Lecture - 02 Encryption
Lecture - 02 Encryption
Lecture - 02 Encryption
Classical Encryption
Techniques
1
25-Feb-20
Definition
• Encryption normally works in the following
way:
“ A message in its original form (plaintext) is
encrypted into an unintelligible form
(ciphertext) by a set of procedures known
as an encryption algorithm and a variable,
called a key; and the ciphertext is
transformed (decrypted) back into plaintext
using the encryption algorithm and a key.”
4
2
25-Feb-20
Definitions - Crypto-speak
• Cryptography is the study of secret
(crypto-) writing (-graphy)
• Cryptography deals with all aspects of
secure messaging, authentication, digital
signatures, electronic money, and other
applications
• The practitioner of Cryptography is called
Cryptographer
Definitions
3
25-Feb-20
Why Cryptography?
• Concerned with developing algorithms
which may be used to:
– Conceal the context of some message from
all except the sender and recipient (privacy or
secrecy), and/or
– Verify the correctness of a message to the
recipient (authentication)
– Forms the basis of many technological
solutions to computer and communications
security problems
7
4
25-Feb-20
Cryptography is Mathematical
• Encryption C = EK(P)
• Decryption P = EK-1(C)
• EK is chosen from a family of
transformations known as a cryptographic
system.
• The parameter that selects the individual
transformation is called the key K,
selected from a keyspace K
Cryptography is Mathematical
• A cryptographic system is a single
parameter family of invertible
transformations
– EK ; K in K : P C
– with the inverse algorithm EK -1 ; K in K : C P
– such that the inverse is unique
• Usually we assume the cryptographic
system is public, and only the key is secret
information
10
5
25-Feb-20
Cryptography
• characterize cryptographic system by:
– type of encryption operations used
• substitution / transposition / product
– number of keys used
• single-key or private / two-key or public
– way in which plaintext is processed
• block / stream
6
25-Feb-20
Cryptanalaysis
• The study of principles and methods of
transforming an unintelligible message
back into an intelligible message without
knowledge of the key is called
Cryptanalysis.
• Also called “code breaking” sometimes.
• Whereas people who do cryptography are
cryptographers, and practitioners of
cryptanalysis are cryptanalysts.
13
Cryptology
• Cryptology is the branch of mathematics
that studies the mathematical foundations
of cryptographic methods.
• Cryptology comes from the Greek words
Kryptos, meaning hidden, and Graphen,
meaning to write. Cryptology is actually
the study of codes and ciphers.
• Cryptology = both cryptography and
cryptanalysis
14
7
25-Feb-20
Cryptanalysis
• objective to recover key not just message
• general approaches:
– cryptanalytic attack
– brute-force attack
Definitions Summary
Plaintext Ciphertext Enciphering/encryptio
n
• An original message • The coded message
• The process of converting
from plaintext to ciphertext
Cryptanalysis Cryptology
• Techniques used for • The areas of
deciphering a message cryptography and
without any knowledge of cryptanalysis
the enciphering details
8
25-Feb-20
Cryptanalytic Attacks
• ciphertext only
– only know algorithm & ciphertext, is statistical,
know or can identify plaintext
• known plaintext
– know/suspect plaintext & ciphertext
• chosen plaintext
– select plaintext and obtain ciphertext
• chosen ciphertext
– select ciphertext and obtain plaintext
• chosen text
– select plaintext or ciphertext to en/decrypt
9
25-Feb-20
^
X
Cryptanalyst
^
K
Secure Channel
Key
Source
10
25-Feb-20
Cryptographic Systems
• Characterized along three independent
dimensions:
The type of
operations used for The way in which
The number of keys
transforming the plaintext is
used
plaintext to processed
ciphertext
Symmetric,
single-key,
Substitution secret-key, Block cipher
conventional
encryption
Asymmetric,
two-key, or
Transposition Stream cipher
public-key
encryption
Cryptanalysis and
Brute-Force Attack
11
25-Feb-20
(Table is on page 68
in the textbook)
• Unconditionally secure
– No matter how much time an opponent
has, it is impossible for him or her to
decrypt the ciphertext simply because the
required information is not there
• Computationally secure
– The cost of breaking the cipher exceeds
the value of the encrypted information
– The time required to break the cipher
exceeds the useful lifetime of the
information
12
25-Feb-20
Brute-Force Attack
Key Size (bits) Number of Alternative Time required at 1 Time required at 106
Keys decryption/µs decryptions/µs
32 232 = 4.3 109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2 1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
13
25-Feb-20
Strong Encryption
• The term strong encryption refers to
encryption schemes that make it
impractically difficult for unauthorized
persons or systems to gain access to
plaintext that has been encrypted
• Properties that make an encryption
algorithm strong are:
• Appropriate choice of cryptographic algorithm
• Use of sufficiently long key lengths
• Appropriate choice of protocols
• A well-engineered implementation
• Absence of deliberately introduced hidden flaws
Algorithm Secrecy
• Some cryptographic methods rely on the
secrecy of the algorithms; such algorithms
are only of historical interest and are not
adequate for real-world needs.
