TRANSPOS
TRANSPOS
Doesn t change one symbol for another, rather change the locations of the symbols. Broadly 2 types are available: keyless transposition and keyed transposition. Keyless transposition: used in past. There are 2 methods to do the permutations of characters(i) Write the text row by row and transmit the same column by column (ii) Write text in column by column and transmit row by row.
Transposition cipher(cntd)
The encrypted text would be : MEMATGPRETETOAAK However the cryptanalysis is easy once known that rail fence cipher is used. Keyed transposition cipher: PT is divided into groups of predetermined size, called blocks. A key is used to permute the characters in each block. Ex. Encrypt the message enemy attacks tonight use the following key
The key says 3dr character comes to 1st place, 1st goes to 2nd place etc. the decryption key is just the two rows of same key read reversed. We require 5 letters of PT in every block. To make that one Z is added to the last word as below: we rewrite PT as: ENEMY ATTAC KSON IGHTZ
Keyed transposition(cntd)
The resultant CT would be : EEMYN TAACT TKONS HITZ However, more recent transposition cipher makes a harder scrambling of text. Following steps are used: (i) text written in a table row by row (ii) permutation done recording column by column (iii) new table read column by column
E T T H
E A K I
M A O T
Y C N Z
N T S G
CT: ETTHEAKIMAOTYCNZNTSG
USE OF MATRICES
Here PT and CT are l m matrices representing the numerical values of the characters. The key is a square matrix of size m m Encryption is done by multiplying the PT matrix with the key matrix. Decryption is done by multiplying the CT matrix by the inverse key matrix However, cryptanalysis is possible by statistical method, as letter frequencies don t change. Brute force attempt may be done looking into the CT length. The block size is usually a divisor of total CT length. Viz if CT length is 20, then 20= 1X2X2X5. Now analyzer can presume a length from this. Viz he takes it as 5. so a 5!=120 possible combinations may all b e tried out , of which say 1st one is ( 1 2 3 4 5 )
Double transposition
Makes cryptanalysis far more difficult. Here the encryption/decryption algorithms are used twice. Same or different key may be used. A middle text is written out The same procedure is repeated for the middle text as that of plain text.
Unit-III
Modern block cipher: only bits are used , no symbols, no characters. A symmetric key modern block cipher encrypts an n-bit block of PT or decrypts n-bit block of CT. A key of k-bit is used. If message length > n, it is broken down into blocks. If length < n, it is padded with extra bits. N is usually taken as 64,128,256,or 512.
(c ) Ex-OR
Most important component of modern block cipher, since addition/subtraction are done in GF(2n) field, which is XOR realizable. Properties of XOR are : (i) Clouser: for 2 n-bit words, XOR results an n-bit word. (ii) Associativity: more than 1 XOR can be performed in any order (iii)Commutativity: swapping of XOR operations don t change result. (iv) identity element: an n-bit word of all zero is an identity element .viz: P XOR (0000)=P (v) existence of inverse: XOR of a word with itself results identity element. So self inverse. Viz P XOR P=0
Other components(MBC)
(e)complement: a urinary operation that flips every bit (f) Swap: a special case of circular shift with k=n/2. Valid if n is an even number. Self invertible ( left shift n/2 = right shift n/2) (g) invertibility: for key fixed the operations of encryption and decryptions are to invertible. XOR helps here. Viz if Y = X XOR K, then X= Y XOR K. (h) split & combine: split normally splits n-bit word in middle creating equal length words. Combine concatenates the n-bit words.