Lecture 1
Lecture 1
SECURITY
Cryptography
Introduction
• Information security means protecting information and
information system from unauthorized access, use,
modification or destruction(damaged).
•
Cryptographic Objectives
• CIA == Confidentiality, Integrity, and Availability
• Confidentiality
– aims to prevent unauthorized reading of
information.
• Integrity
– detect unauthorized writing of information
• Availability
– Data is available in a timely manner when needed
Cryptography
• Cryptography or “secret codes” are a
fundamental information security tool.
• Cryptology The art and science of making
and breaking “secret codes”
• Cryptography making “secret codes”
key key
• The ciphertext is then read off by writing the top row first,
followed by the bottom row, to get
"DFNTEATALEEDHESWL".
Example-Encryption
• For the plaintext we used above, "defend the
east wall", with a key of 3, we get the encryption
process shown below.
Plain text:
"they are
attacking from
the north".
Columnar Transposition-Encryption
• A simple example for a transposition cipher is columnar
transposition cipher.
• write the message in a rectangle, row by row, and read the
message off, column by column.
• permute the order of the columns. The order of the columns
then becomes the key to the algorithm.
Columnar Transposition-decryption
• To decipher it, the recipient has to work out the
column lengths by dividing the message length by
the key length.
• Then, write the message out in columns again, then
re-order the columns by reforming the key word.
• Key: 4312567
• Ciphertext:
TTNA APTM TSUO AODW COIX KNLY PETZ
• Plaintext:
Example 1
• We first pick a keyword for our encryption. We write the
plaintext out in a grid where the number of columns is the
number of letters in the keyword. We then title each column
with the respective letter from the keyword. We take the
letters in the keyword in alphabetical order, and read down
the columns in this order. If a letter is repeated, we do the
one that appears first, then the next and so on.
• Example:
• encrypt the message "The tomato is a plant in the
nightshade family"
• keyword tomato
• Ciphertext: TINESAX / EOAHTFX / HTLTHEY / MAIIAIX /
TAPNGDL / OSTNHMX" (where the / tells you where a new
column starts).
• The final ciphertext is thus
• "TINES AXEOA HTFXH TLTHE YMAII AIXTA PNGDL OSTNH
MX".
Example 2
• decrypt the ciphertext "ARESA SXOST HEYLO
IIAIE XPENG DLLTA HTFAX TENHM WX" given
the keyword potato.
• There are 42 letters in the ciphertext, and the
keyword has six letters, so we need 42 ÷ 6 = 7
row
Example 2
Ciphertext: NADWTKCAATAT
Double Transposition Cipher
• For the double transposition, the key consists of the
size of the matrix and the row and column
permutations.
• For example, to decrypt pervious ciphertext is first
put into a 3 × 4 array.
• Then the columns are numbered as (4, 2, 1, 3) and
rearranged to (1, 2, 3, 4).
• Then the rows are numbered (3, 2, 1) and rearranged
into (1, 2, 3), as illustrated below
Double Transposition Cipher
𝟓 ×𝟑
Double Transposition Cipher
PROBLEM