• Kerchoff’s Principle: If the strength of
your new cryptosystems relies on the fact
that the attacker does not know the
algorithm's inner workings,you are sunk.
Security through Obscurity Does
Not Work !!! 28
14
25-Feb-20
The Key
• All modern algorithms
use a key to control
encryption and
decryption; a message
can be decrypted only
if the key matches the
encryption key.
• The key used for
decryption can be
different from the
encryption key, but for
most algorithms they
29
are the same.
Substitution Technique
15
25-Feb-20
Symmetric Algorithms
• Symmetric algorithms can be divided into
two categories: (1) stream ciphers and (2)
block ciphers.
• Stream ciphers can encrypt a single
bit/byte of plaintext at a time, whereas …
• Block ciphers take a number of bits
(typically 64 bits in modern ciphers), and
encrypt them as a single unit.
32
16
25-Feb-20
Asymmetric Algorithms
• Asymmetric ciphers (also called public-key
algorithms or generally public-key
cryptography) permit the encryption key to
be public (it can even be published in a
newspaper), allowing anyone to encrypt with
the key, whereas only the proper recipient
(who knows the decryption key) can decrypt
the message.
• The encryption key is also called the Public
Key and the decryption key the Private Key
or Secret Key. 33
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
34
Asymmetric (Two Key) Cryptography
17
25-Feb-20
Types of Cryptographic
Algorithms
• Block – processes information to be encrypted
in blocks of 32/64/128 bits
• Stream – processes information one bit or one
character at a time
• Symmetric – uses same key for encryption and
decryption
• Asymmetric – uses one key for encryption and
another totally different key for decryption
• Secret Key – usually refers to single key
algorithms where the key must be kept secret
• Public Key – refers to asymmetric algorithms
where one of the keys is public and does not
need to be kept secret 35
Modes of Use
• What is a mode? A mode combines:
– Basic Encryption Algorithm
– Some Feedback
– Some Simple Operation
• The security is a function of the underlying
cipher and not the mode.
• The cipher mode should not compromise the
security of the underlying algorithm.
• Benefits of modes: Patterns, Efficiency, Fault
Tolerance.
• Examples: ECB, CBC, OFB, CFB, etc.
36
18
25-Feb-20
19
25-Feb-20
39
20
25-Feb-20
Muslim Contributions To
Cryptography
• Ground breaking research by Dr. Ibrahim
A. Al-Kadi, Associate Professor, Electrical
Engineering Department, College of
Engineering, King Saud University, SA.
• Old manuscripts show that the origin of
cryptology, and the Arab contributions to it,
are older and more extensive than
previously thought.
• The word ‘cipher’ in European languages
comes from the Arabic word sifr.
42
21
25-Feb-20
Muslim Cryptographers
• Al-Kindi
• Ibn Adlaan
• Ibn Duraihim
43
22
25-Feb-20
T H E S C Y T A L
E I S A T R A N
S P O S I T I
ON C I P H E R 46
23
25-Feb-20
Machine Ciphers
• Jefferson cylinder, developed in 1790s,
comprised 36 disks, each with a random alphabet
• Order of disks was key
• Message was set
Ciphertext
• Then another row became cipher
X M A W B A A W A S P A Q
J S N F L J K X V U R L H
P G Z D E Q P B C R T P A
N O W I S T H E T I M E F …
A I K M F D M Z Y W V U S
47
Plaintext
Y Q C O N O X O I O D O J
Machine Ciphers
• Wheatstone disc,
originally invented by
Wadsworth in 1817,
but developed by
Wheatstone in 1860's,
comprised two
concentric wheels
used to generate a
polyalphabetic cipher
48
24
25-Feb-20
Enigma
• Enigma Rotor machine, one of a very
important class of cipher machines,
heavily used during 2nd world war.
