a
!24
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Example of Vigenère Cipher
• To encrypt a message, a key is needed that is as long as the message
• Usually, the key is a repeating keyword
• For example, if the keyword is deceptive, the message “we are discovered save
yourself” is encrypted as:
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
!25
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Vigenère Autokey System
A keyword is concatenated with the plaintext itself to provide a running key
Example:
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA
Even this scheme is vulnerable to cryptanalysis
• Because the key and the plaintext share the same frequency distribution of
letters, a statistical technique can be applied
!26
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Vernam Cipher
!27
Key stream
generator
Figure 3.7 Vernam Cipher
Cryptographic
bit stream ( ki )
Cryptographic
bit stream ( ki )
Plaintext
( pi )
Plaintext
( pi )
Ciphertext
( ci )
Key stream
generator
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
One-Time Pad
• Improvement to Vernam cipher proposed by an Army Signal Corp officer, Joseph
Mauborgne
• Use a random key that is as long as the message so that the key need not be repeated
• Key is used to encrypt and decrypt a single message and then is discarded
• Each new message requires a new key of the same length as the new message
• Scheme is unbreakable
• Produces random output that bears no statistical relationship to the plaintext
• Because the ciphertext contains no information whatsoever about the plaintext, there
is simply no way to break the code
!28
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Difficulties
• The one-time pad offers complete security but, in practice, has two fundamental
difficulties:
• There is the practical problem of making large quantities of random keys
• Any heavily used system might require millions of random characters on a
regular basis
• Mammoth key distribution problem
• For every message to be sent, a key of equal length is needed by both sender and
receiver
• Because of these difficulties, the one-time pad is of limited utility
• Useful primarily for low-bandwidth channels requiring very high security
• The one-time pad is the only cryptosystem that exhibits perfect secrecy (see Appendix
F)
!29
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Rail Fence Cipher
• Simplest transposition cipher
• Plaintext is written down as a sequence of diagonals and then read off as a
sequence of rows
• To encipher the message “meet me after the toga party” with a rail fence of
depth 2, we would write:
m e m a t r h t g p r y
e t e f e t e o a a t
Encrypted message is:
MEMATRHTGPRYETEFETEOAAT
!30
14ITT71-CryptographyandNetworkSecurity
Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT
Row Transposition Cipher
• Is a more complex transposition
• Write the message in a rectangle, row by row, and read the message off, column by
column, but permute the order of the columns
• The order of the columns then becomes the key to the algorithm
Key: 4 3 1 2 5 6 7
Plaintext: a t t a c k p
o s t p o n e
d u n t i l t
w o a mx y z
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
!31

More Related Content

What's hot

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysInformation Security Awareness Group
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardtarekiceiuk
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniquesJay Nagar
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquessaqib1611
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesSarthak Patel
 

What's hot (20)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Ch03
Ch03Ch03
Ch03
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
 
Cryptography
CryptographyCryptography
Cryptography
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Ch03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standardCh03 block-cipher-and-data-encryption-standard
Ch03 block-cipher-and-data-encryption-standard
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 

Similar to Classical Encryption Techniques

1 Cryptography Introduction_shared.ppt
1 Cryptography Introduction_shared.ppt1 Cryptography Introduction_shared.ppt
1 Cryptography Introduction_shared.pptssuser0cd7c9
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Journals
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - OverviewMohammed Adam
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 

Similar to Classical Encryption Techniques (20)

1 Cryptography Introduction_shared.ppt
1 Cryptography Introduction_shared.ppt1 Cryptography Introduction_shared.ppt
1 Cryptography Introduction_shared.ppt
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Otp
OtpOtp
Otp
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
G04701051058
G04701051058G04701051058
G04701051058
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Unit i
Unit iUnit i
Unit i
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 

More from JeevananthamArumugam

More from JeevananthamArumugam (10)

SQL Procedures & Functions
SQL Procedures & FunctionsSQL Procedures & Functions
SQL Procedures & Functions
 
Advanced Encryption Standard - AES
Advanced Encryption Standard - AESAdvanced Encryption Standard - AES
Advanced Encryption Standard - AES
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Square and Multiply - Shortcut Method
Square and Multiply - Shortcut MethodSquare and Multiply - Shortcut Method
Square and Multiply - Shortcut Method
 
Chinese Reminder Theorem
Chinese Reminder TheoremChinese Reminder Theorem
Chinese Reminder Theorem
 
