By:
Kirti Chawla
• Introduction What is a Cipher or Crypto-algorithm ?
• Classification
A method or system for transforming given information in
• Algorithms order to conceal its meaning.
• Vis-à-Vis
• Looking back
Prologue
• Introduction Transposition ciphers
• Classification
• Algorithms Computers
Transposition
CCOEAoan
Can xnmnlesp
Only _ycwu__u
• Vis-à-Vis Execute
Answers
et__tre_
_ess____
• Looking back
Substitution ciphers
Computers Frpsxwhuv
Can Substitution Fdq
Only Rqob
Execute Hahfxwh
Answers Dqvzhuv
Algorithms Genealogy
• Introduction
Algorithms
• Classification
• Algorithms Ciphers Authenticators
• Vis-à-Vis
Symmetric Asymmetric
• Looking back
DES\3DES RSA SHA
AES ELGAMAL MD5
IDEA … …
RC6
BlowFish
…
…
…
Algorithmic Parlance
• Introduction
• Classification
• Algorithms
• Vis-à-Vis
• Looking back
Strong Open Key-oriented
At the heart of Algorithms
• Introduction
Categories Methods to do
• Classification 1. Simple XOR
Deciding Operations 2. Modular Arithmetic with Polynomials
3. Relative Prime Factors
• Algorithms
• Vis-à-Vis 1. S-boxes & P-boxes
Controlled Chaos Creation 2. Inversion
3. Data distribution/redundancy
• Looking back
1. Self generation or ask from user
Key Management 2. Key organization
3. Key protection
1. Buffer management
Anomalous 2. Padding and boundary cases
Behavior Handling 3. State management
1. Hash or One time PADs
Directional Behavior 2. Bi-directionality
Deciding Operations
Simple XOR
• Introduction
This This Axaw
• Classification is is sa
secret key dawawt
message sazawcsr
• Algorithms
• Vis-à-Vis Modular arithmetic with polynomials
• Looking back
This This Axaw
is is sa
X7 + x 5 + x 2 + 1
secret key dawawt
message sazawcsr
Relative prime factors
Factorized
This key1 Axaw
is sa
Factorized
secret dawawt
key2
message sazawcsr
Controlled Chaos Creation
S-box P-box
• Introduction
• Classification
• Algorithms
• Vis-à-Vis
• Looking back
Inversion Data distribution/redundancy
1010 (data)
001 1010 001 1010
0101(data)
1010 001 1010 001
Key Management
Self-generation Ask from user
• Introduction
1010 (data)
• Classification
1010 XOR 11 = 1001
• Algorithms
0101 (data)
• Vis-à-Vis 0101 XOR 11 = 0110
• Looking back
Key organization Key protection
1010 0000 1010 1111 0000 1011 (key)
1010 0000 1010 1111 0000 1011 (key)
1010 0000 1010 1111 0000 1010 1010
1010 0000 1010 (key)
Anomalous Behavior Handling
• Introduction Buffer management Padding
• Classification • 1010 1000 0010 1100 If the input data or key are
[+] 1000 1001 = Overflow not exactly fulfilling the algorithm
• Algorithms requirements, lets say required input
• Capture of 1010 1000 0010 1100 as is of multiple of 2 and > 512 bit, but
plain-text from buffer on which user does not provide … !
• Vis-à-Vis algorithm operate
• Looking back
Boundary cases State management
If the algorithm works in various
U/SIGN-INT
stages, each stage signifying a state
*
and regurgitating partially (weak)
U/SIGN-INT > 65536/32768
cipher-text and hence making
possible ‘interleaving’… !
Directional Behavior
• Introduction Hash or one time PADs
• Classification
• Use one character once only for
substitution.
• Algorithms • Destroy or delete encryption
mechanism.
• Vis-à-Vis • Destroy or delete decryption
mechanism.
• Hash differs from one time PADs in
• Looking back a way of producing output.
Bi-directionality
• Given the single algorithm, the
enciphering and deciphering
operations should be inverse of
each other.
• Bi-directional nature of algorithm is
there, because of need to get original
data back.
Symmetric Ciphers
• Introduction
• A single key for enciphering and deciphering operations.
• Classification
• More the number of bits of key, more secure your data.
• Algorithms
• Algorithms are usually characterized as stream or block ciphers.
• Vis-à-Vis
• Algorithmic proclivity to certain weak keys can create problem.
• Looking back
• Used generally for protecting data.
Asymmetric Ciphers
• Introduction
• One key for enciphering and another key for deciphering
• Classification operation.
• More the distance between mutually prime nos. (here they are key),
• Algorithms
more secure your data.
• Vis-à-Vis
• Used generally for protecting data as well for making sure its
• Looking back authentication.
Authenticators
• Hash functions gives a fixed-length output for a arbitrary-length
• Introduction
message.
• Classification
• Strength of algorithm is measured by collision resistance.
• Algorithms
• Uni-directionality is innate capability of authentication algorithms.
• Vis-à-Vis
• Authentication is achieved by re-computing hash and compared
• Looking back with stored hash value.
DES/… algorithms
• Introduction
• Classification Enigma
• Algorithms
Cipher cylinders
• Vis-à-Vis
• Looking back
Caesar cipher
Egyptian pictorial substitution