• Comprised a series of rotor wheels with
internal cross-connections, providing a
substitution using a continuously changing
alphabet.
49
Figure - Enigma
50
25
25-Feb-20
52
26
25-Feb-20
54
27
25-Feb-20
56
28
25-Feb-20
Morse Code
57
History
• The little known native Indian language of
the Navajo was used by the US in WWII
as a simple word substitution code.
• There were 65 letters and numbers that
were used to encipher a single word prior
to the use of the Navajo language.
• The Navajo language was much faster
and accurate compared to earlier ciphers
and was heavily used in the battle of Iwo-
jima. 58
29
25-Feb-20
History
• The Germans, responsible for much of the
cipher science today, developed complex
ciphers near the end of WWII.
• They enciphered messages and sent them at
high rates of speed across radio wave bands in
Morse code.
• To the unexpecting it sounded like static in the
background.
• One gentleman tried to better understand the
static and listened to it over and over again.
• The last time he played his recording he forgot
to wind his phonograph.
• The static played at a very slow speed and was 59
soon recognized as a pattern, Morse code!
History
• The Germans in WWII used codes but also
employed other types of secret writings.
• One suspected spy was found to have large
numbers of keys in his motel room.
• After inspecting the keys it was found that some
of the keys were modified to unscrew at the top
to show a plastic nib.
• The keys contained special chemicals for
invisible ink!
• However, codes and secret ink messages were
very easily captured and decoded. 60
30
25-Feb-20
Concealment Messages
• Some of the more fun secret writings are
concealment messages like invisible inks
made out of potato juice, lemon juice, and
other types of juices and sugars!
• Deciphering and decoding messages take
a lot of time and be very frustrating. But
with experience, strategies, and most of
all, luck, you'll be able to crack lots of
codes and ciphers.
61
Cryptography vs.
Steganography
• What is steganography?
• In an ideal world we would all be able to openly
send encrypted email or files to each other with
no fear of reprisals. However there are often
cases when this is not possible, either because
you are working for a company that does not
allow encrypted email or perhaps the local
government does not approve of encrypted
communication (a reality in some parts of the
world). This is where steganography can come
into play. 62
31
25-Feb-20
Cryptography vs.
Steganography
• Steganography simply takes one piece of information
and hides it within another.
• Computer files (images, sounds recordings, even disks)
contain unused or insignificant areas of data.
Steganography takes advantage of these areas,
replacing them with information (encrypted mail, for
instance). The files can then be exchanged without
anyone knowing what really lies inside of them.
• An image of the space shuttle landing might contain a
private letter to a friend.
• A recording of a short sentence might contain your
company's plans for a secret new product.
• Steganography can also be used to place a hidden
“trademark” in images, music, and software, a technique63
referred to as watermarking.
64
32
25-Feb-20
Classical Cryptographic
Techniques
• Three Eras of Cryptography:
– Classical
– Traditional
– Modern
• We have two basic components of classical
ciphers: substitution and transposition.
• Substitution: In substitution ciphers letters are
replaced by other letters.
• Transposition: In transposition ciphers the
letters are arranged in a different order.
65
66
33
25-Feb-20
Monoalphabetic and
Polyalphabetic Ciphers
• Monoalphabetic - only one substitution/
transposition is used.
• Polyalphabetic - where several
substitutions/ transpositions are used.
• Several such ciphers may be
concatenated together to form a Product
Cipher.
67
Substitution Technique
34
25-Feb-20
69
35
25-Feb-20
71
Plaintext:
abcdefghijklmnopqrstuvwxyz
QIAYMWFUBKPDGJZSOCVLXNETRH
Ciphertext:
72
36
25-Feb-20
Caesar Cipher
• can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
37
25-Feb-20
Brute-Force 5
6
kccr kc ydrcp rfc rmey nyprw
jbbq jb xcqbo qeb qldx mxoqv
Cryptanalysis
7 iaap ia wbpan pda pkcw lwnp u
8 hzzo hz vaozm ocz ojbv kvmot
of
9 gyyn gy uznyl nby niau julns
10 fxxm fx tymxk max mhzt itkmr
11 ewwl ew sxlwj lzw lgys hsjlq
Caesar Cipher 12
13
dvvk dv rwkvi kyv kfxr grikp
cuuj cu qvjuh jxu jewq fqhjo
14 btti bt puitg iwt idvp epgin
15 assh as othsf hvs hcu o dofhm
16 zrrg zr nsgre gur gbtn cnegl
17 yqqf yq mrfqd ftq fasm bmdfk
18 xppe xp lqepc esp ezrl alcej
19 wood wo kpdob dro dyqk zkbdi
20 vnnc vn jocna cqn cxpj yjach
21 ummb um inbmz bpm bwoi xizbg
22 tlla tl hmaly aol avnh whyaf
23 skkz sk glzkx znk zumg vgxze
24 rjjy rj fkyjw ymj ytlf ufwyd
25 qiix qi ejxiv xli xske tevxc
38
25-Feb-20
Monoalphabetic Cipher
• rather than just shifting the alphabet
• could shuffle (jumble) the letters arbitrarily
• each plaintext letter maps to a different random
ciphertext letter
• hence key is 26 letters long
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
39
25-Feb-20
Frequency-based Cryptanalytic
Attacks
• Cryptanalyst knows the letter-frequency
distribution of the language.