Euler's Theorem
Euler's TheoremEuler's Theorem
Euler's Theorem
 
NCC | General Subject | Public speaking
NCC | General Subject | Public speaking NCC | General Subject | Public speaking
NCC | General Subject | Public speaking
 
NCC | General Subject | Communication Skills | Year II
NCC | General Subject | Communication Skills | Year IINCC | General Subject | Communication Skills | Year II
NCC | General Subject | Communication Skills | Year II
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
IoT - Scope and Opportunities
IoT - Scope and OpportunitiesIoT - Scope and Opportunities
IoT - Scope and Opportunities
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Classical Encryption Techniques

  • 1. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Chapter 2 Classical Encryption Techniques (2 hours) CO1:Apply the basics of number theory concepts and classical encryption techniques(K3)
  • 2. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Learning Objectives After studying this chapter, you should be able to: • Present an overview of the main concepts of symmetric cryptography. • Explain the difference between cryptanalysis and brute-force attack. • Understand the operation of a monoalphabetic substitution cipher. • Understand the operation of a polyalphabetic cipher. • Present an overview of the Hill cipher. • Describe the operation of a Transposition Technique. !3
  • 3. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Basic Terms • An original message is known as the plaintext • The coded message is called the ciphertext • The process of convert- ing from plaintext to ciphertext is known as enciphering or encryption • Restoring the plaintext from the ciphertext is deciphering or decryption • The area of study known as cryptography • Techniques used for deciphering a message without any knowledge of the enciphering details fall into the area of cryptanalysis [“breaking the code”] • The areas of cryptography and cryptanalysis together are called cryptology !4
  • 4. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Simplified Model of Symmetric Encryption !5 Plaintext input Y = E(K, X) X = D(K, Y) X K K Transmitted ciphertext Plaintext output Secret key shared by sender and recipient Secret key shared by sender and recipient Encryption algorithm (e.g., AES) Decryption algorithm (reverse of encryption algorithm) Figure 3.1 Simplified Model of Symmetric Encryption
  • 5. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Symmetric Cipher Model There are two requirements for secure use of conventional encryption: •A strong encryption algorithm •Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure !6
  • 6. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Model of Symmetric Cryptosystem !7 Message Source Cryptanalyst Key Source Destination X X X ^ K ^ Y = E(K, X) Secure Channel K Encryption Algorithm Decryption Algorithm
  • 7. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Cryptographic Systems !8 Characterized along three independent dimensions: The way in which the plaintext is processed Block cipher Stream cipher The type of operations used for transforming plaintext to ciphertext The number of keys used Transposition Substitution Symmetric, single-key, secret-key, conventional encryption Asymmetric, two-key, or public-key encryption 1 2 3
  • 8. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Cryptanalysis and Brute-Force Attack • Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext–cipher text pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. 
 • Brute-force attack: The attacker tries every possible key on a piece of cipher- text until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success. 
 !9
  • 9. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Types of Attacks on Encrypted Messages (This table is found on page 32 in textbook) !10
  • 10. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Substitution Technique !11 If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns Is one in which the letters of plaintext are replaced by other letters or by numbers or symbols
  • 11. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Caesar Cipher • Simplest and earliest known use of a substitution cipher • Used by Julius Caesar • Involves replacing each letter of the alphabet with the letter standing three places further down the alphabet • Alphabet is wrapped around so that the letter following Z is A plain: meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB !12
  • 12. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Caesar Cipher Algorithm Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 • !13 Algorithm can be expressed as c = E(3, p) = (p + 3) mod (26) A shift may be of any amount, so that the general Caesar algorithm is C = E(k , p ) = (p + k ) mod 26 Where k takes on a value in the range 1 to 25; the decryption algorithm is simply p = D(k , C ) = (C - k ) mod 26
  • 13. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Brute-Force Cryptanalysis of Caesar Cipher !14 Three important characteristics of this problem enabled us to use a brute- force cryptanalysis: 1. The encryption and decryption algorithms are known 2. There are only 25 keys to try. 3. The language of the plaintext is known and easily recognisable.
  • 14. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Monoalphabetic Cipher • Rather than just shifting the alphabet • Could shuffle (jumble) the letters arbitrarily • Each plaintext letter maps to a different random cipher text letter • hence key is 26 letters long Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Cipher text: WIRFRWAJUHYFTSDVFSFUUFYA !15
  • 15. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Monoalphabetic Cipher Security • Now have a total of 26! keys • With so many keys, might think the system is secure • But would be !!!WRONG!!! • Problem is the regularities of the language !16
