Cryptography Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Sender and receiver both have obtained copies of secret keys in a secure fashion, which of the following type of encryption is in use?

  • Conventional encryption (correct)
  • Secret sharing encryption
  • Public key encryption
  • Asymmetric encryption

What is the primary goal of cryptanalysis?

  • To encrypt messages more efficiently
  • To protect plaintext from being accessed
  • To devise new cryptographic algorithms
  • To decipher messages without knowing the key (correct)

In a brute-force attack, what is the average number of keys an attacker needs to try to achieve success?

  • One-fourth of all possible keys
  • All possible keys
  • Half of all possible keys (correct)
  • Depends on the strength of the algorithm

Under what condition is an encryption scheme considered computationally secure?

<p>When the cost of breaking the cipher exceeds the value of the encrypted information. (D)</p>
Signup and view all the answers

What is the core principle of a substitution technique in encryption?

<p>Replacing plaintext letters with other letters or symbols. (B)</p>
Signup and view all the answers

In the Caesar cipher, if the shift value is 3, how would the letter 'A' be encrypted?

<p>D (B)</p>
Signup and view all the answers

What is the key concept behind cryptanalysis of the Caesar Cipher?

<p>Trying every possible shift value (D)</p>
Signup and view all the answers

In a mono-alphabetic substitution cipher, what is the key characteristic?

<p>Each symbol in the plaintext is mapped to a fixed symbol in the ciphertext. (B)</p>
Signup and view all the answers

What makes a monoalphabetic cipher vulnerable to cryptanalysis?

<p>The frequency distribution of letters in the ciphertext reflects the original alphabet (D)</p>
Signup and view all the answers

Which of the following letters is the most common in the English language, which can thus be useful in cryptanalysis?

<p>E (C)</p>
Signup and view all the answers

What is a digram as it relates to cryptology?

<p>A two-letter combination (B)</p>
Signup and view all the answers

Which of the following best describes a Polyalphabetic Cipher?

<p>A cipher in which the cipher alphabet may be different at different places during the encryption process. (B)</p>
Signup and view all the answers

If two letters fall in the same column in a Playfair cipher, how are they encrypted?

<p>They are replaced with the letters below them. (D)</p>
Signup and view all the answers

What is a key matrix (5x5) based on in Playfair Cipher?

<p>A keyword (C)</p>
Signup and view all the answers

The Keyword is 'Tutorial' what are the first 3x3 letters of the Playfair matrix?

<p>ALSB (D)</p>
Signup and view all the answers

Flashcards

Plaintext

An original message before encryption.

Ciphertext

The coded message after encryption occurs.

Enciphering / Encryption

The process of converting plaintext to ciphertext.

Deciphering / Decryption

Restoring ciphertext back to its original plaintext form.

Signup and view all the flashcards

Cryptography

The study of encryption schemes.

Signup and view all the flashcards

Cryptographic system / cipher

A specific algorithm or set of rules for encryption.

Signup and view all the flashcards

Cryptanalysis

Techniques for deciphering messages without knowing all the encryption details.

Signup and view all the flashcards

Cryptology

The combined areas of cryptography and cryptanalysis.

Signup and view all the flashcards

Symmetric Encryption

Uses the same key for encryption and decryption.

Signup and view all the flashcards

Brute-Force Attack

An attack that tries every possible key to decrypt a message.

Signup and view all the flashcards

Unconditionally Secure

Impossible to decrypt due to lack of information, regardless of time/resources.

Signup and view all the flashcards

Computationally Secure

Secure if the cost/time to break it exceeds the encrypted information's value/lifetime.

Signup and view all the flashcards

Substitution Technique

Letters in plaintext are replaced by other letters or symbols.

Signup and view all the flashcards

Caesar Cipher

Each letter is replaced by the 3rd letter to its right.

Signup and view all the flashcards

Mono-alphabetic Cipher

Each symbol in plaintext is mapped randomly to a fixed symbol in ciphertext.

Signup and view all the flashcards

Study Notes

  • Plaintext refers to an original message.
  • Ciphertext refers to the coded message.
  • Enciphering/encryption is the process of converting from plaintext to ciphertext.
  • Deciphering/decryption is restoring the plaintext from the ciphertext.
  • Cryptography is the area of study of the many schemes used for encryption.
  • A cryptographic system/cipher is a scheme.
  • Cryptanalysis involves techniques used for deciphering a message without any knowledge of the enciphering details.
  • Cryptology includes the areas of cryptography and cryptanalysis.
  • Cryptographic systems are characterized along three independent axes: the type of encryption techniques used, the number of keys used, and how the plaintext is processed.