• Cryptanalyst constructs the letter
frequency table of the cipher-text.
• Cryptanalyst tries to find letter pairs with
the same frequency distribution in the
plain text and cipher text.
• Also uses the frequencies of di-grams and
tri-grams.
• Finally a little bit of trial and error. 80
40
25-Feb-20
Frequency Distribution of
Letters in Standard English
A 8.167 J 0.153 S 6.327
B 1.492 K 0.772 T 9.056
C 2.782 L 4.025 U 2.758
D 4.253 M 2.406 V 0.978
E 12.702 N 6.749 W 2.360
F 2.228 O 7.507 X 0.150
G 2.015 P 1.929 Y 1.974
H 6.094 Q 0.095 Z 0.074
I 6.966 R 5.987 81
41
25-Feb-20
Monoalphabetic Ciphers
• Easy to break because they reflect the
frequency data of the original alphabet
• Countermeasure is to provide multiple
substitutes (homophones) for a single
letter
• Digram
– Two-letter combination
– Most common is th
• Trigram
– Three-letter combination
– Most frequent is the
42
25-Feb-20
Exercise
• Decrypt
OVDTHUFWVZZPISLRLFZHYLAOLYL
43
25-Feb-20
Permutation cipher
• Key generation
– Sample permutation 𝜋: 𝑎, … , 𝑧 → 𝑎, … , 𝑧
• Encryption
–𝑐 ←𝜋 𝑚
• Decryption
–𝑚 ←𝜋 𝑐
44
25-Feb-20
45
25-Feb-20
WMMW
Anna Elsa
46
25-Feb-20
47
25-Feb-20
Cryptanalysis of Mary’s
cipher
and ultimate faith of Mary
Thomas Phelippes
48
25-Feb-20
Midway islands
• Americans
cryptographers
were able to
predict the attack
ahead of time.
Midway islands
49
25-Feb-20
Playfair Cipher
• Best-known multiple-letter encryption cipher
• Treats digrams in the plaintext as single units
and translates these units into ciphertext
digrams
• Based on the use of a 5 x 5 matrix of letters
constructed using a keyword
• Invented by British scientist Sir Charles
Wheatstone in 1854
• Used as the standard field system by the
British Army in World War I and the U.S. Army
and other Allied forces during World War II
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
50
25-Feb-20
Hill Cipher
• Developed by the mathematician Lester
Hill in 1929
• Strength is that it completely hides single-
letter frequencies
– The use of a larger matrix hides more
frequency information
– A 3 x 3 Hill cipher hides not only single-letter
but also two-letter frequency information
• Strong against a ciphertext-only attack
but easily broken with a known plaintext
attack
51
25-Feb-20
Polyalphabetic Substitution
Cipher
• Polyalphabetic Substitution - several
substitutions are used.
• Used to hide the statistics of the plain-text.
103
Polyalphabetic Ciphers
• Polyalphabetic substitution cipher
– Improves on the simple monoalphabetic technique by
using different monoalphabetic substitutions as one
proceeds through the plaintext message
52
25-Feb-20
Polyalphabetic
Substitution Example
Suppose that a polyalphabetic cipher of period 3 is being used, with the three
monoalphabetic ciphers M1, M2, M3 as defined below. To encrypt a message,
the first 3 letters of the plaintext are enciphered according to ciphers M1, M2,
M3 respectively, with the process being repeated for each subsequent block of
3 plaintext letters.
a b c d e f g h i j k l m n o p q r s t u v w x y z
M1: K D N H P A W X C Z I M Q J B Y E T U G V R F O S L
M2: P A G U K H J B Y D S O E M Q N W F Z I T C V L X R
M3: J M F Z R N L D O W G I A K E S U C Q V H Y X T P B
Plaintext
now is the time for every good man
Ciphertext
JQX CZ VXK VCER AQC PCRTX LBQZ QPK
Note:
The two o’s in good have been enciphered as different letters. Also the 105
three letters “X” in the ciphertext represent different letters in the plaintext.