  • 16. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Language Redundancy and Cryptanalysis !17 • Human languages are redundant • Letters are not equally commonly used • The English letter e is by far the most common letter • Then T,R,N,I,O,A,S • Other letters are fairly rare • Z,J,K,Q,X
  • 17. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT English Letter Frequencies !18
  • 18. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Playfair Cipher !19 • Not even the large number of keys in a monoalphabetic cipher provides security • One approach to improving security was to encrypt multiple letters • Invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair
  • 19. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Playfair Key Matrix !20 • A 5X5 matrix of letters based on a keyword • Fill in letters of keyword • Fill rest of matrix with other letters • eg. using the keyword MONARCHY M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z
  • 20. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Encrypting and Decrypting !21 Plaintext encrypted two letters at a time: –if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx lo on" –if both letters fall in the same row, replace each with letter to right (wrapping back to start from end), eg. “ar" encrypts as “RM” –if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom), eg. “mu" encrypts to "CM" –otherwise each letter is replaced by the one in its row in the column of the other letter of the pair, eg. “hs" encrypts to "BP", and “ea" to "IM" or "JM"
  • 21. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Security of the Playfair Cipher !22 • Security much improved over monoalphabetic • Since have 26 x 26 = 676 digrams • Need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic) • Correspondingly more ciphertext • Widely used for many years (eg. US & British military in WW1) • It can be broken, given a few hundred letters
  • 22. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Polyalphabetic Ciphers Polyalphabetic substitution cipher • Improves on the simple monoalphabetic technique by using different monoalphabetic substitutions as one proceeds through the plaintext message !23 All these techniques have the following features in common: • A set of related monoalphabetic substitution rules is used • A key determines which particular rule is chosen for a given transformation
  • 23. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Vigenère Cipher • Best known and one of the simplest polyalphabetic substitution ciphers • In this scheme the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25 • Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a !24
  • 24. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Example of Vigenère Cipher • To encrypt a message, a key is needed that is as long as the message • Usually, the key is a repeating keyword • For example, if the keyword is deceptive, the message “we are discovered save yourself” is encrypted as: key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ !25
  • 25. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Vigenère Autokey System A keyword is concatenated with the plaintext itself to provide a running key Example: key: deceptivewearediscoveredsav plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA Even this scheme is vulnerable to cryptanalysis • Because the key and the plaintext share the same frequency distribution of letters, a statistical technique can be applied !26
  • 26. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Vernam Cipher !27 Key stream generator Figure 3.7 Vernam Cipher Cryptographic bit stream ( ki ) Cryptographic bit stream ( ki ) Plaintext ( pi ) Plaintext ( pi ) Ciphertext ( ci ) Key stream generator
  • 27. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT One-Time Pad • Improvement to Vernam cipher proposed by an Army Signal Corp officer, Joseph Mauborgne • Use a random key that is as long as the message so that the key need not be repeated • Key is used to encrypt and decrypt a single message and then is discarded • Each new message requires a new key of the same length as the new message • Scheme is unbreakable • Produces random output that bears no statistical relationship to the plaintext • Because the ciphertext contains no information whatsoever about the plaintext, there is simply no way to break the code !28
  • 28. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Difficulties • The one-time pad offers complete security but, in practice, has two fundamental difficulties: • There is the practical problem of making large quantities of random keys • Any heavily used system might require millions of random characters on a regular basis • Mammoth key distribution problem • For every message to be sent, a key of equal length is needed by both sender and receiver • Because of these difficulties, the one-time pad is of limited utility • Useful primarily for low-bandwidth channels requiring very high security • The one-time pad is the only cryptosystem that exhibits perfect secrecy (see Appendix F) !29
  • 29. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Rail Fence Cipher • Simplest transposition cipher • Plaintext is written down as a sequence of diagonals and then read off as a sequence of rows • To encipher the message “meet me after the toga party” with a rail fence of depth 2, we would write: m e m a t r h t g p r y e t e f e t e o a a t Encrypted message is: MEMATRHTGPRYETEFETEOAAT !30
  • 30. 14ITT71-CryptographyandNetworkSecurity Jeevanantham Arumugam B.E.,M.S(U.K),Assistant Professor,Dept. of IT Row Transposition Cipher • Is a more complex transposition • Write the message in a rectangle, row by row, and read the message off, column by column, but permute the order of the columns • The order of the columns then becomes the key to the algorithm Key: 4 3 1 2 5 6 7 Plaintext: a t t a c k p o s t p o n e d u n t i l t w o a mx y z Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ !31