Tuesday, January 26, 2010

Lecture 2: Elementary Cryptography (Jan 25)



Cryptography


Goal
Its goal is to ensure communication security over insecure medium. And in the first lecture we had learned that the security fundamentally has three goals: Confidentiality, Availability and Integrity.


Main Components in Sending Messages
Sender
Medium <===> Intruder
Receiver


Intruder can
Interrupt (make an asset unavailable, unusable) thus breaks Availability
Intercept (gain access to the asset) thus breaks Confidentiality
Modify (tamper with an asset) thus breaks Integrity
Fabricate (create objects) thus breaks Integrity


Approaches to Secure Communication


Steganography
  • Hide the existence of the message (Remember picture in picture in the slides !)
Cryptography
  • Hide the meaning of the message (Message is there but what is it ?)


Secret Writing
Make the message difficult to be read, modified or fabricated


Encryption is transforming plain text to cipher text :  C = E(c), where E is encryption rule
Decryption is transforming cipher text to plain text :  P = D(c), where D is decryption rule


Cryptosystem
Sender encrypts the original plain text ===> cipher text flies over the medium (Intruder does not have access to the plain text) ===> Receiver decrypts the cipher text


Cryptosystem helps us by providing the privacy and the integrity.


Encryption


Keyless
No key is used (algorithm doesn't take any parameters) in encryption or decryption.


Symmetric Key
The same key used in both encryption and decryption.


Asymmetric Key
Two different keys are used in encryption and decryption.


We do not use very strong keys (such as 1 million bit ) due to the computational cost for encryption and decryption


Cryptanalysis 


Cryptanalysis is the deduction of the original meaning from the cipher text by coming up with the decryption algorithm.


Ciphers
Important Note on Notation:
From now on UPPERCASE means PLAINTEXT, and lowercase denotes ciphertext


Substitution Ciphers are done by substituting each symbol by some other symbol.
E.g. Ceaser Cipher, Permutation.


Ceaser just substitutes every letter in the alphabet with another letter where there are always "n" letters in between them. For example, (for n==2) If A becomes d, then B becomes e.


Permutation is another way of substitution where each symbol is mapped to some other symbol without following a rule.


Cryptanalysis of Substitution Ciphers
Since
  • Break (blank character), and repeated letters are preserved, 
  • We can use clues like short words, 
  • Knowledge of language simplify it (e.g. E,T,O,A occur far more than J,Q,X,Z)
  • We can use brute force attach (26! possibilities for permutation)
it is easy to break.


Solution
We can avoid regularity if a symbol in plain text is transformed to different symbols at different occurrences. We can do that by using one-time pads where the receiver and the sender have identical pads.
Plaintext
V     E    R   N   A   M   C     I    P   H   E   R
21   4    17  13  0   12  2     8   15  7    4   17
Random numbers
76  48  16  82  44  3   58  11  60  5   48  88
Sum
97  52  33  95  44  15  60  19  75  12  52  105
Sum mod 26
19   0    7   17  18  15  8   19  23  12  0   1
Ciphertext
 t    a    h    r   s    p     i    t    x    m   a   b



Difficulties in practice of using one-time pads
Both sender and the receiver need access to identical objects such as telephone book
Since the phone book is not completely random but instead consists of high frequency letters just as the plain text, then for example, for the standard English case, the probability that the key and plain text letter is either A,E,O,T,N or I is 0.25.


Transposition


Transposition Ciphers are done by rearranging the places of the symbols
Here is an example to columnar transposition:

THIS IS A MESSAGE TO SHOW HOW A COLMUNAR TRANSPOSITION WORKS


   T  H   I   S   I
   S  A  M  E  S
   S  A  G  E  T
   O  S  H  O  W
   H  O  W  A  C
   O  L  M  U  N
   A  R  T  R  A
   N  S  P  O  S
   I    T   I   O  N
   W  O  R  K  S

  tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasna



This is also easy to break since the frequency distribution technique can be applied and also the pattern of transposition can be identified easily.

1 comment:

  1. Awesome post. Thank you so much for explaining the concept of cryptography in detail. This article is a great resource and has helped me to learn most of the facts about this encryption technique that is highly used in a number of tools and application meant for security purpose.
    electronic signature FAQ

    ReplyDelete