




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、95-752:4-1Encryption - I95-752:4-2Definitions Plaintext: easy to understand form(original message) Ciphertext: difficult to understand form Encryption: encoding (plaintext - ciphertext) Decryption: decoding(ciphertext - plaintext) Cryptology: study of encryption Cryptography: use of encryption Crypt
2、analysis: breaking encryption95-752:4-3Cryptanalysts Role Break single message Recognize patterns to create decryption method Find general weakness in encryption algorithm95-752:4-4Breakable Encryption Feasible given time and data Brute force usually impractical Estimates based on current technology
3、 Just because the underlying scheme is based on a hard problem doesnt mean that the cryptanalyst will attempt to solve it that way95-752:4-5Cryptanalysts tools Letter frequency data Prefix/suffix lists Letter pair/triple lists Common pattern lists95-752:4-6Encryption Algorithm Transformation:C=E(P)P
4、=D(C)P=D(E(P) Keyed adds security even if algorithm is knownSymmetric: C=E(k,P) P=D(k,C)Asymmetric: C=E(k1,P) P=D(k2,C)95-752:4-7Character Representation Enumeration cyclic Y+3=B (24+3=1 with wrapping) Modulus Arithmetic 0 mod 26 = 0 1 mod 26 = 1 26 mod 26 = 0 27 mod 26 = 1A B C D E X Y ZA B C01234
5、23 24 25 01295-752:4-8Caesar Cipher Julius Caesar Gallic Wars Shift of three characters P= “PROFESSIONAL COURTESY”C=“SURIHVVLRQDO GRXUWHVB” Easy to use in the field Pattern is easy to spot and breakABCDEFGHIJKLMNOPQRSTUVWXYZDEFGH IJKLMNOPQRSTUVWXYZABC95-752:4-9Cryptanalysis of Caesar Cipher Obvious
6、break between words Double letters easy to spot Repeating letter patterns Small words easy to peg C=“WKLV LV WRR HDVB”THIS IS TOO _S_ small words THIS IS TOO EASY spot shift of 3 95-752:4-10Keyed Monoalphabetic Ciphers Key Permutation (key has no repeating letters) Multiplicative Modulus (key is mul
7、tiplier) f(i) = (3*i) mod 26 f(K) = 3*10 mod 26 = 4 = EABCDEFGHIJKLMNOPQRSTUVWXYZKEYABCDFGHIJLMNO PQRSTUVW XZABCDEFGHIJKLMNOPQRSTUVWXYZADGJMPSVYBEHKNQTWZCFILORUX95-752:4-11Monoalphabetic Ciphers Can be done by direct table lookup (easy in field) Time to encrypt/decrypt varies directly with length Be
8、trayed by letter frequencies95-752:4-12Example Ciphertext:HQFUBSWLRQLVDPHDQVRIDWWDLWLWJVHFXUHFRPSXWDWLRQRYHULQVHFXUHFKDQQHOVEBXVLQJHQFUBSWLRQZHGLVXLVHWHKPHVVDJH Plaintext:ENCRYPTIONISAMEANSOFATTAINGSECURECOMPUTATIONOVERINSECURECHANNELSBYUSINGENCRYPTIONWEDISGUISETHEMESSAGE95-752:4-13Letter Frequencie
9、s English vowel frequencies Ciphertext frequencies (104 letters)VowelAEIOUpercent7.49 14.0 6.67 7.37 3.0VowelAEIOUpercent00.96 0.96 0.96 4.81LetterHLVQWpercent13.5 11.5 9.62 9.62 8.6595-752:4-14Cryptoquote ZJ ZJZON CZYYZQP VKQVYK LDN D JQQYZLRORZPE, ZP ZL LOZYY D JQQYZLR ORZPE. - DPDOQYK JADPIKSept
10、11, 2003 Pittsburgh Tribune-Review95-752:4-15Security of Monoalphabetic Ciphers Are they secure? 26! Possible ciphers Modern computers 10 years to brute force NO! In long message letter frequencies betray text95-752:4-16Meaningful ObservationsAn encryption based on a hard problem is not secure just
11、because of the difficulty of the problemAn encryption algorithm must be regular- this is its weaknessA security measure must be strong enough to keep out the attacker only for the life of the data95-752:4-17Polyalphabetic Ciphers Flatten frequency distributions Conceal letter pairs Conceal prefixes/
12、suffixes Example: (using multiplicative modulus)Odd positions use: f(i)=(3*i) mod 26Even positions use: f(i)=(5*i)+13) mod 2695-752:4-18Vigenere Tableaux95-752:4-19Using Vigenere TableauxOne method:Choose a keyBreak text into groups of five charactersWrite key in repeating fashionUse letter of key t
13、o establish columnUse letter of plaintext to establish rowEncrypt by using intercept of row and column1.Decrypt by finding row with ciphertext in column95-752:4-20Vigenere Example Enciphering “Tale of Two Cities” using Key of “DICKENS”95-752:4-21Cryptanalysis of Polyalphabetic Ciphers Appears to be
