Computer Security As
Computer Security As
Plaintext: This is the original intelligible message or data that is fed into the
algorithm as input.
Encryption algorithm: The encryption algorithm performs various substitutions
and transformations on the plaintext.
Secret Key: The secret key is also input to the encryption algorithm. The key is
the value independent of the plaintext. The algorithm will produce a different output
depending on the specific key being used at the time. The exact substitutions and
transformations performed by the algorithm depend on the key.
Cipher text: This is the scrambled message produced as output. It depends on
the plaintext and the key.
Decryption algorithm: This is essentially the encryption algorithm in reverse. It
takes the cipher text and the secret key and produces the original plaintext.
2. what are the two basic functions used in encryption algorithms?
There are two general approaches to attacking a symmetric encryption scheme. The first attack
is known as cryptanalysis. Cryptanalytic attacks rely on the nature of the algorithm plus
perhaps some knowledge of the general characteristics of the plaintext or even some sample
plaintext-ciphertext pairs. This type of attack exploits the characteristics of the algorithm to
attempt to deduce a specific plaintext or to deduce the key being used. If the attack succeeds in
deducing the key, the effect is catastrophic: All future and past messages encrypted with that
key are compromised.
The second method, known as the brute-force attack, is to try every possible key on a piece of
ciphertext until an intelligible translation into plaintext is obtained. On average, half of all
possible keys must be tried to achieve success.
3.how many keys are reqired for two people to bcommunicate via a cipher?
A block cipher processes the plaintext input in fixed-size blocks and produces a block of
ciphertext of equal size for each plaintext block. The algorithm processes longer plaintext
amounts as a series of fixed-size blocks. Typically, symmetric encryption is applied to a unit of
data larger than a single 64-bit or 128-bit block. Plaintext sources must be broken up into a
series of fixed-length block for encryption by a symmetric block cipher. The simplest approach
to multiple-block encryption is known as electronic codebook (ECB) mode, in which plaintext is
handled b bits at a time and each block of plaintext is encrypted using the same key. Typically
b=64 or b=128. Figure 2.3a here shows the ECB mode. A plaintext of length nb is divided into n
b-bit blocks. Each block is encrypted using the same algorithm and the same encryption key, to
produce a sequence of n b-bit blocks of ciphertext. To increase the security of symmetric block
encryption for large sequences of data, a number of alternative techniques have been
developed, called modes of operation (see chapter 19).
A stream cipher processes the input elements continuously, producing output one element at a
time. Although block ciphers are far more common, there are certain applications in which a
stream cipher is more appropriate. A typical stream cipher encrypts plaintext one byte at a
time, as shown in Figure 2.3b. The output of a pseudorandom number generator (the
keystream), is combined one byte at a time with the plaintext stream using the bitwise
exclusive-OR (XOR) operation. With a properly designed pseudorandom number generator, a
stream cipher can be as secure as block cipher of comparable key length.The primary advantage
of a stream cipher is that stream ciphers are almost always faster and use far less code than do
block ciphers.The advantage of a block cipher is that you can reuse keys.
6.list and briefly define types of cryptanalytic attacks based on what is known to the attacker?.
M F H I/J K
U N O P Q
Z V W X Y
E L A R G
D S T B C
Encrypt this message:
10.encrypt the message “ meet me at the usual place at ten rather than eight oclock” using the
hill cipher with the key(9 4 5,4).show your calculations and the result.
11. use Caesar cipher to encrypt the message “meet me after class”using the letter standing
4places further down the alphabet.