Skip to the content.

Index

Definitions

Security Properties

Encryption Scheme

where $E(Key_1, P) = C$ and $D(Key_2, C) = P$.

Security depends only on secrecy of the key, not on the algorithm

Mathematical Formalization

Let $M$ be the message space, and $m \in M$ is plaintext.

Similarly, let $C$ be the ciphertext space, and $c \in C$ is ciphertext.

Let $K$ be the key space, and $e, d \in K$.

For each $e \in K$ determines a bijective function $E_e$ from $M$ to $C$, and similarly, for each $d \in K$ determines a bijective function $D_d$ from $C$ to $M$.

So we could represent as follows:

$E_e(M) = C$ or $E(M, e) = C$

and

$D_d(C) = M$ or $D(C, d) = M$

Since that the encryption function $E$ and decryption function $D$ are bijiective, for each element in set $M$ and $C$ should have its pair in the opposite set.

Characteristics of Cryptographic Systems

Symmetric key encryption

For symmetric encryption scheme $\{E_e | e \in K\}$ and $\{D_d | d \in K\}$, $\{e, d\}$ are easy to derived from each other or just $e = d$

Historical Ciphers

Caesar Cipher

$C = E(K, M) = (M + K) \mod 26$

$M = D(K, C) = (C - K) \mod 26$

where $M, C \in Alphabets$ and $Alphabets$ are mapped into $\{0, 1, …, 25\}$

Especially, when we set $K = 13$, the function is called ROT13, where $E$ is equivalent to $D$

Mono-alphabetic substitution ciphers

Map a element in $A$ into a element in $C$

Homophonic substitution ciphers

Map a element in $A$ into multiple elements in $C$

For communicators: This relationship/set is the key

For cryptanalysis: frequency analysis is more difficult

For example:

for $A = \{x, y\}$, declares keys $K_x = \{00, 10\}$ and $K_y = \{01, 11\}$.

The plaintext xy encrypts to one of 0001, 0011, 1001, 1011

Playfair Cipher

steps:

  1. Pick keyword (here: monarchy)
  2. Construct matrix: fill in letters of keyword (minus duplicates) left2right & top2bottom, and remaining letters in alphabetic order, where I and J count as one letter.
  3. Plaintext is encrypted two letters at a time:
  4. If a pair is a repeated letter, insert filler like ‘X’ (e.g., “BALLOON” ; “BA LX LO ON”). Add an ‘X’ also at the end, if needed (or any other character).
  5. If both letters fall in the same row, replace each with letter to right, wrapping back to start from end (e.g., “AR” is encrypted as “RM”).
  6. If both letters fall in the same column, replace each with the letter below it, wrapping to top from bottom (e.g., “MU” is encrypted as “CM”).
  7. Otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair (e.g., “HS” becomes “BP” and “EA” becomes “IM”, or “JM”, as the encipherer wishes)

Vigenere Cipher (polyalphabetic substitution cipher)

The encryption/decryption is as follows:

$C_i = (P_i + k_{i \mod m}) \mod 26$

and

$P_i = (C_i − k_{i \mod m}) \mod 26$

Vernam Cipher

$P \oplus K = C$

$C \oplus K = P$

Rail Fence Cipher

Columnar transposition cipher

Example:

Also, we could perform another encryption to be more secure.

Feistel Cipher

Composite (product) ciphers: combining both substitution and transposition

Encryption:

$LE_i = RE_{i - 1}$

$RE_i = LE_{i - 1} \oplus F(RE_{i - 1}, K_i)$

Decryption:

Since $LD_{16 - i} = RE_i$ and $RD_{16 - i} = LE_i$

$LD_i = RD_{i - 1}$

$RD_i = LD_{i - 1} \oplus F(RD_{i - 1}, K_{17 - i})$

Proof:

$\begin{equation} \begin{split} LD_i & = RE_{16 - i} \\
& = LE_{16 - i - 1} \oplus F(RE_{16 - i - 1}, K_{16 - i}) \\
& = LE_{15 - i} \oplus F(RE_{15 - i}, K_{16 - i}) \\
& = RD_{16 - 15 + i} \oplus F(LD_{16 - 15 + i}, K_{16 - i}) \\
& = RD_{i + 1} \oplus F(LD_{i + 1}, K_{16 - i}) \\
& = RD_{i + 1} \oplus F(RD_i, K_{16 - i}) \end{split} \end{equation}$

$\begin{equation} \begin{split} RD_i & = LE_{16 - i} \\
& = RE_{16 - i - 1} \\
& = RE_{15 - i} \\
& = LD_{16 - 15 + i} \\
& = LD_{i + 1} \end{split} \end{equation}$

DES Encryption

DES Security

S-DES

Block Cipher Modes

ECB

CBC

Simplified CBC

CFB

Simplified CFB

OFB

Simplified OFB

Number Theory

RSA

Asymmetric algorithms for distribution

Diffie-Hellman Key Exchange

Hash

Security Protocols

Needham-Schroeder Public Key Protocol (NSPK)

Procedure

  1. $A \rightarrow B: \{NA, A\}_{K_B}$
  2. $B \rightarrow A: \{NA, NB\}_{K_A}$
  3. $A \rightarrow B: \{NB\}_{K_B}$

MITM

  1. $A \rightarrow C: \{NA, A\}_{K_C}, C \rightarrow B: \{NA, A\}_{K_B}$
  2. $B \rightarrow C: \{NA, NB\}_{K_A}, C \rightarrow A: \{NA, NB\}_{K_A}$
  3. $A \rightarrow C: \{NB\}_{K_C}, C \rightarrow B: \{NB\}_{K_B}$

NSL Protocol

Procedure

  1. $A \rightarrow B: \{NA, A\}_{K_B}$
  2. $B \rightarrow A: \{NA, NB, B\}_{K_A}$
  3. $A \rightarrow B: \{NB\}_{K_B}$

MITM

  1. $A \rightarrow C: \{NA, A\}_{K_C}, C \rightarrow B: \{NA, A\}_{K_B}$
  2. $B \rightarrow C: \{NA, NB, B\}_{K_A}$, $C \rightarrow A: \{NA, NB, B\}_{K_A}$

$A$ received the message $\{NA, NB, B\}$ and found that $A$ is connecting to $B$ (should be $C$).

Zero-knowledge Protocols

Principals

Setup

Verification (Peggy knows s)

Proof: $\begin{equation} \begin{split} y^2 \mod n & = (r * s^c)^2 \mod n \\
& = (r^2 * s^2c) \mod n \\
& = (r^2 * (S^2)^c) \mod n \\
& = (x * v^c) \mod n \end{split} \end{equation}$

Cheating

Principal

Cheat