UNIT - I (Part 2)
UNIT - I (Part 2)
UNIT - I (Part 2)
UNIT - I
1. Cryptography
2. Symmetric Cipher Model
3. Substitution Techniques
4. Transposition Techniques
5. Rotor Machines
6. Steganography
Pipe/tube
Send Receiv
er er
Faculty Name: Dr. Amrita 5
Goals & Setting
Adversary (Attacker) The source of all
possible threats
Sender Receiver
Not all aspect of an ideal
channel can be emulated
Faculty Name: Dr. Amrita 6
Basic terminology
⚫ Plaintext: original message to be encrypted
⚫ Ciphertext: the encrypted message
⚫ Enciphering or encryption: the process of
converting plaintext into ciphertext
⚫ Encryption algorithm: performs encryption
◦ Two inputs: a plaintext and a secret key
Encry Decry
ption ption
ciphertext
hjfjghkf@#@#$%^&jklll
098GHJFD!@#$#$#$%
Symmetric Encryption
Classical Modern
X=[X1,X2,...,XN] X=DK(Y)
Y=EK(X)
letters from
finite alphabet
K=[K1,K2,...,KJ]
brute-force attack
168 2168 = 3.7 × 2167 µs= 5.9 × 1036 5.9 × 1030 years
1050 years
Faculty Name: Dr. Amrita 34
Characterization of Cryptographic Systems
• Type of encryption operations :
− The type of operations used for transforming plaintext to
ciphertext.
− substitution, transposition(permutation)
• Number of keys used
− sender and receiver use same key: symmetric
encryption
− different keys are used: asymmetric or public-key
encryption
• way in which plaintext is processed
− block cipher: one block input at a time --> one block
output
− stream cipher: process input elements continuously
Example
3.2
The following shows a plaintext and its corresponding
ciphertext. The cipher is not monoalphabetic because each
l (el) is encrypted by a different character.
The ciphertext is
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
hello 🡪 he lx lo
I/J N F O S
E C A B D
G H K L M
P Q R T U
V W X Y Z
C = KP mod 26
Faculty Name: Dr. Amrita 68
Decryption
P = K-1C mod 26
where K-1 is inverse of K
i.e., K-1K = 1 mod 26
Example
Now she has the key and can break any ciphertext
encrypted with that key.
⚫ Ciphertext
MEMATRHTGPRYETEFETEOAAT
⚫ a rail fence of depth 2.
⚫ This sort of thing would be trivial to cryptanalyze.