Presentation is loading. Please wait.

Presentation is loading. Please wait.

Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.

Similar presentations


Presentation on theme: "Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT."— Presentation transcript:

1 Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT

2 Agenda of Classical Crypto Terms related to Crypto Simple Substitution Cipher Double Transposition Cipher One-Time Pad Codebook Cipher Conclusion

3 Terms related to Crypto Cryptology: art and science of making and breaking “secret codes.” Cryptography: making of “secret codes.” Cryptanalysis: breaking of “secret codes.” Crypto is a synonym for any or all of the above (and more).

4 Simple Substitution Cipher Ciphertext: substitute the letter of the alphabet (n) places ahead of the Plaintext. Plaintext: substitute the letter of the alphabet (n) places backward of the Ciphertext. n {0, 1, 2,…….,25} (n) acts as Key Ex: if (n=3) then

5 Simple Substitution Cipher Attack – Exhaustive key search? – A Long keys, Max = 26! ≈ 2 88 possible keys – It would take 8900 millennia to exhaust Key Size (bits) Number of Alternative Keys Time required at 10 6 Decryption/µs 322 32 = 4.3 x 10 9 2.15 milliseconds 562 56 = 7.2 x 10 16 10 hours 1282 128 = 3.4 x 10 38 5.4 x 10 18 years 1682 168 = 3.7 x 10 50 5.9 x 10 30 years

6 Another possible attack Compare with English letters frequency counts Ex: “E” is the most common Same, try and guess, but more clever!

7

8 Double Transposition Cipher Transpose 2 times Thwart learning from statistical information

9 One Time Pad (OTP) OTP strengths: – not easy to break if key is genuinely random – the cipher text is likewise completely random and so cannot be broken – not only function with 26 alphabets, but also 256 ASCII characters or other set. – also use XOR function OTP weakness: – Key need to have same length as Plaintext so data to send is double making the traffic of network become slow – Key can be intercepted when sending – Difficulty of creating volumes of genuinely random numbers

10 One Time Pad (OTP) Spy named Alice want to encrypt the plaintext message Spy Bob receives Alice’s message, he decrypts it using the same key.

11 OTP with same key In case messages are in depth Attacker recognizes pattern of ciphertext Try to guess Plaintext (Say P1) ! Then figure out key (Say K) Then use K to decrypt other chipertext

12 OTP with same key

13

14 Codebook Cipher A kind of substitution cipher By words or phrases Used by Germany during WW1

15 Codebook Cipher

16 Conclusion Weak : – Simple substitute cipher: attacker can guess in ciphertext message – Codebook cipher Strong : – One time pad: is provably secure cryptosystem Attacker can’t guess or break code Random key never reused – Double Transposition Cipher Employed by modern block cipher. Which cipher to choose? – Secure – Large enough key space


Download ppt "Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT."

Similar presentations


Ads by Google