Top Banner
Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared by Yuan Tian
48

Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Nov 01, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Classical Encryption

Techniques Computer Security

Dept. of Computer Science,

College of Computer and Information Sciences

King Saud University

Prepared by Yuan Tian

Page 2: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Outline

• Symmetric Encryption Principles

• Classical Substitution Ciphers

• Classical Transposition Ciphers

Page 3: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Types of ciphers

• Symmetric cipher

– Called “conventional, secret-key, or single-key”

– Use of the same key between sender and receiver

– The only type of cryptography, prior to invention of public-key in 1970’s

• Asymmetric cipher

– Called, “public-key or 2-keys”

– Use of different keys for encryption and decryption

Page 4: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Symmetric Encryption Principles

• An encryption scheme has five ingredients:

– Plaintext (input to encryption algorithm)

– Encryption algorithm (substitution & transposition)

– Secret Key (input to encryption algorithm)

– Ciphertext (result of encryption)

– Decryption algorithm (reverse of encryption algorithm)

• Security depends on the secrecy of the key, not the

secrecy of the algorithm

Page 5: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Symmetric Encryption Principles

X

Y = E[K,X]

Transmitted

ciphertext

X = D[K,Y]

Plaintext

input

Plaintext

output

Secret key shared by

sender and recipient

Secret key shared by

sender and recipient

Encryption algorithm Decryption algorithm (reverse of encryption algorithm)

Simplified Model of Symmetric Cipher

Page 6: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Two Requirements of Symmetric Encryption

• A strong encryption algorithm:

Unable to decrypt ciphertext or discover the key,

though algorithm and plain/ ciphertext are known to

the opponents.

• The secret key:

Obtained and kept in a secure way for only the sender

and receiver

Page 7: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Characterizing Cryptographic Systems

• Operations used for encryption:

– Substitution replace one element in plaintext with another

– Transposition re-arrange elements

– Product systems multiple stages of substitutions and transpositions

• Number of keys used:

– Symmetric sender/receiver use same key (single-key, secret-key,

shared-key, conventional)

– Public-key sender/receiver use different keys (asymmetric)

• Processing of plaintext:

– Block cipher process one block of elements at a time(typically 64

or 128 bits)

– Stream cipher process input elements continuously (bit-by-bit or

byte-by-byte)

Page 8: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis and Brute-Force Attacks

• Objective of attacker: recover key (not just message)

• Approaches of attacker:

– Cryptanalysis Exploit characteristics of algorithm to deduce

plaintext or key

– Brute-force attack Try every possible key on ciphertext until

intelligible translation into plaintext obtained

• If either attack finds key, all future/past messages are

compromised

Page 9: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis

• The process of attempting to discover the plaintext

or key or both.

• The strategy of cryptanalysis depends on the nature

of encryption scheme and the information available

to the cryptanalyst

• Types of cryptanalytic attacks:

– Ciphertext only

– Known plaintext

– Chosen plaintext

– Chosen ciphertext

– Chosen text

Page 10: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Types of Cryptanalytic Attacks

Type of Attack Known to Cryptanalyst

Ciphertext only • Encryption algorithm • Ciphertext to be decoded

Known plaintext • Encryption algorithm • Ciphertext to be decoded • One or more plaintext-ciphertext pairs formed with the secret key

Chosen plaintext

• Encryption algorithm • Ciphertext to be decoded • Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key

Chosen ciphertext

• Encryption algorithm • Ciphertext to be decoded • Purported ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key

Chosen text

• Encryption algorithm • Ciphertext to be decoded • Plaintext message chosen by cryptanalyst, together with its corresponding ciphertext generated with the secret key • Purported ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the secret key

Page 11: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Measures of Security

• Unconditionally Secure

– Ciphertext does not contained enough information to derive

plaintext or key

– One-time pad is only unconditionally secure cipher (but not very

practical)

• Computationally Secure

If either:

– Cost of breaking cipher exceeds value of encrypted information

– Time required to break cipher exceeds useful lifetime of encrypted

information

• Hard to estimate value/lifetime of some information

• Hard to estimate how much effort needed to break cipher

Page 12: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Average time required for exhaustive key search

Key Size (bits)

Number of Alternative Keys

Time required at 106 Decryption/µs

32 232 = 4.3 x 109 2.15 milliseconds

56 256 = 7.2 x 1016 10 hours

128 2128 = 3.4 x 1038 5.4 x 1018 years

168 2168 = 3.7 x 1050 5.9 x 1030 years

Page 13: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Basic Terminology (1/2)

• plaintext - the original message

• ciphertext - the coded message

• cipher - algorithm for transforming plaintext to ciphertext

• key - info used in cipher known only to sender/receiver

• encipher (encrypt) - converting plaintext to ciphertext

• decipher (decrypt) - recovering plaintext from ciphertext

• cryptography - study of encryption principles/methods

• cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key

Page 14: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Basic Terminology (2/2)

• secret key: A secret key is used to set some or all of the various parameters used by the encryption algorithm.