14、more secure More complex, but not immune from breaking Two tools: Kasiski Method Index of coincidence95-752:4-22Repeated PatternsEnglish has regularities (letters, letter groups, words) that repeatObservations:If code uses n alphabets in cyclic rotation, and if a particular letter sequence appears k
15、 times in the plaintext, it will be encoded approximately k/n times from the same alphabetIf letter sequence is encoded the same way twice, key must have gone through a whole number of rotations and be back at the same point1.Distance between repeats is multiple of key length95-752:4-23Kasiski Metho
16、dIdentify repeated patterns of three or more lettersJot down starting position of each instanceCompute difference between starting pointsDetermine all factors of each differenceKey length is one of these factors95-752:4-24Example for Kasiski Method95-752:4-25Example of Kasiski MethodObserve “itwasth
17、e” is encrypted with the key “nsdicken” three timesStart DistanceFactors-63 (83-20)3,7,9,21,63 21(104-83)3,7,2120 length(“dickens”)=795-752:4-26Index of Coincidence Measure of variance between frequencies in distribution Divide message into pieces enciphered with same alphabet Measure variance of fr
18、equencies in distribution If measure approximates English alphabet, guess of number of alphabets is supportedAlphabets123510largeMeasure.068 .052 .047 .043 .042 .03895-752:4-27Perfect Cipher Flatten distributions to 0.038 Very large number of alphabets one time pad Large non-repeating keys on a pad
19、Each different, each used once and discarded Problems: Printing, distribution, storage95-752:4-28Use long nonrepeating sequence of numbers combined with plaintextCiphertext does not give away keyMethodUse binary of PXor binary of random number1. Produces binary cipher textVernam Cipher1 0 1 1 0 11 0
20、 1 1 1 10 0 0 0 1 095-752:4-29Cracking Random Numbers Computers use algorithms to create random numbers Multiplicative modulusri+1 = (a*ri+b) mod na, b, n carefully chosen; ri is initially seed Advantage: can reproduce series Disadvantage: long enough series may reveal seed, a, b, n95-752:4-30Known-
21、Text Attacks Messages dont have arbitrary content Memo, Subject, To, From, Date, Senders name, Receivers name Organizational terms May also have messages where entire text is known By comparing ciphertext with known plaintext, can find patterns in encryption95-752:4-31Transposition Ciphers Dont subs
22、titute characters, permute them Spartans used rods of fixed diameter and strips of parchment Write across the wrappings Read ciphertext along the wrappings (works great with #2 pencils) In modern terms, use a matrix95-752:4-32Columnar Transposition Ciphers Key is number of columns in matrix, order o
23、f columns Ciphertext: TSHAI HAORT IGWTI SEARO ITCAN SOONW ASLSO MHUPR EOMOK SWNSSTHISISAMESSAGETOSHOWHOWACOLUMNARTRANSPOSITIONWORKS95-752:4-33Analysis of Columnar Transposition Simple, but effective Work per character is constant, total proportional to message length Requires whole message in encryp
24、tion buffer Letter frequency looks like monoalphabetic cipher Use digram and trigram frequency tables95-752:4-34Breaking Columnar Transposition Problem: Which columns areadjacent Break into strips and look for digrams & trigrams95-752:4-35Double Transpositions Use two columnar transpositions one
25、 after the other, different numbers of columns First transposition breaks up doubled letters Second transposition breaks up short strings and reinforces first transposition Still monoalphabetic letter frequency More difficult to decrypt95-752:4-36Combination Ciphers Mix substitution and permutation
