Top Banner
Cryptography Introduction, continued
8

Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Dec 22, 2015

Download

Documents

Wilfred Powell
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Cryptography

Introduction, continued

Page 2: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Sufficient key space principle

• If an encryption scheme has a key space that is too small, then it will be vulnerable to exhaustive-search attacks

Page 3: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

The Vigenère cipher

• The key is now a string, not just a character• To encrypt, shift each character in the

plaintext by the amount dictated by the next character of the key– Wrap around in the key as needed

• Decryption just reverses the process

tellhimaboutmecafecafecafecaveqpjiredozxoe

Page 4: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

The Vigenère cipher

• Size of key space?– If keys are 14-character strings; then key space

has size 2614 266

– Brute-force search expensive/impossible

• Is the Vigenère cipher secure?

• (Believed secure for many years…)

Page 5: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Attacking the Vigenère cipher

• (Assume a 14-character key)• Observation: every 14th character is

“encrypted” using the same shift

• Looking at every 14th character is(almost) like looking at ciphertextencrypted with the shift cipher– Though brute-force attack from

before doesn’t work…

veqpjiredozxoeualpcmsdjquiqndnossoscdcusoakjqmxpqrhyycjqoqqodhjcciowieii

veqpjiredozxoeualpcmsdjquiqndnossoscdcusoakjqmxpqrhyycjqoqqodhjcciowieii

veqpjiredozxoeualpcmsdjquiqndnossoscdcusoakjqmxpqrhyycjqoqqodhjcciowieii

Page 6: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Using plaintext letter frequencies

8.2

1.5

2.8

4.3

12.7

2.2 2.0

6.1

7.0

0.2 0.8

4.0

2.4

6.7

1.5 1.9

0.1

6.0 6.3

9.1

2.8

1.0

2.4

0.2

2.0

0.1 0.0

2.0

4.0

6.0

8.0

10.0

12.0

14.0

a b c d e f g h i j k l m n o p q r s t u v w x y z

Perc

enta

ge

Letter

Page 7: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Attacking the Vigenère cipher

• Look at every 14th character of the ciphertext, starting with the first

• Let be the most common character appearing in this portion of the ciphertext

• Most likely, this character corresponds to the most common plaintext character (‘e’)– Guess the first character of the key is - ’e’

• Repeat for all other positions

• Better (more complicated) attacks also possible

Page 8: Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Back to the drawing board…

• So far: “ad hoc” constructions; construct, break, repeat, …

• Can we prove that some encryption scheme is secure?

• First need to define what we mean by “secure” in the first place…