Symmetric Encryption: Substitution Flashcards
What are the 4 types of substitution ciphers?
Mono-alphabetic, Poly-alphabetic, Transposition, Composite.
Define Mono-alphabetic substitution…
A message is encrypted via a character shift across all characters in the message. The character shift is the key. The result is a permutation of the original message.
Why is mono-alphabetic substitution vulnerable?
Frequency analysis
Define Poly-alphabetic substitution…
A block cipher in which every block of the plain text has a unique key (random character shift applied to it). For example, block 1 may have a key of 3, block 2 may have a key of 7 etc. This ensures that characters in the cipher text don’t all map to the same characters in the plain text. Thus, reducing vulnerability to frequency analysis. In essence, this substitution consists of many different caesars ciphers working on the different plain text blocks.
Give an example of a famous poly-alphabetic substitution and explain how it works…
Vingere cipher - In this cipher, a key is chosen and repeated to be the same length as the plain text. This means each key value maps to a plain text value. Then, for each mapping, the numeric values are added and then modulo the length of the key.
What is the benefit of Vingere cipher?
It gives uniform uniqueness across the cipher text.
What is a disadvantage of Vingere cipher?
The use of a repeating key still leaves some vulnerability to frequency analysis.
What is the One Time Pad?
Aka, Vernam Cipher. A cipher in which each character of plain text is encrypted by a unique key. In more detail, the key and plain text are converted to binary values, and each mapping is XORd. The key is discarded once the encryption / decryption process is complete.
Is the OTP considered unbreakable? If so, why?
Yes, it’s considered mathematically unbreakable due to the notion of it being truly random (if this is actually possible).
What are the core aspects of the Vernam cipher?
- The key is only used once for encryption and decryption, then it’s discarded.
- Key must be truly random (if that’s possible)
- Binary values of the key must be the same length as the binary values of the plain text
What are the pros and cons of OTP?
Pros:
- Mathematically unbreakable due to randomness.
- XOR is very efficient on modern operating systems, therefore, encryptions and decryption process is very fast.
- Keys are discarded, therefore, no replay attacks.
Cons:
- Key generation is required for every communication run.
- Key distribution - It’s not practical to frequently exchange large keys.
Define Transposition Cipher
Ciphers that use only permutations to hide the message.
What was the earliest transposition cipher?
Scytale
Name a modern Transposition Cipher. Explain how it works…
Row Column cipher.
A number of columns are chosen for a table, and the message is written in the table. The columns are then uses as cipher text.
What is the key in the Row Column transposition cipher?
The column count