Transposition Ciphers
• Transposition or permutation ciphers hide
the message contents by rearranging the
order of the letters.
• Scytale Cipher is an example of a
transposition cipher.
• How does a cryptanalyst know that a
transposition cipher has been used?
• Single transposition vs. double
transposition
106
53
25-Feb-20
Ciphertext r t h e c
PBDSROUSENRECQEZAYAUTNEZMUOF o n s e q
EECZYSYFHSNZ
u e n c e
s z z z z 108
54
25-Feb-20
109
55
25-Feb-20
112
56
25-Feb-20
57
25-Feb-20
58
25-Feb-20
117
59
25-Feb-20
119
60
25-Feb-20
Model of Conventional
Cryptosystem
121
122
61
25-Feb-20
123
Trapdoor Problem
• A trapdoor is a mathematical formula that is easy to work
forward but very hard to work backward. In general it is
easy to multiply two very large numbers together, but it is
very difficult to take a very large number and find its two
prime factors. Public key algorithms depend on a person
publishing a large public key and others being unable to
factor this public key into its component parts. Because
the creator of the key knows the factors of his or her
large number, he or she can use those factors to decode
messages created by others using his or her public key.
Those who only know the public key will be unable to
discover the private key, because of the difficulty of
factoring the large number. 124
62
25-Feb-20
Original
Plaintext
Plaintext Ciphertext
Encryption Decryption
126
63
25-Feb-20
127
RSA
• The best known public key system is RSA,
named after its authors, Rivest, Shamir
and Adelman.
• It has recently been brought to light that an
RSA-like algorithm was discovered several
years before the RSA guys by some
official of the British Military Intelligence
Cryptography Wing
128
64
25-Feb-20
Comparison of SK and PK
Cryptography
Secret Key
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
129
Asymmetric (Two Key) Cryptography
Comparison of SK and PK
Cryptography
DISTINCT SECRET KEY PUBLIC KEY
FEATURES
NUM BER OF Single key. Pair of keys.
KEYS
TYPES O F Key is secret. One key is
KEYS private, and
one key is
public.
LENGTH O F 40-200 bits 512-2048 bits
KEYS
RELATIVE Faster. Slower.
SPEEDS
130
65
25-Feb-20
Uses of Encryption
• Protecting data from prying eyes is not the only security
issue in networking.
• One can imagine at least four security services:
– Protecting data from being read by unauthorized persons
– Verifying the sender of each message (authentication)
– Preventing unauthorized persons from inserting or deleting
messages
– Making it possible for users to send signed documents
electronically
• Encryption can be used to achieve all these goals.
131
Uses of Encryption
• Encryption may be used for:
– Confidentiality
– Error Detection
– User Authentication
– Message Authentication
– Proof of Origin
132
66
25-Feb-20
Confidentiality - Secrecy
• Confidentiality - encrypted data cannot
normally be understood by anyone other
than the sender or the receiver.
• How?
M E EK(M) EK(M) D M
K K
133
Error Detection
• Error Detection - checking that the
contents of a message have not
accidentally changed.
• How?
M E EK(M) (EK(M))’ D M’
K K
134
67
25-Feb-20
User Authentication
• User authentication - verification by the
receiver that the sender is the genuine
author and not somebody else.
• How?
M H || T
H(M)
EK(H(M))
K E
135
Message Authentication
• Message authentication - verification that
messages have not been lost or tampered
with.
• How?
M H || T
H(M)
EK(H(M))
K E
136
68
25-Feb-20
Proof of Origin
• Proof or origin - proving to a third party
that the message came from the stated
sender.
• How?
M H || T
H(M)
EK(H(M))
K E
137
138
69
25-Feb-20
Link Encryption
PRIVATE LINE
(DIALUP, T1, ETC.)
140
70
25-Feb-20
Session Encryption
INTERNET
WEB
CLIENT WEB
SERVER
71
25-Feb-20
MAIN BRANCH
OFFICE OFFICE
Examples: TUNNELING
PPTP ENCRYPTION
IPSec ROUTERS
143
Strength of Cryptographic
Algorithms
• Good cryptographic systems should always be
designed so that they are as difficult to break as
possible.
