0% found this document useful (0 votes)
17 views

3.1 Symmetric Key Cryptography

This document discusses symmetric-key cryptography and covers topics such as traditional ciphers, simple modern ciphers, modern round ciphers, and modes of operation for symmetric ciphers. Examples are provided to demonstrate encryption and decryption techniques for various ciphers.

Uploaded by

maruthi.rec
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

3.1 Symmetric Key Cryptography

This document discusses symmetric-key cryptography and covers topics such as traditional ciphers, simple modern ciphers, modern round ciphers, and modes of operation for symmetric ciphers. Examples are provided to demonstrate encryption and decryption techniques for various ciphers.

Uploaded by

maruthi.rec
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 38

DATA COMMUNICATION AND

1
NETWORKS/
30-1 INTRODUCTION

Let us introduce the issues involved in cryptography.


First, we need to define some terms; then we give some
taxonomies.

Topics discussed in this section:


Definitions
Two Categories

DATA COMMUNICATION AND


30.2 NETWORKS/
Figure 30.1 Cryptography components

DATA COMMUNICATION AND


30.3 NETWORKS/
Figure 30.2 Categories of cryptography

DATA COMMUNICATION AND


30.4 NETWORKS/
Figure 30.3 Symmetric-key cryptography

DATA COMMUNICATION AND


30.5 NETWORKS/
Note

In symmetric-key cryptography, the


same key is used by the sender
(for encryption)
and the receiver (for decryption).
The key is shared.

DATA COMMUNICATION AND


30.6 NETWORKS/
Figure 30.4 Asymmetric-key cryptography

DATA COMMUNICATION AND


30.7 NETWORKS/
Figure 30.5 Keys used in cryptography

DATA COMMUNICATION AND


30.8 NETWORKS/
Figure 30.6 Comparison between two categories of cryptography

DATA COMMUNICATION AND


30.9 NETWORKS/
30-2 SYMMETRIC-KEY CRYPTOGRAPHY

Symmetric-key cryptography started thousands of years


ago when people needed to exchange secrets (for
example, in a war). We still mainly use symmetric-key
cryptography in our network security.

Topics discussed in this section:


Traditional Ciphers
Simple Modern Ciphers
Modern Round Ciphers
Mode of Operation

DATA COMMUNICATION AND


30.10 NETWORKS/
Figure 30.7 Traditional ciphers

DATA COMMUNICATION AND


30.11 NETWORKS/
Note

A substitution cipher replaces one


symbol with another.

DATA COMMUNICATION AND


30.12 NETWORKS/
Example 30.1

The following shows a plaintext and its corresponding


ciphertext. Is the cipher monoalphabetic?

Solution
The cipher is probably monoalphabetic because both
occurrences of L’s are encrypted as O’s.

DATA COMMUNICATION AND


30.13 NETWORKS/
Example 30.2

The following shows a plaintext and its corresponding


ciphertext. Is the cipher monoalphabetic?

Solution
The cipher is not monoalphabetic because each
occurrence of L is encrypted by a different character.
The first L is encrypted as N; the second as Z.

DATA COMMUNICATION AND


30.14 NETWORKS/
Note

The shift cipher is sometimes referred to


as the Caesar cipher.

DATA COMMUNICATION AND


30.15 NETWORKS/
Example 30.3

Use the shift cipher with key = 15 to encrypt the message


“HELLO.”

Solution
We encrypt one character at a time. Each character is
shifted 15 characters down. Letter H is encrypted to W.
Letter E is encrypted to T. The first L is encrypted to A.
The second L is also encrypted to A. And O is encrypted
to D. The cipher text is WTAAD.

DATA COMMUNICATION AND


30.16 NETWORKS/
Example 30.4

Use the shift cipher with key = 15 to decrypt the message


“WTAAD.”

Solution
We decrypt one character at a time. Each character is
shifted 15 characters up. Letter W is decrypted to H.
Letter T is decrypted to E. The first A is decrypted to L.
The second A is decrypted to L. And, finally, D is
decrypted to O. The plaintext is HELLO.

DATA COMMUNICATION AND


30.17 NETWORKS/
Note

A transposition cipher reorders


(permutes) symbols in a block of
symbols.

DATA COMMUNICATION AND


30.18 NETWORKS/
Figure 30.8 Transposition cipher

DATA COMMUNICATION AND


30.19 NETWORKS/
Example 30.5

Encrypt the message “HELLO MY DEAR,” using the key


shown in Figure 30.8.

Solution
We first remove the spaces in the message. We then divide
the text into blocks of four characters. We add a bogus
character Z at the end of the third block. The result is
HELL OMYD EARZ. We create a three-block ciphertext
ELHLMDOYAZER.

DATA COMMUNICATION AND


30.20 NETWORKS/
Example 30.6

Using Example 30.5, decrypt the message


“ELHLMDOYAZER”.

Solution
The result is HELL OMYD EARZ. After removing the
bogus character and combining the characters, we get the
original message “HELLO MY DEAR.”

DATA COMMUNICATION AND


30.21 NETWORKS/
Figure 30.9 XOR cipher

DATA COMMUNICATION AND


30.22 NETWORKS/
Figure 30.10 Rotation cipher

DATA COMMUNICATION AND


30.23 NETWORKS/
Figure 30.11 S-box

DATA COMMUNICATION AND


30.24 NETWORKS/
Figure 30.12 P-boxes: straight, expansion, and compression

DATA COMMUNICATION AND


30.25 NETWORKS/
Figure 30.13 DES

DATA COMMUNICATION AND


30.26 NETWORKS/
Figure 30.14 One round in DES ciphers

DATA COMMUNICATION AND


30.27 NETWORKS/
Figure 30.15 DES function

DATA COMMUNICATION AND


30.28 NETWORKS/
Figure 30.16 Triple DES

DATA COMMUNICATION AND


30.29 NETWORKS/
Table 30.1 AES configuration

DATA COMMUNICATION AND


30.30 NETWORKS/
Note

AES has three different configurations


with respect to the number of rounds
and key size.

DATA COMMUNICATION AND


30.31 NETWORKS/
Figure 30.17 AES

DATA COMMUNICATION AND


30.32 NETWORKS/
Figure 30.18 Structure of each round

DATA COMMUNICATION AND


30.33 NETWORKS/
Figure 30.19 Modes of operation for block ciphers

DATA COMMUNICATION AND


30.34 NETWORKS/
Figure 30.20 ECB mode

DATA COMMUNICATION AND


30.35 NETWORKS/
Figure 30.21 CBC mode

DATA COMMUNICATION AND


30.36 NETWORKS/
Figure 30.22 CFB mode

DATA COMMUNICATION AND


30.37 NETWORKS/
Figure 30.23 OFB mode

DATA COMMUNICATION AND


30.38 NETWORKS/

You might also like