+ All Categories
Home > Documents > Classical Cryptography

Classical Cryptography

Date post: 22-Feb-2016
Category:
Upload: brier
View: 113 times
Download: 0 times
Share this document with a friend
Description:
Classical Cryptography. The Enigma Rotor machine. The Jefferson cylinder. Scytale. Hieroglyphics. Symmetric Cryptography. Uses a single key for both encryption and decryption The encryption and decryption algorithms are inverses of each other. - PowerPoint PPT Presentation
Popular Tags:
13
Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics
Transcript
Page 1: Classical Cryptography

Classical CryptographyThe Jefferson cylinder The Enigma Rotor machine

Scytale

Hieroglyphics

Page 2: Classical Cryptography

Symmetric Cryptography

• Uses a single key for both encryption and decryption

• The encryption and decryption algorithms are inverses of each other

Page 3: Classical Cryptography

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

Page 4: Classical Cryptography

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCE

Page 5: Classical Cryptography

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCEIKOB YT KJIB

Page 6: Classical Cryptography

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCEIKOB YT KJIB• GIVE TO INGE• HAVE TO ACHE• SECT IN EAST

Page 7: Classical Cryptography

Methods for decrypting a simple substitution cipher:

• Brute force attack– key space of the substitution cipher = 26! ≈ 288

• Letter frequency analysis– determine the frequency of every ciphertext letter– look at pairs , triples, or quadruples of ciphertext

symbols

Page 8: Classical Cryptography

Letter Frequency

The most common digrams (in descending order): th, he, in, en, nt, re, er, an, ti, es, on, at, se, nd, or, ar, al, te, co, de, to, raThe most common trigrams (in descending order): the, and, tha, ent, ing, ion, tio, for, nde, has, nce, edt, tis, oft, sth, men

Page 9: Classical Cryptography

Polyalphabetic Ciphers

• Encrypt multiple characters at a time• Relationship from plain to ciphertext is one-to-

many• Thwart statistical attacks

Page 10: Classical Cryptography

Polyalphabetic Ciphers

• Vigenère • Autokey• Playfair• Hill• One-time pad• Rotor• Enigma

Page 11: Classical Cryptography

Vigenère Cipher• Let m be a positive integer (the key

length)• P = C = K = Z26 x ... x Z26 = (Z26) m

• For k = (k1, ..., km):– ek(x1, ..., xm) = (x1 + k1 (mod 26), ..., xm

+ km (mod m))– dk(y1, ..., ym) = (y1 - k1 (mod 26), ..., ym -

km (mod m))

Page 12: Classical Cryptography

• AES• RSA

•The Future of Cryptography and Quantum Computing

Rivest, Shamir, and Adleman

Modern Cryptography

Page 13: Classical Cryptography

Average Time Required for Exhaustive Key Search


Recommended