Lecture 8: Cryptography Part 2

Date: October 14, 2013
Homework due: Oct. 18 at 5:00pm

  1. Perfect secrecy
    1. When having the ciphertext doesn’t tell you anything about the plaintext
  2. Classical cryptography
    1. Cæsar cipher; example, with key ‘D’ (3), RENAISSANCE → UHQDLVVDQFH
    2. Vigenère cipher; example: with key ‘DAY’, RENAISSANCE → UELDIQVALFE
    3. Problem: key is periodic; try to eliminate it
    4. Running-key cipher:
      K  = THEBOYHITTHEBALL
      M = THEGOLDISTHELOOT
      C   = MOIHCJKQLMOIMOZE
    5. One-time pad; C = AZPR; is the key XLHY (DOIT) or XLCY (DONT)
    6. Data Encryption Standard
      1. Used in the triple-DES form now
    7. Advanced Encryption Standard
  3. Use on a network
    1. Interchange key
    2. Session (data encryption) key
  4. Public-Key Cryptography
    1. Basic idea: two keys, one public and one private, that are inverses
    2. Cryptosystem must satisfy:
      1. Given public key, computationally infeasible to get private key;
      2. Cipher withstands chosen plaintext attack;
      3. Encryption, decryption can be done quickly using a computer
    3. Benefits: can give confidentiality or authentication or both
    4. Use of public key cryptosystem
      1. Normally used as key interchange system to exchange secret keys (cheap)
      2. Then use secret key system (too expensive to use public key cryptosystem for this)
    5. Common systems: RSA, El Gamal (encryption), Diffie-Hellman (authentication)
  5. Digital signatures
    1. Idea: judge can confirm, to the limits of technology, that claimed signer did sign message
    2. Cryptographic checksum: math function easy to compute given input, very difficult to derive input from output
    3. Classical: use trusted third party
    4. Public key: encipher it using private key

The Vigenère Tableau

The Vigenère tableau, below, is used for a variety of ciphers.

ABCDEFGHIJKLMNOPQRSTUVWXYZ
AABCDEFGHIJKLMNOPQRSTUVWXYZ
BBCDEFGHIJKLMNOPQRSTUVWXYZA
CCDEFGHIJKLMNOPQRSTUVWXYZAB
DDEFGHIJKLMNOPQRSTUVWXYZABC
EEFGHIJKLMNOPQRSTUVWXYZABCD
FFGHIJKLMNOPQRSTUVWXYZABCDE
GGHIJKLMNOPQRSTUVWXYZABCDEF
HHIJKLMNOPQRSTUVWXYZABCDEFG
IIJKLMNOPQRSTUVWXYZABCDEFGH
JJKLMNOPQRSTUVWXYZABCDEFGHI
KKLMNOPQRSTUVWXYZABCDEFGHIJ
LLMNOPQRSTUVWXYZABCDEFGHIJK
MMNOPQRSTUVWXYZABCDEFGHIJKL
NNOPQRSTUVWXYZABCDEFGHIJKLM
OOPQRSTUVWXYZABCDEFGHIJKLMN
PPQRSTUVWXYZABCDEFGHIJKLMNO
QQRSTUVWXYZABCDEFGHIJKLMNOP
RRSTUVWXYZABCDEFGHIJKLMNOPQ
SSTUVWXYZABCDEFGHIJKLMNOPQR
TTUVWXYZABCDEFGHIJKLMNOPQRS
UUVWXYZABCDEFGHIJKLMNOPQRST
VVWXYZABCDEFGHIJKLMNOPQRSTU
WWXYZABCDEFGHIJKLMNOPQRSTUV
XXYZABCDEFGHIJKLMNOPQRSTUVW
YYZABCDEFGHIJKLMNOPQRSTUVWX
ZZABCDEFGHIJKLMNOPQRSTUVWXY

The Vigenère Cipher

The leftmost column has the keys; the top alphabet has the plaintext. So:

KeyECSECSECSE
PlaintextHELLOWORLD
CiphertextLGDPQOSTDH

The Beaufort Cipher

Find the plaintext in the left alphabet, and trace in until you find the key letter. Then turn a right angle and go up. The letter at the top alphabet is the ciphertext. So:

KeyECSECSECSE
PlaintextHELLOWORLD
CiphertextXYHTOWQLHB

The Variant Beaufort Cipher

Find the key in the left alphabet, and trace in until you find the plaintext letter. Then turn a right angle and go up. The letter at the top alphabet is the ciphertext. So:

KeyECSECSECSE
PlaintextHELLOWORLD
CiphertextDCTHMEKPTZ


You can also obtain a PDF version of this. Version of October 13, 2013 at 10:13PM