• Cryptology: the field of both cryptography and cryptanalysis

• block cipher: A block cipher processes a block of input data at a time and produces a ciphertext block of the same size.

• stream cipher: A stream cipher encrypts data on the fly, usually one byte at a time

• brute-force attack: A block cipher processes a block of input data at a time and produces a ciphertext block of the same size.

• key space: The total number of all possible keys that can be used in a cryptographic system

Page 15: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Types of Classical Ciphers

• Substitution ciphers

• Permutation (or transposition) ciphers

• Product ciphers

Page 16: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Classical Substitution Ciphers

• Letters of plaintext are replaced by other

letters or by numbers or symbols

• If plaintext is viewed as a sequence of bits,

then substitution involves replacing

plaintext bit patterns with ciphertext bit

patterns

Page 17: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Caesar Cipher

• The earliest known substitution cipher used by

Julius Caesar

• Replacement of each letter with the 3rd letter

down from the alphabet

- E(p)=(p+3) mod 26, p : a plaintext letter

- example: plaintext: a r e y o u r e a d y

ciphertext: DUH BRX UHDGB

What’s the key?

Page 18: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Caesar Cipher

• Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z

D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

• Mathematically give each letter a number

• Then Caesar cipher is generalized as below:

– C = E(p) = (p + k) mod (26)

– p = D(C) = (C – k) mod (26)

a b c d e f g h i j k l m

0 1 2 3 4 5 6 7 8 9 10 11 12

n o p q r s t u v w x y z

13 14 15 16 17 18 19 20 21 22 23 24 25

Page 19: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Caesar Cipher

• Three important characteristics

- The encryption / decryption algorithm are known

- There are only 25 keys to try

- The language is known and easily readable

• A brute force search easily performed

- given a ciphertext, just try all the 25 possible keys

- e.g., break ciphertext "GCUA VQ DTGCM"

Page 20: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Monoalphabetic Ciphers

• A dramatic increase in the key space by an arbitrary

substitution.

– Any letter substituted by any letter.

– Then 26!(› 4*1026 ) possible keys.

– Likely to effectively eliminate brute-force techniques.

– plaintext letters: a b c d e f .....

– substitution letters: t h i j a b .....

Page 21: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Monoalphabetic Ciphers

• A dramatic increase in the key space by an arbitrary

substitution.

– Any letter substituted by any letter.

– Then 26!(› 4*1026 ) possible keys.

– Likely to effectively eliminate brute-force techniques.

plaintext letters: a b c d e f .....

substitution letters: t h i j a b .....

– But, the characteristics of this algorithm are similar to Caesar

cipher.

– Known algorithm and language.

Page 22: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Monoalphabetic Ciphers

• Use the relative frequency of letters in English text.

– For single letter : e, t, r, n, i, o, a, s, d

– For digraphs : th,

– For trigraphs : the,

• A powerful tool

– Start with the frequency of digraphs

– Then replace the letter adjacent to the digraph with

a letter appropriate for the frequency of single letter

– Repeat the above steps

Page 23: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

23

Monoalphabetic Ciphers

Figure 1 shows the relative frequencies for the letters of the

English alphabet in a sample of English text.

Page 24: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Monoalphabetic Ciphers

Relative frequency of Letters in EnglishText

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

E 12.75 L 3.75 W 1.50

T 9.25 H 350 V 1.50

R 8.50 C 3.50 B 1.25

N 7.75 F 3.00 K 0.50

I 7.75 U 3.00 X 0.50

O 7.50 M 2.75 Q 0.50

A 7.25 P 2.75 J 0.25

S 6.00 Y 2.25 Z 0.25

D 4.25 G 2.00

Page 25: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Monoalphabetic Ciphers

• Try to break the ciphertext as below:

UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZVUEP

HZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSXEPYEPOPDZSZUFP

OMBZWPFUPZHMDJUDTMOHMQ

Relative frequency of Letters in CipherText

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

Letter

Relative

Frequency

(%)

