Notes for January 16, 1998
- Greetings and felicitations!
- Reading: Pfleeger, pp. 21-46;
Garfinkel & Spafford, pp. 139-159, 175-179
- Puzzle of the day
- Look for things the size of the shell ...
- Long key generation
- Running-key cipher: M=THETREASUREISBURIED;
K=THESECONDCIPHERISAN;
C=MOILVGOFXTMXZFLZAEQ;
wedge is that (plaintext,key) letter pairs are not
random (T/T, H/H,
E/E, T/S,
R/E, A/O,
S/N, etc.)
- Enigma/rotor systems; wheels, 3 rotors and a reflecting one.
Go through it; UNIX uses this for crypt(1) command.
- Perfect secrecy: when the probability of computing the plaintext
message is the same whether or not you have the ciphertext
- Only cipher with perfect secrecy: one-time pads;
C=AZPR; is that DOIT or DONT?
- Breaking UNIX crypt(1)
- Purely statistical attack is possible (me) but it takes
gobs of ciphertext
- Known plaintext attack: that's Reeds and Weinberger's attack,
with a nice suggestion by Bob Morris
[ ended here ]
- DES
- Go through the algorithm
You can also see this document
in its native format,
in Postscript,
in PDF,
or
in ASCII text.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 1/28/98