Cryptography and Cryptanalysis
Cryptography and Cryptanalysis
Cryptography and Cryptanalysis
Security
Prof. Selva Rani B
Module-II
Elementary Cryptography
Cryptography and Cryptanalysis-Definitions
Plain Text
An original message
Cipher Text
The coded message
Enciphering/encryption
The process of converting from plaintext to ciphertext
Deciphering/decryption
Restoring the plaintext from the ciphertext
Cryptography
The area of study of the many schemes used for encryption
Cryptography and Cryptanalysis-Definitions
Cryptographic system/cipher
A scheme
Cryptanalysis
Techniques used for deciphering a message without any knowledge
of the enciphering details
Cryptology
The areas of cryptography and cryptanalysis
Model of Symmetric Encryption
Symmetric Crypto System
Cryptographic Systems
Characterized along three independent dimensions:
The type of operations used for transforming plaintext to
ciphertext
Substitution
Transposition
The number of keys used
Symmetric, single-key, secret-key, conventional encryption
Asymmetric, two-key, or public-key encryption
The way in which the plaintext is processed
Block cipher
Stream cipher
Cryptanalysis and Brute-Force Attack
Cryptanalysis
Attack relies on the nature of the algorithm plus some knowledge
of the general characteristics of the plaintext
Attack exploits the characteristics of the algorithm to attempt to
deduce a specific plaintext or to deduce the key being used
Brute-Force Attack
Attacker tries every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained
On average, half of all possible keys must be tried to achieve
success
Types of Attacks
Type of Attack Known to Cryptanalyst
Ciphertext Only • Encryption algorithm
• Ciphertext
Known Plaintext • Encryption algorithm
• Ciphertext
• One or more plaintext-ciphertext pairs formed with the Secret
key
Chosen Plaintext Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
Chosen Ciphertext Encryption algorithm
• Ciphertext
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the Secret
key
Chosen Text • Encryption algorithm
• Ciphertext
• Plaintext message chosen by cryptanalyst, together with its
corresponding ciphertext generated with the secret key
• Ciphertext chosen by cryptanalyst, together with its
corresponding decrypted plaintext generated with the secret
key
Brute-Force Attack
Involves trying every possible key until an intelligible
translation of the ciphertext into plaintext is obtained
On average, half of all possible keys must be tried to
achieve success
To supplement the brute-force approach, some
degree of knowledge about the expected plaintext is
needed, and some means of automatically
distinguishing plaintext from garble is also needed