Top Banner

of 22

Ch2 Classical Cryptography

Jul 05, 2018

Download

Documents

Ahmad Sardouk
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/16/2019 Ch2 Classical Cryptography

    1/22

    Classical Cryptography 

  • 8/16/2019 Ch2 Classical Cryptography

    2/22

    2

  • 8/16/2019 Ch2 Classical Cryptography

    3/22

    3

  • 8/16/2019 Ch2 Classical Cryptography

    4/22

    4

  • 8/16/2019 Ch2 Classical Cryptography

    5/22

    5

  • 8/16/2019 Ch2 Classical Cryptography

    6/22

    6

  • 8/16/2019 Ch2 Classical Cryptography

    7/22

    7

  • 8/16/2019 Ch2 Classical Cryptography

    8/22

    8

  • 8/16/2019 Ch2 Classical Cryptography

    9/22

    9

  • 8/16/2019 Ch2 Classical Cryptography

    10/22

     Transposition Ciphers

    Also called permutation ciphers.

    Shuffle the plaintext, without altering the actual letters

    used.

    Example: Row Transposition Ciphers

    10

  • 8/16/2019 Ch2 Classical Cryptography

    11/22

    Row Transposition Ciphers

    Plaintext is written row by row in a rectangle.

    Ciphertext: write out the columns in an order

    specified by a key.

    Key: 3 4 2 1 5 6 7

    Plaintext:

    Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ

    a t   t   a   c k p

    o s   t   p   o n e

    d u   n   t   i l t

    w o   a   m x y z

    11

  • 8/16/2019 Ch2 Classical Cryptography

    12/22

     Transposition Decrypt Example

    12

    Cipher Text A L E S T Y E C R O O W A W O A S N R I D N I X F L T P I

    Z

    Key Column = 5

    Key Line = 35124

    A R A F E

    W I L L CO D E T R

    A N S P O

    S I T I O

    N X Y Z W

    A R A F E W I L L C O D E T R A N S P O S I T I O N X Y Z W

  • 8/16/2019 Ch2 Classical Cryptography

    13/22

    13

  • 8/16/2019 Ch2 Classical Cryptography

    14/22

    Affine Cypher

    14

    where a-1

    is the modular multiplicative inverse of amodulo m. I.e., it satisfies the equation

    1 = a a-1 mod m.

    The multiplicative inverse of a only exists if a and m are

    coprime.

  • 8/16/2019 Ch2 Classical Cryptography

    15/22

    15

  • 8/16/2019 Ch2 Classical Cryptography

    16/22

    Affine Cipher

    16

    Assume K=(5,8)

  • 8/16/2019 Ch2 Classical Cryptography

    17/22

    Affine Cipher -Encryption

    17

  • 8/16/2019 Ch2 Classical Cryptography

    18/22

    Affine Cipher - Decryption

    18

  • 8/16/2019 Ch2 Classical Cryptography

    19/22

    Affine Cipher - Example

    19

    Decipher HPCCXAQ if the encipherment function is

    E(x) = (5x+ 8)MOD26

    Solution: We begin by finding the decipherment function,

    Since 5x≡1 (mod26) is solved with x≡ 21 (mod26) we see 5−1 (mod26) = 21

    Therefore, E−1(y) = 21(y−8)MOD26

  • 8/16/2019 Ch2 Classical Cryptography

    20/22

    20

  • 8/16/2019 Ch2 Classical Cryptography

    21/22

    21

  • 8/16/2019 Ch2 Classical Cryptography

    22/22

    22