26、ciphers Substitution for confusion of information Permutation for diffusion of information Done right, each supports the other All modern ciphers are combinations95-752:4-37Answer to Cryptoquote IF FIFTY MILLIONPEOPLE SAY A FOOLISHTHING, IT IS STILL A FOOLISH THING.- ANATOLE FRANZE95-752:4-38Automat
27、ed Ciphers Stream Ciphers: encrypt data as it comes fast low error propagation information not diffused susceptible to modification and insertion Block Ciphers: encrypt data in fixed-size blocks Slower Larger error propagation Information may be diffused harder to modify or insert into blocks95-752:
28、4-39Data Encryption Standards 1972 NBS issues call for proposals 1974 IBM responds with “l(fā)ucifer” (DEA) 1976 DES adopted 1986 DES re-certification denied 1997 NIST issues call for AES proposals 1999 5 submissions selected as finalists 2001 Rijndahl algorithm selected95-752:4-40DES Overview Combinati
29、on cipher 16 rounds of combined substitution and transposition Plaintext encrypted in 64-bit blocks Keys are 56 bits long (plus 8 error bits) Uses only arithmetic and logical operations on 64-bit numbers95-752:4-41DES ModesAll modes: same key and algorithm encrypts and decrypts ECB Electronic code b
30、ook / Native mode CBC Cipher-block chaining OFB Output feedback CFB Cipher feedback95-752:4-42DES Algorithms Crypting algorithm method of encryption or decryption Key scheduling algorithm method of generating pieces of key needed for each round of crypting algorithm Parts: Permutation boxes (p-boxes
31、) Substitution boxes (s-boxes) exclusive OR (x-or)95-752:4-43Permutation Boxes Used as invertible initial and final disguise of information Fixed permutations at binary level95-752:4-44Substitution Boxes Confusion and non-linearity Interpret bits as numbers, pull replacement from table 6-bit input,
32、4-bit output first and last bit pick row of table middle four bits pick column of table elements of table are 4-bit numbers Not invertible Rationale for values is still secret95-752:4-45S-Box Values95-752:4-46DES CycleCrypting algorithm feeds 32 bits to cycleSubject block to Permutation Expansion, c
33、onverting 32 bits to 48 bitsXOR expanded block with 48 bits from key to make pre-S blockApply S boxBreak pre-S block into 8 six-bit chunksProcess each chunk through s-box in parallelResult is 32-bit post-S blockpost-S fed into final permutation to produce 32-bit cycle result95-752:4-47Crypting Algor
34、ithmInput 64 bits of plaintextRearrange by initial permutation p-boxSplit blocktwo 32-bit halves (left and right)save copy of right half as R0leave left half aloneFeed right to DES CycleXOR left with cycle result to be new rightR0 becomes new leftRepeat 3-6 sixteen timesSubmit final block to inverse of initial permutation95-752:4-48Key Scheduling Algorithm Combination of shifts and permutation Shifts are determined from table Permutation selects 48 of 56 bits Produces 16 different slices from key Slices are normally computed before crypting95-752:4-49DES Weaknesses Brute force attacks some
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年HDTV彩色顯像管及其材料和部件合作協(xié)議書
- 佛山國(guó)五道路施工方案
- 2024-2025學(xué)年下學(xué)期高一語文第四單元B卷
- 科學(xué)合理施用肥料對(duì)農(nóng)產(chǎn)品質(zhì)量的影響及高效解決措施研究
- 專項(xiàng)施工方案評(píng)審
- 智研咨詢發(fā)布:中國(guó)海纜敷設(shè)船行業(yè)市場(chǎng)發(fā)展環(huán)境及前景研究報(bào)告
- 新未來大學(xué)英語 視聽說教程1(智慧版) 聽力腳本 Unit 6
- 新課標(biāo)下高中生物生活化教學(xué)策略研究
- 江西省贛州市2024-2025學(xué)年高一上學(xué)期1月期末考試政治試題2
- 高考物理一輪復(fù)習(xí)課時(shí)跟蹤檢測(cè)(三十一)磁場(chǎng)的描述磁場(chǎng)對(duì)電流的作用(重點(diǎn)高中)
- 新版(七步法案例)PFMEA
- 臨床護(hù)理重點(diǎn)??平ㄔO(shè)項(xiàng)目評(píng)審標(biāo)準(zhǔn)
- 新蘇教版科學(xué)五年級(jí)下冊(cè)全套教學(xué)課件
- 審計(jì)部組織架構(gòu)及崗位設(shè)置
- 流行性乙型腦炎PPT課件
- 深圳市軌道交通線網(wǎng)規(guī)劃(2016_2035)(草案)
- 400V電纜分支箱生產(chǎn)實(shí)用工藝流程
- 四十二式太極劍劍譜
- 完整解讀2021年《建設(shè)工程抗震管理?xiàng)l例》PPT教學(xué)講座課件
- 新版小學(xué)英語PEP四年級(jí)下冊(cè)教材分析(課堂PPT)
- 食用植物油生產(chǎn)許可證審查細(xì)則.doc
評(píng)論
0/150
提交評(píng)論