P 13.13 H 5.83 F 3.33 B 1.67 C 0.00

Z 11.67 D 5.00 W 3.33 G 1.67 K 0.00

S 8.33 E 5.00 Q 2.50 Y 1.67 L 0.00

U 8.33 V 4.17 T 2.50 I 0.83 N 0.00

O 7.50 X 4.17 A 1.67 J 0.83 R 0.00

M 6.67

Page 26: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

The Example of Cryptanalysis

• At a first step, compare the relative frequency of

letters in ciphertext with the standard frequency

distribution for English. – This example is a relatively short message with no

assurance of exact match

– P and Z seems the equivalents of plain letters e ant t

– S,U,O,M are probably in the set of {r,n,i,o,a,s}

Page 27: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

• Pairs of adjacent characters are referred to as digrams, and triples of characters

as trigrams

• The most frequently occurring trigrams ordered by decreasing frequency are:

the and ent ion tio for nde .....

Cryptanalysis of Monoalphabetic Ciphers

Table 1 are the digram frequencies (The table does not include digrams whose relative

frequencies are below 0.47)

Page 28: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

The Example of Cryptanalysis

• Make some tentative assignments and start to fill them in the

plaintext

• Then, See if it looked like a reasonable skeleton of a message,

• If needed, look for other regularity, such as deducing the

plaintext equivalents from repeating sequences of cipher letters

• The most common digraph are “ZW”, in ciphertext and “th“ in

English

• Then , try to equate p with e ( the letters with the most relative frequency in CT & PT)

- the ZWP apperars in CT

- the most frequent trigraph is “the” in English

-

Page 29: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

The Example of Cryptanalysis

• Next, notice the sequence ZWSZ in the first line.

-We can quess that it is the form th_t.

-Therefore, S equates with a.

• So far, we have :

UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ

t a e e te a t h at e e a a

VUEPHZHMDZSHZOWSFPAPPDTSVPQZWYMXUZUHSX

e t ta t h a e ee a e th t a

EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ

e e e tat e the t

-

Page 30: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Monoalphabetic

• Two main methods to lessen the frequency regularity

of letters in ciphertext are :

- To encrypt multiple letters of plaintext at a time

(Multiple-letter Encryption)

- To use multiple cipher alphabets for a plaintext alphabet

(Polyalphabetic Ciphers)

-

Page 31: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Playfair Algorithm

• This is the best known multiple-letter encryption.

• Treats digraphs in the plaintext as single units

• Translates these units into ciphertext digraphs.

• Is based on the use of a 5x5 matrix of letters

constructed by using a keyword.

Page 32: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Playfair Algorithm

• An example matrix

• The keyword is “MONARCHY”

• The keyword is filled into the matrix from left to right

and from top to bottom.

• Then, other letters are filled into the matrix by the

same way with alphabetic order.

M O N A R

C H Y B D

E F G I/J K

L P Q S T

U V W X Z

Page 33: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

How Secure is the Playfair Cipher?

• Encryption rules:

– Repeating plaintext letters are separated with a filler letter,

such as x.(balloon -> ba lx lo on)

– Letters in the same row are each replaced by the letter to

right.(ar-> RM)

– Letters in the same column are each replaced by the letter

beneath.(mu->CM)

– Otherwise, each letter is replaced by the letter crossed at the

its row and column of the other letter in the digraph.(ea->IM)

Page 34: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Playfair Algorithm

• A great advance over monoalphabetic ciphers.

– There are not 26 letters, but 26x26=676 digraphs.

– More difficult to identify each digraph.

– Much more difficult for frequency analysis due to a much

greater frequency range of individual letters than that of

digraph.

– Used as the standard field system by the British Army in

World War Ⅰ & Ⅱ.

• Despite this level of confidence in its security, the

Playfair cipher is in fact relatively easy to break

because it still leaves much of the structure of the

plaintext language intact.

Page 35: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Relative Frequency of Occurrence of Letters

0

10

20

100

60

50

40

30

90

80

70

2 4 6 8 10 12 14 16 18 20 22 24 26

Plaintext

Playfair cipher

Vigenere cipher

Random polyalphabetic cipher

Page 36: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

How Secure is the Playfair Cipher?

The cryptanalysis of the Playfair cipher is also aided by the

fact that a digram and its reverse will encrypt in a similar

fashion.

•if AB encrypts to XY, then BA will encrypt to YX

•Example of words that begin and end in reversed digrams:

receiver, departed, repairer, redder, denuded, etc.

