Cryptography In The Information Society by Ryabko Boris; Fionov Andrey;
Author:Ryabko, Boris; Fionov, Andrey;
Language: eng
Format: epub
Publisher: World Scientific Publishing Company
Published: 2021-08-15T00:00:00+00:00
(all operations are modulo 26). Here mi is an odd letter of the message, mi+1 is an even letter, k1, k2 are the key digits, and ci, ci+1 the resulting symbols of ciphertext. For instance, the pair of symbols SE is encrypted under the key k = (3, 5) in the following way:
i.e. SE converts to ZF.
Note that this cipher is decipherable. The decryption algorithm usually called the inverse cipher is written as follows:
Applying the cipher (8.2) to our message under the key (3, 5) we obtain
Here, for clarity, after the first arrow, the intermediate result obtained after the first two operations in (8.2) is shown (this is an âintermingledâ but not yet encrypted text). We can see that this cipher hides the frequencies of letters, which complicates the frequency analysis. Of course, the frequencies of the pairs (digrams) are preserved but we can conceal them too if we encrypt the message in blocks of 3 letters, etc.
So, we have considered two ways of improving the cipher: increasing the length of the key and combining symbols into blocks with mixing transformations. Both methods are widely used in real modern ciphers. Now we shall consider one more trick which is also used in practice. For the sake of simplicity, we proceed with the same example.
The cipher (8.2) is more complicated to Eve compared to the cipher (8.1) and gives us the opportunity to consider another scenario of attack. Up to this point we considered only the ciphertext-only attacks. But what will happen if Eve somehow procures the plaintext corresponding to a ciphertext transmitted earlier? Here we have a situation where the known-plaintext attack (see Chap. 1, p. 5) is being used. For instance, Eve has the pair (SEQUENCE, VJTZHSFJ) for the cipher (8.1). Then she immediately computes the secret key k1 = V â S = 3, k2 = J â E = 5 and is able to decrypt all further messages from Alice to Bob. When the cipher (8.2) is used, the pair (SEQUENCE, ZFNJUJJP) does not allow for such an obvious solution, although breaking the cipher (8.2) is simple too. Eve performs the first two operations from (8.2), which do not require the secret key, for the word SEQUENCE, obtains the intermediate word WAKEREGK and using the pair (WAKEREGK, ZFNJUJJP), as in the previous case, finds the key k = 3, 5.
How one can hamper Eveâs actions? The idea is simple. In encryption, we shall use the cipher (8.2) twice. So we obtain:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1472)
Network Security Strategies by Aditya Mukherjee(1371)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1342)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1331)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(786)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(587)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(581)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(472)
Kali Linux Penetration Testing Bible by Gus Khawaja(428)
Cybercrime Investigations by John Bandler(412)
The Hardware Hacking Handbook by Colin O'Flynn(394)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(361)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(355)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(328)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(325)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(320)
8 Steps to Better Security by Crawley Kim;(312)
Security, Privacy and User Interaction by Unknown(288)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(281)