• It is possible to build systems that cannot be broken
in practice (though this cannot usually be proved).
• This does not significantly increase system
implementation effort; however, some care and
expertise is required. There is no excuse for a
system designer to leave the system breakable.
• Any mechanisms that can be used to circumvent
security must be made explicit, documented, and
brought into the attention of the end users.
144
72
25-Feb-20
Strength of Cryptographic
Algorithms
• In theory, any cryptographic method with a key
can be broken by trying all possible keys in
sequence. If using brute force to try all keys is
the only option, the required computing power
increases exponentially with the length of the
key. A 32 bit key takes 2^32 (about 10^9) steps.
This is something any amateur can do on his/her
home computer. A system with 40 bit keys (e.g.
US-exportable version of RC4) takes 2^40 steps
- this kind of computing power is available in
most universities and even smallish companies.
145
Strength of Cryptographic
Algorithms
• A system with 56 bit keys (such as DES) takes a substantial
effort, but is quite easily breakable with special hardware.
The cost of the special hardware is substantial but easily
within reach of organized criminals, major companies, and
governments.
• Keys with 64 bits are probably breakable now by major
governments, and will be within reach of organized criminals,
major companies, and lesser governments in a few years.
• Keys with 80 bits may become breakable in future.
• Keys with 128 bits will probably remain unbreakable by brute
force for the foreseeable future.
• Even larger keys are possible; in the end we will encounter a
limit where the energy consumed by the computation, using
the minimum energy of a quantum mechanic operation for
the energy of one step, will exceed the energy of the mass 146of
the sun or even of the universe.
73
25-Feb-20
Strength of Cryptographic
Algorithms
• However, key length is not the only relevant
issue.
• Many ciphers can be broken without trying all
possible keys.
• In general, it is very difficult to design ciphers
that could not be broken more effectively using
other methods.
• Designing your own ciphers may be fun, but it is
not recommended in real applications unless
you are a true expert and know exactly what you
147
are doing.
Strength of Cryptographic
Algorithms
• One should generally be very cautious of
unpublished or secret algorithms. Quite often the
designer is then not sure of the security of the
algorithm, or its security depends on the secrecy
of the algorithm.
• Generally, no algorithm that depends on the
secrecy of the algorithm is secure. Particularly in
software, anyone can hire someone to
disassemble and reverse-engineer the
algorithm.
• Experience has shown that a vast majority of
secret algorithms that have become public
knowledge later have been pitifully weak in
reality. 148
74
25-Feb-20
75
25-Feb-20
Conventional vs Public-Key vs
ECC Key Sizes
• Conventional Public-key ECC
• (40 bits) — —
• 56 bits (400 bits) —
• 64 bits 512 bits —
• 80 bits 768 bits —
• 90 bits 1024 bits 160 bits
• 112 bits 1792 bits 195 bits
• 120 bits 2048 bits 210 bits
• 128 bits 2304 bits 256 bits
151
76
25-Feb-20
Strength of Cryptographic
Algorithms
• It should be emphasized that the strength
of a cryptographic system is usually
equal to its weakest point.
• No aspect of the system design should be
overlooked, from the choice algorithms to
the key distribution and usage policies.
153
77
25-Feb-20
78
25-Feb-20
References
• Cryptography - Theory and Practice by Douglas
Stinson
CRC Press
Boca Raton, 1995
• Applied Cryptography by Bruce Schneier
Second Edition
John Wiley & Sons, Inc.
New York, c. 1996
• Handbook of Applied Cryptography by Alfred J.
Menezes and others, Available freely on the web
• RSA Laboratories’ Frequently Asked Questions
About Today’s Cryptography, Version 4.1
RSA Laboratories, 2000
RSA Security Inc.
Available at http://www.rsadsi.com
• Internet Cryptography by Richard E. Smith 157
Low Priced Edition, Pearson Education Asia
Addison Wesley Longman 1997
Summary
• have considered:
– classical cipher techniques and terminology
– monoalphabetic substitution ciphers
– cryptanalysis using letter frequencies
– Playfair cipher
– polyalphabetic ciphers
– transposition ciphers
– product ciphers and rotor machines
– stenography
79
25-Feb-20
Assignment
• Review Questions
• 2.2, 2.3, 2.7, 2.11 and 2.14
• Problems
• 2.4, 2.5 and 2.8
80