Page 37: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Polyalphabetic Ciphers

• Use of different monoalphabetic substitutions

through enciphering the plaintext.

• Common features in these techniques

– A set of related monoalphabetic substitution rules is used. (the 26 Caesar

cipher rules)

– A key determines which particular rule is chosen for a given

transformation.

– The key is a repeating keyword.

Page 38: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Vigenère Cipher

• The best-known and simplest polyalphabetic

substitution cipher.

• Encryption process

– Use of the Vigenère tableau which is a matrix of 26x26.

– The matrix consists of 26 cipher letters at horizontal line, the

key letter for each cipher to its left, and 26 normal letters on the

top horizontal line.

– A cipher letter is determined at the cross of a key letter(x) and a

normal letter(y), i.e. C=I(x,y), I=intersection

Page 39: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Vigenère Cipher

• To encrypt a message,

– A key is needed that is as long as the message

– So, the key is a repeating keyword.

• For example,

– The keyword is “deceptive”.

– The message is “we are discovered save yourself”.

– Then

Key: d e c e p t i v e d e c e p t i v e d e c e p t i v e

Plaintext: w e a r e d i s c o v e r e d s a v e y o u r s e l f

Ciphertext: ZICVTWQNGRZVTWAVZHCQYGLMGJ

Page 40: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Vigenère Cipher

The Modern Vigenère Cipher

Page 41: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Vigenère Cipher

• Strength

– Multiple ciphertext letters for each plaintext letter

– The letter frequency information obscured

– An improvement achieved over the Playfair cipher.

• However, the structure of plaintext is still remained. So frequency analysis is still effective

• And the periodic nature of the keyword due to its length – Will produce identical ciphertext sequences from the two

identical sequences of plaintext letters occurred at an integer multiple of the keyword length

Page 42: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Vigenère Cipher

• First, guess that the ciphertext was encrypted by either monoalphabetic substitution or a Vigenère Cipher.

- If a monoalphabetic substitution is used,

the statistical properties of the ciphertext

should be used.

- if a Vigenère is used,

the progress depends on determining the

length of the keyword.

Page 43: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Vigenère Cipher

• How to determine the keyword length:

- Two identical sequences of plaintext might

generate identical ciphertext sequences at a

distance with an integer multiple of the

keyword length.

- Two instances of the sequence “red” are

separated by 9 character positions.

i.e. red =>VTW

Page 44: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Vigenère Cipher

• From the appearance of VTW twice, the opponent could guess the keyword is either 3 or 9 letters in length.

• If the keyworld length is N, then the cipher consists of N monoalphabetic substitution ciphers.

- the known frequency characteristics of

plaintext language can be used to attack

this cipher

Page 45: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

Cryptanalysis of Vigenère Cipher

• To avoid the above drawback,

- Eliminate the periodic nature by using

a nonrepeating keyword

- Vigenère proposed an autokey system a

keyword is concatanated with the plaintext

itself to provide a running key.

- for example,

key: deceptivewearediscoveredsav

plaintext: wearediscoveredsaveyourself

ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA

Page 46: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

• Rearrangement (permutation) of the letter order

without altering the actual letters used.

• Rail fence technique: the simplest one.

– Write the plaintext down a sequence of columns

– Read off as a sequence of rows

• For example, the message “meet me after the party” is

encrypted with a rail fence of depth 2 as below:

mematrhpry

⇒ MEMATRHPRYETEFETEAT etefeteat

Transposition Ciphers

Page 47: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

• A more complex scheme :

– Write the message in a rectangle, row by row

– Read off column by column

– But, permute the order of the columns

– Then, the order of columns becomes the key.

• A much more complex scheme :

– Perform more than one stage of column permutation

Transposition Ciphers

Page 48: Classical Encryption Techniques · Classical Encryption Techniques Computer Security Dept. of Computer Science, College of Computer and Information Sciences King Saud University Prepared

• FOR EXAMPLE

– The message is “attack postponed until two am”

– Using one stage of transposition:

– Using two stages of transpositions:

Key: 4 3 1 2 5 6 7 Plaintext: a t t a c k p

o s t p o n e d u n t i l t w o a m x y z

Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPEZ

Key: 4 3 1 2 5 6 7 Plaintext: t t n a a p t

m t s u o a o D w c o i x K N l y P e t Z

Ciphertext: NSCYAUOPTTWLTMDNAOIEPAXTTOKZ

Transposition Ciphers