0% found this document useful (0 votes)
201 views

2 Classical Encryption

The document discusses classical encryption techniques, including: 1) Symmetric encryption techniques where the same key is used for encryption and decryption, including block ciphers and stream ciphers. 2) Basic terminology used in encryption such as plaintext, ciphertext, encryption/decryption algorithms, and secret keys. 3) Classical ciphers like the Caesar cipher, monoalphabetic substitution cipher, and Playfair cipher which encrypt text by substituting or rearranging plaintext letters.

Uploaded by

Pranav Pathak
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views

2 Classical Encryption

The document discusses classical encryption techniques, including: 1) Symmetric encryption techniques where the same key is used for encryption and decryption, including block ciphers and stream ciphers. 2) Basic terminology used in encryption such as plaintext, ciphertext, encryption/decryption algorithms, and secret keys. 3) Classical ciphers like the Caesar cipher, monoalphabetic substitution cipher, and Playfair cipher which encrypt text by substituting or rearranging plaintext letters.

Uploaded by

Pranav Pathak
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

Classical Encryption Techniques

CSE 651: Introduction to Network Security

Basic terminology
Plaintext: original message to be encrypted Ciphertext: the encrypted message

Enciphering or encryption: the process of converting plaintext into ciphertext


Encryption algorithm: performs encryption
Two inputs: a plaintext and a secret key
2

Symmetric Cipher Model

Deciphering or decryption: recovering plaintext from ciphertext Decryption algorithm: performs decryption
Two inputs: ciphertext and secret key

Secret key: same key used for encryption and decryption


Also referred to as a symmetric key

Cipher or cryptographic system : a scheme for encryption and decryption Cryptography: science of studying ciphers
Cryptanalysis: science of studying attacks against cryptographic systems Cryptology: cryptography + cryptanalysis

Ciphers
Symmetric cipher: same key used for encryption and decryption
Block cipher: encrypts a block of plaintext at a time (typically 64 or 128 bits) Stream cipher: encrypts data one bit or one byte at a time

Asymmetric cipher: different keys used for encryption and decryption


6

Symmetric Encryption
or conventional / secret-key / single-key sender and recipient share a common key all classical encryption algorithms are symmetric The only type of ciphers prior to the invention of asymmetric-key ciphers in 1970s by far most widely used
7

Cryptanalysis
Objective: to recover the plaintext of a ciphertext or, more typically, to recover the secret key. Kerkhoffs principle: the adversary knows all details about a cryptosystem except the secret key. Two general approaches:
brute-force attack non-brute-force attack (cryptanalytic attack)
8

Classical Ciphers
Plaintext is viewed as a sequence of elements (e.g., bits or characters) Substitution cipher: replacing each element of the plaintext with another element. Transposition (or permutation) cipher: rearranging the order of the elements of the plaintext. Product cipher: using multiple stages of substitutions and transpositions
9

Caesar Cipher
Earliest known substitution cipher Invented by Julius Caesar Each letter is replaced by the letter three positions further down the alphabet.
Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

Example: ohio state RKLR VWDWH

10

Monoalphabetic Substitution Cipher


Shuffle the letters and map each plaintext letter to a different random ciphertext letter:
Plain letters: abcdefghijklmnopqrstuvwxyz Cipher letters: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA What does a key look like?

11

Statistics for double & triple letters


In decreasing order of frequency Double letters: th he an in er re es on, Triple letters: the and ent ion tio for nde,
12

Playfair Cipher
Not even the large number of keys in a monoalphabetic cipher provides security.

One approach to improving security is to encrypt multiple letters at a time. The Playfair Cipher is the best known such cipher.

Invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair.
13

Playfair Key Matrix


Use a 5 x 5 matrix. Fill in letters of the key (w/o duplicates). Fill the rest of matrix with other letters. E.g., key = MONARCHY.
M C E L U O H F P V N Y G Q W A B I/J S X R D K T Z
14

You might also like