Notes for January 16, 1998
[ ended here ]
- Greetings and felicitations!
- Reading: Pfleeger, pp. 21-46;
Garfinkel & Spafford, pp. 139-159, 175-179
- Puzzle of the day
- Look for things the size of the shell ...
- Long key generation
- Running-key cipher: M=THETREASUREISBURIED;
wedge is that (plaintext,key) letter pairs are not
random (T/T, H/H,
- Enigma/rotor systems; wheels, 3 rotors and a reflecting one.
Go through it; UNIX uses this for crypt(1) command.
- Perfect secrecy: when the probability of computing the plaintext
message is the same whether or not you have the ciphertext
- Only cipher with perfect secrecy: one-time pads;
C=AZPR; is that DOIT or DONT?
- Breaking UNIX crypt(1)
- Purely statistical attack is possible (me) but it takes
gobs of ciphertext
- Known plaintext attack: that's Reeds and Weinberger's attack,
with a nice suggestion by Bob Morris
- Go through the algorithm
You can also see this document
in its native format,
in ASCII text.
Send email to
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 1/28/98