Classical Encryption Techniques
Classical Encryption Techniques
T318
APPLIED NETWORK SECURITY
Chapter 2
Classical Encryption Techniques
1
Definitions
Cryptanalysis Cryptology
•Techniques used for
deciphering a message •The areas of
without any knowledge cryptography and
of the enciphering cryptanalysis
details
Symmetric Cipher Model
The type of
operations used The way in which
The number of
for transforming the plaintext is
keys used
plaintext to processed
ciphertext
Symmetric,
single-key,
Substitution secret-key, Block cipher
conventional
encryption
Asymmetric,
two-key, or
Transposition Stream cipher
public-key
encryption
Cryptanalysis and Brute-Force Attack
❖ Unconditionally secure
▪ No matter how much time an opponent has, it is
impossible for him or her to decrypt the ciphertext
simply because the required information is not
there
❖ Computationally secure
▪ The cost of breaking the cipher exceeds the value
of the encrypted information
▪ The time required to break the cipher exceeds the
useful lifetime of the information
Brute-Force Attack
▪ A shift may be of any amount, so that the general Caesar algorithm is:
C = E(k , p ) = (p + k ) mod 26
❖ Where k takes on a value in the range 1 to 25; the decryption
algorithm is simply:
p = D(k , C ) = (C - k ) mod 26
Figure 2.3
Brute-Force
Cryptanalysis
of
Caesar Cipher
Sample of Compressed Text
❖ Permutation
▪ Of a finite set of elements S is an ordered sequence of all the elements of S ,
with each element appearing exactly once
etefeteoaat
MEMATRHTGPRYETEFETEOAAT
Row Transposition Cipher