Outline for January 29, 2016

Reading: text, §10 handout (§9 in the book)\\ Due: Homework 2, due February 5; Project progress report, due February 8

  1. Classical Cryptography
    1. Polyalphabetic: Vigenère, fi(a) = a + ki mod n
    2. Cryptanalysis: first do index of coincidence to see if it is monoalphabetic or polyalphabetic, then Kasiski method.
    3. Problem: eliminate periodicity of key
  2. Long key generation
    1. Autokey cipher:

      MTHETREASUREISBURIED
      KHELLOTHETREASUREISB
      CALPEFXHWNIIIKVLVQWE

    2. Running-key cipher:

      MTHETREASUREISBURIED
      KTHESECONDCIPHERISAN
      CMOILVGOFXTMXZFLZAEQ

      wedge is that (plaintext, key) letter pairs are not random (T/T, H/H, E/E, T/S, R/E, A/O, S/N, etc.)

    3. Perfect secrecy: when the probability of computing the plaintext message is the same whether or not you have the ciphertext
    4. Only cipher with perfect secrecy: one-time pads; C = AZPR; is that DOIT or DONT?
  3. Product ciphers: DES, AES
  4. Public-Key Cryptography
    1. Basic idea: 2 keys, one private, one public
    2. Cryptosystem must satisfy:
      1. Given public key, computationally infeasible to get private key;
      2. Cipher withstands chosen plaintext attack;
      3. Encryption, decryption computationally feasible (note: commutativity not required)
    3. Benefits: can give confidentiality or authentication or both
  5. Use of public key cryptosystem
    1. Normally used as key interchange system to exchange secret keys (cheap)
    2. Then use secret key system (too expensive to use public key cryptosystem for this)
  6. Diffie-Hellman
    1. Goal is to share a common key (symmetric key exchange protocol)
    2. Given n, g, prime p, compute k such that n = gk mod p
    3. Choose k as private key, make public key K = gk mod p

You can also obtain a PDF version of this. Version of February 2, 2016 at 10:00PM