1 / 49

The Secure Hill Cipher

The Secure Hill Cipher. HILL. Jeff Overbey MA464-01 • Dr. Jerzy Wojdyło • April 29, 2003. Based on S. Saeednia. How to Make the Hill Cipher Secure. Cryptologia 24 (2000) 353–360. The Scenario. The Scenario. Alice. The Scenario. Bob. The Scenario. Oscar. The Scenario. Sender.

gerald
Download Presentation

The Secure Hill Cipher

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Secure Hill Cipher HILL Jeff Overbey MA464-01 • Dr. Jerzy Wojdyło • April 29, 2003 Based on S. Saeednia. How to Make the Hill Cipher Secure.Cryptologia 24 (2000) 353–360.

  2. The Scenario

  3. The Scenario Alice

  4. The Scenario Bob

  5. The Scenario Oscar

  6. The Scenario

  7. Sender Recipient Nosy Neighbor The Scenario Insecure Channel

  8. Beforehand… Alice and Bob privately share matrix K, invertible over Zm To encrypt a matrix X over Zm… Compute Y = KX Send Y To decrypt Y… Compute X = K–1Y Hill Cipher

  9. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel

  10. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure “Hey Bob,wassup?” Insecure Channel

  11. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel

  12. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel

  13. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel Y = KX

  14. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel

  15. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel HEYBOBWAS Known Plaintext

  16. Sender Recipient Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel HEYBOBWAS Known Plaintext

  17. KNOWNPLAINTEXTATTACK KNOWNPLAINTEXTATTACK Sender Recipient hahahaHAHAHAHA… Nosy Neighbor Why the Hill Cipher Isn’t Secure Insecure Channel HEY BOB,WASSUP?

  18. Beforehand… Alice and Bob privately share matrix K, invertible over Zm To encrypt a matrix X over Zm… Compute Y = KX Send Y To decrypt Y… Compute X = K–1Y Secure Hill Cipher Beforehand… • Alice and Bob privately share matrix K, invertible over Zm To encrypt a matrix X over Zm… • Choose a vector t over Zm • Form permutation matrix Pt • Compute Kt = Pt–1KPt • Compute Y = KtX and u = Kt • Send (Y,u) To decrypt (Y,u)… • Compute t = K–1u • Compute Pt • Compute Kt–1 = Pt–1K–1Pt • Compute X = Kt–1Y Note that (Kt)–1 = (K–1)t Hill Cipher

  19. Permutation Matrices I =

  20. Permutation Matrices I = P23 =

  21. Permutation Matrices I = P23 = A permutation matrix is a matrix with exactly one 1 in each row and column and zeros elsewhere. P12,23 =

  22. Permutation Matrices

  23. Vector Representation P23 = P12,23 =

  24. Beforehand… Alice and Bob privately share matrix K, invertible over Zm To encrypt a matrix X over Zm… Compute Y = KX Send Y To decrypt Y… Compute X = K–1Y Hill Cipher Secure Hill Cipher Beforehand… • Alice and Bob privately share matrix K, invertible over Zm To encrypt a matrix X over Zm… • Choose a vector t over Zm • Form permutation matrix Pt • Compute Kt = Pt–1KPt • Compute Y = KtX and u = Kt • Send (Y,u) To decrypt (Y,u)… • Compute t = K–1u • Compute Pt • Compute Kt–1 = Pt–1K–1Pt • Compute X = Kt–1Y

  25. The Easy Way to Encrypt • Require t to be the vector representation of a permutation matrix • N.B.: This is for example only—it is not practical “in the field.”

  26. An Example “Hey Bob, wassup?”

  27. Form permutation matrix Pt: An Example Choose a permutation vector: 3 rows, since K is 3×3

  28. Compute Kt = Pt–1KPt : An Example Find Pt–1:

  29. An Example Find Pt–1: Compute Kt = Pt–1KPt : Permutation of K

  30. An Example Compute Y = KtX: Compute u = Kt:

  31. An Example Compute Y = KtX: Compute u = Kt:

  32. An Example Send (Y,u) to Bob

  33. Sender Recipient Nosy Neighbor The Scenario

  34. Sender Recipient Nosy Neighbor The Scenario

  35. Sender Recipient Nosy Neighbor The Scenario

  36. Sender Recipient Nosy Neighbor The Scenario

  37. An Example Receive (Y,u):

  38. Compute t = K–1u and derive Pt: An Example Compute K–1:

  39. Compute X = Kt–1Y: An Example Compute Kt–1 = Pt–1K–1Pt:

  40. Compute X = Kt–1Y: An Example Compute Kt–1 = Pt–1K–1Pt: “Hey Bob, wassup?”

  41. KNOWNPLAINTEXTATTACK KNOWNPLAINTEXTATTACK An Example But that was just a regular Hill cipher with a fancy key…

  42. The Actual Really Secure Hill Cipher HILL Jeff Overbey MA464-01 • Dr. Jerzy Wojdyło • April 29, 2003 Based on S. Saeednia. How to Make the Hill Cipher Secure.Cryptologia 24 (2000) 353–360.

  43. The Actual Really Secure Hill Cipher HILL or How to Secure the Secure Hill Cipher

  44. Ensuring Security • X should have two columns • Why? Suppose K is n × n and X is n × s. • If s n… • If 2 < s< n… • If s = 2… • Pt should be different for each encryption • Theoretically, this can be ensured by choosing a different t for each encryption • We did this by requiring t to be a vector representation of a permutation matrix, but this is not the best solution.

  45. The  Function Let n denote the set of n × n permutation matrices. : Zmn  n Ideally, •  is onto •  is 1-1

  46. y = 26n y = n! The  Function Let n denote the set of n × n permutation matrices. : Zmn  n Is it possible? • Zmn = mn • n = n! • Zmn n An “ideal” function DNE.

  47. The  Function Ideas? Awkward silence…

  48. Apologies for the horrible background image pun.

  49. Apologies for the horrible background image pun.

More Related