Information Security. Mark Stamp

Чтение книги онлайн.

Читать онлайн книгу Information Security - Mark Stamp страница 18

Information Security - Mark Stamp

Скачать книгу

want to make.

      To encrypt with a double transposition cipher, we first write the plaintext into an array of a given size and then permute the rows and columns according to specified permutations. For example, suppose we write the plaintext attackatdawn into a 3 times 4 array

Start 3 By 4 Matrix 1st Row 1st Column monospace a 2nd Column monospace t 3rd Column monospace t 4th Column monospace a 2nd Row 1st Column monospace c 2nd Column monospace k 3rd Column monospace a 4th Column monospace t 3rd Row 1st Column monospace d 2nd Column monospace a 3rd Column monospace w 4th Column monospace n EndMatrix period

      If we transpose (or permute) the rows according to left-parenthesis 1 comma 2 comma 3 right-parenthesis right-arrow left-parenthesis 3 comma 2 comma 1 right-parenthesis and transpose the columns according to left-parenthesis 1 comma 2 comma 3 comma 4 right-parenthesis right-arrow left-parenthesis 4 comma 2 comma 1 comma 3 right-parenthesis, we obtain

Start 3 By 4 Matrix 1st Row 1st Column monospace a 2nd Column monospace t 3rd Column monospace t 4th Column monospace a 2nd Row 1st Column monospace c 2nd Column monospace k 3rd Column monospace a 4th Column monospace t 3rd Row 1st Column monospace d 2nd Column monospace a 3rd Column monospace w 4th Column monospace n EndMatrix right-arrow Start 3 By 4 Matrix 1st Row 1st Column monospace d 2nd Column monospace a 3rd Column monospace w 4th Column monospace n 2nd Row 1st Column monospace c 2nd Column monospace k 3rd Column monospace a 4th Column monospace t 3rd Row 1st Column monospace a 2nd Column monospace t 3rd Column monospace t 4th Column monospace a EndMatrix right-arrow Start 3 By 4 Matrix 1st Row 1st Column monospace n 2nd Column monospace a 3rd Column monospace d 4th Column monospace w 2nd Row 1st Column monospace t 2nd Column monospace k 3rd Column monospace c 4th Column monospace a 3rd Row 1st Column monospace a 2nd Column monospace t 3rd Column monospace a 4th Column monospace t EndMatrix period

      The ciphertext is read from the final array as

Start 3 By 4 Matrix 1st Row 1st Column monospace upper N 2nd Column monospace upper A 3rd Column monospace upper D 4th Column monospace upper W 2nd Row 1st Column monospace upper T 2nd Column monospace upper K 3rd Column monospace upper C 4th Column monospace upper A 3rd Row 1st Column monospace upper A 2nd Column monospace upper T 3rd Column monospace upper A 4th Column monospace upper T EndMatrix right-arrow Start 3 By 4 Matrix 1st Row 1st Column monospace upper D 2nd Column monospace upper A 3rd Column monospace upper W 4th Column monospace upper N 2nd Row 1st Column monospace upper C 2nd Column monospace upper K 3rd Column monospace upper A 4th Column monospace upper T 3rd Row 1st Column monospace upper A 2nd Column monospace upper T 3rd Column monospace upper T 4th Column monospace upper A EndMatrix right-arrow Start 3 By 4 Matrix 1st Row 1st Column monospace upper A 2nd Column monospace upper T 3rd Column monospace upper T 4th Column monospace upper A 2nd Row 1st Column monospace upper C 2nd Column monospace upper K 3rd Column monospace upper A 4th Column monospace upper T 3rd Row 1st Column monospace upper D 2nd Column monospace upper A 3rd Column monospace upper W 4th Column monospace upper N EndMatrix

      and we see that we have recovered the plaintext, attackatdawn .

      The bad news is that, unlike a simple substitution, the double transposition does nothing to disguise the letters that appear in the message. The good news is that the double transposition appears to thwart an attack that relies on the statistical information contained in the plaintext, since the plaintext statistics are dispersed throughout the ciphertext.

      Even this simplified version of the double transposition is not entirely trivial to break. The idea of smearing plaintext information through the ciphertext is so useful that it is employed by modern block ciphers, as we will see in the next chapter.

      2.3.5 One‐Time Pad

      The one‐time pad, which is also known as the Vernam cipher, is a provably secure cryptosystem. Historically it has been used in various times and places, but it's not practical for most situations. However, it does nicely illustrate some important concepts that we'll see again later.

Letter e h i k l r s t
Binary 000 001 010 011 100 101 110 111

      Suppose that Trudy, who is working as a Nazi spy in London during World War II, wants to use a one‐time pad to encrypt the plaintext message

monospace heilhitler period

      She first consults Table 2.1 to convert the plaintext letters to the bit string

upper P equals left-parenthesis 001 000 010 100 001 010 111 100 000 101 right-parenthesis period

Скачать книгу