Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Similar presentations


Presentation on theme: "Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable."— Presentation transcript:

1 Cryptography Introduction, continued

2 Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable to exhaustive-search attacks

3 The Vigenère cipher The key is now a string, not just a character To encrypt, shift each character in the plaintext by the amount dictated by the next character of the key – Wrap around in the key as needed Decryption just reverses the process tellhimaboutme cafecafecafeca veqpjiredozxoe tellhimaboutme cafecafecafeca veqpjiredozxoe

4 The Vigenère cipher Size of key space? – If keys are 14-character strings; then key space has size 26 14  2 66 – Brute-force search expensive/impossible Is the Vigenère cipher secure? (Believed secure for many years…)

5 Attacking the Vigenère cipher (Assume a 14-character key) Observation: every 14 th character is “encrypted” using the same shift Looking at every 14 th character is (almost) like looking at ciphertext encrypted with the shift cipher – Though brute-force attack from before doesn’t work… veqpjiredozxoeualpcmsdjqu iqndnossoscdcusoakjqmxpqr hyycjqoqqodhjcciowieii

6 Using plaintext letter frequencies

7 Attacking the Vigenère cipher Look at every 14 th character of the ciphertext, starting with the first Let  be the most common character appearing in this portion of the ciphertext Most likely, this character corresponds to the most common plaintext character (‘e’) – Guess the first character of the key is  - ’e’ Repeat for all other positions Better (more complicated) attacks also possible

8 Back to the drawing board… So far: “ad hoc” constructions; construct, break, repeat, … Can we prove that some encryption scheme is secure? First need to define what we mean by “secure” in the first place…


Download ppt "Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable."

Similar presentations


Ads by Google