1 / 10

Information Assurance Management

Information Assurance Management. Cryptography Foundations Week 10-2. Substitution and Transposition Ciphers. Substitution cipher - one character in plaintext is substituted for another Four types: Monoalphabetic cipher - one plaintext character is substituted with a cipher test character

suchi
Download Presentation

Information Assurance Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Assurance Management Cryptography Foundations Week 10-2

  2. Substitution and Transposition Ciphers • Substitution cipher - one character in plaintext is substituted for another • Four types: • Monoalphabetic cipher - one plaintext character is substituted with a cipher test character • Homophonic substitution cipher - single character of plaintext can map to one of several ciphertext characters

  3. Substitution and Transposition Ciphers • Polygram substitution cipher - blocks of characters are encrypted as a group • Polylalphabetic substitution cipher - multiple simple substitution ciphers • changes with the position of each plaintext character

  4. Substitution and Transposition Ciphers • Transposition Ciphers - Plaintext remains the same, but the order of characters is changed • SCOAO OHNMN METI EAHN OTEA NEET EDXI

  5. Substitution and Transposition Ciphers • Rotor Machines - Mechanical device • Uses rotors • Arbitrary permutation of the alphabet • Simple substitution • Rotors move at different rates • Enigma

  6. One-Time Pads • The ONLY perfect encryption scheme • large nonrepeating set of truly random key letters • Each key letter is used just once to encrypt one plaintext character (addition modulo 26) • Used then destroyed - new message, new key letters

  7. One-Time Pads • But...the key letters must be generated randomly! NEVER use that key again, ever • Limitation on key length... • Ultra secure low bandwidth messages

  8. Random Numbers • RAND Tables - One million random numbers in 5 digit groups • Random noise...events that happen regularly but randomly, measure time between event • Distill randomness • Actual Mouse positions • Arrival times of network packets

  9. Large Numbers • A measure of “Computational Security” • 56-bit DES key - 8,000 MIPS-years • 4.7 months with 2 purpose built computers, 3000+ PC’s working a brute force process

  10. Algorithms • Many kinds...here are three of the most popular: • DES - Data Encryption Standard • Most popular • US and International standard • Symmetric algorithm • RSA - Public-key algorithm • DSA - Digital Signature Algorithm...used only for digital signatures

More Related