Modul1-Cryptanalysis, Classical Encryp Tech
Modul1-Cryptanalysis, Classical Encryp Tech
This is R#$s%e4mv
book Cryptographic system
hfyj465#^
Readable msg unreadable msg
This process is
systematic and
well structured
Fig: cryptographic system
1
cryptanalysis
• Cryptanalysis is the technique of decoding message
from a nonreadable format back to readable format
without knowing how they were initially converted
from readable format to non readable format.
In other word it is like breaking code
This process
is trial &
error based 2
Cryptographic Attacks
6
• Known Plaintext Attack (KPA) − In a known plaintext
attack, the analyst may have access to some or all of
the plaintext of the ciphertext; the analyst's goal in
this case is to discover the key used to encrypt the
message and decrypt the message. Once the key is
discovered, an attacker can decrypt all messages that
had been encrypted using that key. Linear
cryptanalysis is a type of known plaintext attack
• Chosen Plaintext Attack (CPA) − In this method, the
attacker has the text of his choice encrypted. So he
has the ciphertext-plaintext pair of his choice. This
simplifies his task of determining the encryption key.
An example of this attack is differential
cryptanalysis applied against block ciphers as well as
hash functions. A popular public key cryptosystem,
RSA is also vulnerable to chosen-plaintext attacks.
• The analyst can encrypt the chosen plaintext with the
targeted algorithm to derive information about the
key.
4. Chosen chipertext attack
• A chosen-ciphertext attack (CCA) is an attack
model for cryptanalysis where the cryptanalyst can
gather information by obtaining the decryptions of
chosen ciphertexts. From these pieces of information
the adversary can attempt to recover the hidden
secret key used for decryption.
9
• Dictionary Attack − This attack has many variants, all
of which involve compiling a ‘dictionary’. In simplest
method of this attack, attacker builds a dictionary of
ciphertexts and corresponding plaintexts that he has
learnt over a period of time. In future, when an
attacker gets the ciphertext, he refers the dictionary
to find the corresponding plaintext.
In CAESER cipher we use the key as 3, rest same as
additive cipher
Polyalphabetic Ciphers
In polyalphabetic substitution, each occurrence of a
character may have a different substitute.
The relationship between a character in the plaintext to a
character in the ciphertext is one-to-many.
Example ‘a’ can be enciphered as ‘D’ in the beginning of the
text, but as ‘N’ at the middle.