CS283 Lecture 1 - Part 2 - Classical Ciphers - 20090901

CS283 Lecture 1 - Part 2 - Classical Ciphers - 20090901 -...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCI 172/283 Fall 2009 GWU Lecture 1 – Part 2 Classical Ciphers
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Classical Ciphers Terminology Monoalphabetic ciphers (Shift, Affine) Vigenere Cipher Permutation Cipher; Substitution Cipher and one-time pad
Background image of page 2
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 3 Some terminology A sender encrypts a plaintext message to get ciphertext which is sent to the receiver who decrypts it to obtain the plaintext. For the application of secret communication between two parties, it should not be possible for an eavesdropper to decrypt the message. i.e d should be easy for the (legitimate) receiver, not for anyone else. e (P) = C d (C) = P d ( e (P)) = P d ° e = I e one-to-one (mathematically) From Schneier
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 4 Some terminology - contd. Cipher : is the cryptographical algorithm /mathematical function used to encrypt A restricted cipher is one whose security depends on keeping the algorithm secret. Security through obscurity is generally considered inadequate because doing so does not provide a systematic way of simulated attack/vulnerability analysis by external experts - which typically improves the security of a cryptosystem. From Schneier:
Background image of page 4
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 5 Some terminology - contd. A key is used as a parameter in some ciphers. The security of ciphers that use keys is based on keeping the key(s), and not the cipher itself, secret. e K1 (P) = C; d K2 (C) = P Keyspace : set of all possible keys. Cryptosystem : algorithm + all ciphertexts + all plaintexts + all keys From Schneier:
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 6 Formal definition: cryptosystem A cryptosystem consists of: P set of all plaintexts C set of all ciphertexts K set of all keys E set of encryption rules, e K : P C D set of decryption rules d K : C P d K e K (x) = x d K and e K invertible functions and inverses of each other From Stinson
Background image of page 6
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 7 Typical Scenario Alice and Bob randomly choose a key, K when they are unobserved or communicating on a secure channel If Alice wants to send Bob a message, x 1 x 2 x 3 x 4 …x n Alice sends: y 1 y 2 y 3 y 4 …y n Where y i = e K (x i ) x i is a symbol from the alphabet
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 8 Shift cipher on the English alphabet A Classical Substitution Cipher Symbols (aka alphabet) A B C D E F G H I J K L M N 0 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25 Encryption Key Key = k (add 10, so A goes to 10, i.e. k)
Background image of page 8
GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 01 - Rev 20090901 9 Shift cipher on English alphabet Classical Substitution Cipher (Cont’d) Encryption example (k = 10) Plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Ciphertext K l m n o p q r s t u v w x y z a b c d e f g h i j
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 81

CS283 Lecture 1 - Part 2 - Classical Ciphers - 20090901 -...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online