2. Classical Encryption Techniques
2. Classical Encryption Techniques
cryptosystem
Forms of cryptographic techniques
Symmetric
asymmetric
Their implementation
ciphertext only
only knows algorithm & ciphertext
known plaintext
know/suspect plaintext & ciphertext
chosen plaintext
select plaintext and obtain ciphertext
chosen ciphertext
select ciphertext and obtain plaintext
chosen text
select plaintext or ciphertext to en/decrypt
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
Caesar cipher
Monoalphabetic ciphers
Playfair cipher
Hill cipher
Polyalphabetic ciphers
One-Time Pad
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
count relative letter frequencies
guess P & Z are e and t
guess ZW is th and hence ZWP is the
proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow
(TWO LETTER COMBINATIONS ARE CALLED
DIGRAMS)
BITS Pilani, Hyderabad Campus
Approaches in substituion ciphers
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
HI DE TH EG OL DI NT HE TR EX ES TU MP
assuming that I and J are interchangeable
Vigenere cipher
Vernam cipher
One-Time Pad (OTP)
m e m a t r h t g p r y
e t e f e t e o a a t
giving ciphertext
MEMATRHTGPRYETEFETEOAAT
Key: 4 3 1 2 5 6 7
Plaintext: a t t a c k p
o s t p o n e
d u n t i l t
w o a m x y z
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