Lecture 2 - Classical Encryption Techniques Flashcards

1
Q

What are Classical Encryption Techniques?

A
  • Recall: secret key ciphers use a secret key for encryption
  • Almost all secret key ciphers (no matter how complicated) are essentially a combination of two simple techniques:
  • Substitution: replace characters of plaintext by other characters
    • Example: Rot-n (also called Caesar cipher), which replaces each letter with a letter n positions down the alphabet
  • Transposition: permuting order of the plaintext characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of a Monoalphabetic cipher?

A
  • Recall Rot-n: shift letters n positions
    • Rot-n is easy to break
    • The search space is small (only 25 possible key values)
  • Each letter shifted by the same fixed amount
  • 26 Possible different substitutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a weekness of Monoalphabetic ciphers?

A
  • Weakness of monoalphabetic ciphers: letter frequency remains
    • In normal English, different letters have different frequencies
    • If you are the attacker and check that “q” ~ 13% in the ciphertext, what would you guess?
    • Given enough ciphertext, these statistics can aid cryptanalysis
  • Ways to lessen the survival of plaintext structures
    • Encrypts a letter into a number of ciphertext symbols
    • Encrypts multiple letters of plaintext as a unit
    • Use multiple cipher alphabets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Polyalphabetic Cipher and give an example of one?

A
  • Polyalphabetic cipher
    • A set of monoalphabetic ciphers is used
    • Some rule determines which to be applied to a particular position
  • Vigenère cipher: generalize the rotate cipher by shifting different plaintext letters by different amounts
    • Shift amount determined by the letter in the key (a: shift 0, b: shift 1, …, z: shift 25)
    • Repeat the key if necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weakness of Vigenère - How to decrypt & how to break Vigenère?

A
  • How to decrypt?
    • Reverse process of encryption
  • How to break Vigenère?
    • Observation: Repeated plaintext patterns separated by integer multiples of key length results in repeated ciphertext patterns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weakness of Vigenère - What are the 3 steps in breaking Vigenère?

A

1) Attacker looks for repeated ciphertext patterns and guess key length
2) If (say) key length = 9, the 1st, 10th, 19th, … letter is encrypted using same key letter
3) The problem reduces to solving a number of monoalphabetic ciphers

  • Break each such monoalphabetic cipher as before
  • Combine results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Autokey Version of Vigenère?

A
  • The idea of appending plaintext as a key
  • However still there are statistical relationships remaining
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is One Time Pad?

A
  • Use a truly random key that is as long as the message
  • An unconditionally secure type of cipher
    • A brute force attack will fail: you will decrypt into many possible plaintexts
    • There is no way to distinguish which is the correct plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is a One Time Pad Unconditionally Secure?

A
  • There are no statistical relationship between plaintext and ciphertext
    • The ciphertext contains no information about the plaintext
    • In fact, there is always a key to decrypt into whatever plaintext you want
  • However, usually not feasible in practice
    • Need huge amount of random numbers
    • How to securely distribute the secret key, which is as long as the message?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Transposition Ciphers?

A
  • Change ordering of letters
  • Example: writing letters in columns (“rail fence”)
  • Better to have permuting columns
    • Using key e.g. 2413
  • How to decrypt?
    • Easy to cryptanalyze (frequencies unchanged)
    • Can combine with substitution ciphers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly