Cryptography and Network Security Chapter 2
Cryptography and Network Security Chapter 2
Security Chapter 2
Outline
• We will consider:
– classical cipher techniques and terminology
– monoalphabetic substitution ciphers
– cryptanalysis using letter frequencies
– Playfair cipher
– polyalphabetic ciphers
– transposition ciphers
– product ciphers and rotor machines
– steganography
Chapter 2 – Classical Encryption Techniques
Symmetric Encryption
• or conventional / private-key / single-key
• sender and recipient share a common key
• all classical encryption algorithms are
private-key
• was only type prior to invention of public-
key in 1970’s
• and by far most widely used
Some Basic Terminology
• plaintext - original message
• ciphertext - coded message
• cipher - algorithm for transforming plaintext to ciphertext
• key - info used in cipher known only to sender/receiver
• encipher (encrypt) - converting plaintext to ciphertext
• decipher (decrypt) - recovering ciphertext from plaintext
• cryptography - study of encryption principles/methods
• cryptanalysis (codebreaking) - study of principles/
methods of deciphering ciphertext without knowing key
• cryptology - field of both cryptography and
cryptanalysis
Symmetric Cipher Model
Requirements
• ciphertext only
– only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
• known plaintext
– attacker knows/suspects plaintext & ciphertext
• chosen plaintext
– attacker selects plaintext and gets ciphertext
• chosen ciphertext
– attacker selects ciphertext and gets plaintext
• chosen text
– attacker selects plaintext or ciphertext to en/decrypt
More Definitions
•unconditional security
•– no matter how much computer power or time is
available, the cipher cannot be broken … since
the ciphertext provides insufficient information
to uniquely determine the corresponding plaintext
•computational security
•given limited computing resources (eg. time
needed for calculations is greater than age of
universe), the cipher cannot be broken
Classical Substitution Ciphers