Encryption Techniques

  • Substitution techniques map plaintext elements (bits, letters, or groups) into other elements.
  • Transposition rearranges elements in the plaintext.
  • Product systems involve multiple stages of substitutions and transpositions.

Number of Keys Used

  • Symmetric, single-key, or secret-key encryption involves one key.
  • Asymmetric, key-pair, or public-key encryption uses two keys.

Processing Method

  • Block ciphers process one block of input elements at a time.
  • Stream ciphers process one input element at a time.
  • Secure use of conventional (symmetric) encryption has two requirements: a strong encryption algorithm and secure exchange and safeguarding of the secret key.
  • In cryptanalysis and brute-force attacks, there are two types of attacks on conventional encryption schemes.
  • One attack relies on the nature of the algorithm and general characteristics of the plaintext.
  • The other exploits the algorithm's characteristics to deduce a specific plaintext or the key being used, while in brute-force attack the attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
  • Unconditionally secure encryption means that no matter how much time an opponent has, it's impossible to decrypt the ciphertext.
  • Computationally secure encryption is achieved if the cost of breaking the cipher exceeds the value of the encrypted information or if the time required exceeds the useful lifetime of the information.

Substitution Technique

  • Involves replacing plaintext letters with other letters, numbers, or symbols.
  • If the plaintext is viewed as a sequence of bits, substitution involves replacing bit patterns with ciphertext bit patterns.

Caesar Cipher

  • A substitution technique that replaces each letter by the 3rd letter to the right, wrapping around the alphabet so that the letter following Z is A.
  • Encryption formula is C = E(p) = (p + k) mod (26), where C is the cipher, E is encryption, p is the number of the letter, and k is the shift (any amount from 1 to 25).
  • Decryption formula is P = D(C) = (C - k) mod (26).
  • For added security with telegraph messages, cryptographers would omit word length and punctuation and block messages into four/five letter groups.
  • To decrypt a Caesar cipher by brute force, the ciphertext is written with shifts, and the result column is scanned for readable text, from which the key is deducted.

Mono-alphabetic Cipher

  • Each symbol in the plain text is randomly mapped to a fixed symbol in cipher text using a fixed key of 26 letters.
  • The cipher line can be any permutation (shuffling) of the 26 alphabet characters, for a total of 26! permutations.
  • The user and sender agree on a key, and the same letter will be replaced by the same cipher.
  • If the text is longer than the key, the key is continued with the rest of the alphabet in order.

Mono-alphabetic Cipher VS Caesar Cipher

  • Mono-alphabetic uses has shifting, caesar shift uses shifting
  • Mono-alphabetic uses key difference plain text and the cipher is not the same
  • Mono-alphabetic has a key Size of 26!, Caesar shift has 25
  • Mono-alphabetic is more powerful than Caesar Cipher
  • Mono-alphabetic Frequency Analysis is used to cryptanalysis, Caesar Cipher Brute Force will find the key easily
  • Natural English text has a very distinct distribution allowing for codes to be deciphered.
  • Human languages are redundant; E is the most common letter, followed by T, R, N, I, O, A, S; other letters are rare; and tables exist for letter frequencies.

Cryptanalysis

  • It is best to calculate the frequency distribution of the letters in the cipher text and compare to English frequencies.
  • Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.
  • This can be overcome with providing multiple substitutes (homophones) for a single letter
  • Digrams, or two letter combinations, and trigrams three letter combinations like the and th, can influence deciphering

Playfair Cipher

  • A multiple-letter encryption cipher that treats digrams (2 letters) in the plaintext as single units and translates these units into cipher text digrams.
  • Stages included are: Creating Playfair Key Matrix, Preparing Plain Text, and Applying Playfair rules to map every 2 letters to its corresponding cipher ones.
  • To encode a message, the sender and receiver select a particular key and create a 5x5 matrix based on a keyword, filling in letters of keyword lacking duplicates filling remaining slots with the remaining alphabet letters.
  • Preparing plain text involves breaking text into two-letter chunks(LX for single letter word), repeated letters in the same chunk being separated by X (balxloon), and an extra X to fill the last letter when the number of letter os odd.

Playfair Encryption Rules:

  • If both letters fall in the same row, replace each with the letter to the right (wrapping back to start from the end).
  • If both letters fall in the same column, replace each with the letter below it (wrapping to top from bottom).
  • Otherwise, form a rectangle with the two letters and take the letters on the horizontal opposite corner of the rectangle.
  • Security is much improved over monoalphabetic ciphers with need to analyze a 676 entry frequency.
  • It can be broken, given a few hundred letters and still has much of plaintext structure

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser