basic crypto
DESCRIPTION
Basic CryptoTRANSCRIPT
![Page 1: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/1.jpg)
Good IdeaGood Idea
Cryptography
The Basic Idea:The Basic Idea:
plaintext
algorithm
Key
ciphertext
Two approaches:Two approaches:
1) Make algorithm secret and don’t use a key.
2) Make algorithm public but keep the key secret.
Bad Idea
Security through obscurity
![Page 2: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/2.jpg)
Security through obscurity Security through obscurity is the use of secrecy of design or
implementation to provide security.
Security through obscurity is discouraged and not recommended.
A system relying on security through obscurity may have theoretical or actual security vulnerabilities.
But its owners or designers believe that if the flaws are not known, then attackers will be unlikely to find them
Cipher cannot be distributed among public and thus would not have a commercial or publically accepted value.
![Page 3: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/3.jpg)
Block Cipher Building blocks• Shannon proposed ciphers with two
components – S-Boxes substitution
• providing confusion of input bits
– P-Boxes permutation• providing diffusion across S-box inputs
![Page 4: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/4.jpg)
S-box (substitution)
01234567
3 bitinput
0
1
0
01234567
1
1
0
3 bitoutput
Word size of 3 bits => mapping of 23 = 8 values
![Page 5: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/5.jpg)
P-box (permutation)4 bitinput
1
1
0
1
1
0
1
1
1
1
0
1
1
0
1
1
Example 1
Example 2 - swap twohalves of input
![Page 6: Basic Crypto](https://reader036.vdocument.in/reader036/viewer/2022081813/5695d3101a28ab9b029cb819/html5/thumbnails/6.jpg)
S-Box and P-Box• A combination of S-box and P-box transformation
is known as a product cipher. (Example Lucifer cipher)
• The combination could yield a cipher system more powerful than either one alone.
• A product cipher that uses only substitutions and permutations is also called a SP-network.
• Basis of modern block symmetric cryptography