lec#2-lec#2-lec#2-lec#2-lec#2-lec#2-.pdf

FutureTechnologies3 0 views 28 slides Oct 15, 2025
Slide 1
Slide 1 of 28
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28

About This Presentation

gh


Slide Content

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Dr. AbubakerWahaballa
East Arab College
Deptof Computer Science
Cryptography: symmetricencryption
Cryptography Lecture #2

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Outline
•Overview of Cryptography
•Classical Symmetric Cipher
•Modern Symmetric Ciphers (DES) (Next
Lec#)

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Basic Terminology
•plaintext - the original message
•ciphertext - the coded message
•cipher - algorithm for transforming plaintext to ciphertext
•key - info used in cipher known only to sender/receiver
•encipher (encrypt) - converting plaintext to ciphertext
•decipher (decrypt) - recovering plaintext from ciphertext
cryptography - study of encryption principles/methods
•cryptanalysis (codebreaking) - the study of principles/
methods of deciphering ciphertext without knowing key
•cryptology - the field of both cryptography and
cryptanalysis

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Classification of Cryptography
•Number of keys used
❖Hash functions: no key
❖Secret key cryptography: one key
❖Public key cryptography: two keys -
public, private
•Type of encryption operations used
❖substitution / transposition / product
•Way in which plaintext is processed
❖block / stream

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Symmetric Encryption

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Asymmetric Encryption

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Hash function

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Cryptanalysis Scheme
•Ciphertext only:
❖Exhaustive search until “recognizable
plaintext”
❖Need enough ciphertext
•Known plaintext:
❖Secret may be revealed (by spy, time), thus
<ciphertext, plaintext> pair is obtained
❖Great for monoalphabetic ciphers
•Chosen plaintext:
❖Choose text, get encrypted
❖Useful if limited set of messages

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Security levels: Unconditional vs. Computational
Security
•Unconditional security يطرش ريغ لكشب ةنمآ
❖No matter how much computer power is available,
the cipher cannot be broken
❖The ciphertext provides insufficient information
to uniquely determine the corresponding plaintext
❖Only one-time pad scheme qualifies
•Computational security
•The cost of breaking the cipher exceeds the
value of the encrypted info
•The time required to break the cipher exceeds
the useful lifetime of the info

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Brute Force Search
•Always possible to simply try every key
•Most basic attack, proportional to key size
•Assume either know / recognise plaintext

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Outline
•Overview of Cryptography
•Classical Symmetric Cipher
–Substitution Cipher
–Transposition Cipher
•Modern Symmetric Ciphers (DES)

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Symmetric Cipher Model

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Requirements
•Two requirements for secure use of symmetric
encryption:
•a strong encryption algorithm
•a secret key known only to sender / receiver
Y = E
K(X)
X = D
K(Y)
•Assume encryption algorithm is known
•Implies a secure channel to distribute key

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Classical Substitution Ciphers
•Letters of plaintext are replaced by other
letters or by numbers or symbols
•Plaintext is viewed as a sequence of bits, then
substitution replaces plaintext bit patterns
with ciphertext bit patterns

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Classical Substitution Ciphers
Substitution
Monoalphabetic Polyalphabetic

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Caesar Cipher
•Earliest known substitution cipher
•Replaces each letter by 3rd letter on
•Example:
meet me at the KSA tower
PHHW PH DW WKH NVD WRZHU

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Caesar Cipher
•Define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
•Mathematically give each letter a number
a b c d e f g h i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
•Then have Caesar cipher as:
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Cryptanalysis of Caesar Cipher
•Only have 25 possible ciphers
❖A maps to B,..Z
•Given ciphertext, just try all shifts of letters
•Do need to recognize when have plaintext
•E.g., break ciphertext "GCUA VQ DTGCM"

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Monoalphabetic Cipher
•Rather than just shifting the alphabet
•Could shuffle (jumble) the letters
arbitrarily
•Each plaintext letter maps to a
different random ciphertext letter
•Key is 26 letters long
Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher: D K V Q F I B J W P E S C X H T M Y A U O L R G Z N : key
Plaintext: Saudi Arabia
Ciphertext: ADOQW DYDKWD

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Monoalphabetic Cipher Security
•Now have a total of 26! = 4 x 10
26
keys
•Is that secure?
•Problem is language characteristics
–Human languages are redundant
–Letters are not equally commonly used

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
English Letter Frequencies

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Example Cryptanalysis
•Given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
•Count relative letter frequencies (see text)
•Guess P & Z are e and t
•Guess ZW is th and hence ZWP is the
•Proceeding with trial and error finally get:
it was disclosed yesterday that several informal but
direct contacts have been made with political
representatives of the viet cong in moscow

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Polyalphabetic Cipher
•A polyalphabetic cipher is any cipher based on
substitution, using multiple substitution
alphabets.
•polyalphabetic cipher techniques have the
following features in common:
–A set of related monoalphabetic substitution
rules is used.
–A key determines which particular rule is
chosen for a given transformation.

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Polyalphabetic Cipher Encryption
•Assume we set the following key Rules:
1.Shift the first letter three position to the right
2.Shift the second letter five position to the right
3.Shift the third letter seven position to the right
•Given Plaintext = security
1.Divide Plaintext to three words as:
2.P= sec uri ty
3.C= VJJ XWP WD

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Polyalphabetic Cipher Decryption
•For decryption we set the following key Rules:
1.Shift the first letter three position to the left
2.Shift the second letter five position to the left
3.Shift the third letter seven position to the left
•Given ciphertext = VJJXWPWD
1.Divide ciphertext to three words as:
2.C= VJJ XWP WD
3.P= sec uri ty

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Transposition Ciphers
•Now consider classical transposition or permutation
ciphers
•These hide the message by rearranging the letter
order, without altering the actual letters used
YEES
OTUO
RROM
TAWO
TASK
REWO

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Transposition Ciphers
•Plaintext= See you tomorrow at KSA tower
•Key: 6 rows characters.
•Ciphertext= SOMOKO EUOWSW ETRAAE YORTTR
YEES
OTUO
RROM
TAWO
TASK
REWO

This presentation uses a free template provided by FPPT.com
www.free-power-point-templates.com
Tags