Information Security. Mark Stamp

Читать онлайн книгу.

Information Security - Mark Stamp


Скачать книгу
2nd Row 1st Column monospace upper C 2nd Column monospace upper K 3rd Column monospace upper A 4th Column monospace upper T 3rd Row 1st Column monospace upper D 2nd Column monospace upper A 3rd Column monospace upper W 4th Column monospace upper N EndMatrix"/>

      and we see that we have recovered the plaintext, attackatdawn .

      The bad news is that, unlike a simple substitution, the double transposition does nothing to disguise the letters that appear in the message. The good news is that the double transposition appears to thwart an attack that relies on the statistical information contained in the plaintext, since the plaintext statistics are dispersed throughout the ciphertext.

      Even this simplified version of the double transposition is not entirely trivial to break. The idea of smearing plaintext information through the ciphertext is so useful that it is employed by modern block ciphers, as we will see in the next chapter.

      2.3.5 One‐Time Pad

      The one‐time pad, which is also known as the Vernam cipher, is a provably secure cryptosystem. Historically it has been used in various times and places, but it's not practical for most situations. However, it does nicely illustrate some important concepts that we'll see again later.

Letter e h i k l r s t
Binary 000 001 010 011 100 101 110 111

      Suppose that Trudy, who is working as a Nazi spy in London during World War II, wants to use a one‐time pad to encrypt the plaintext message

monospace heilhitler period

      She first consults Table 2.1 to convert the plaintext letters to the bit string

upper P equals left-parenthesis 001 000 010 100 001 010 111 100 000 101 right-parenthesis period

      We denote the XOR of bit x with bit y as x circled-plus y. Since x circled-plus y circled-plus y equals x, decryption is accomplished by XOR‐ing the same key with the ciphertext. Modern symmetric ciphers utilize this magical property of the XOR in various ways, as we'll see in the next chapter.

      Now suppose that Trudy uses the key

upper K equals left-parenthesis 111 101 110 101 111 100 000 101 110 000 right-parenthesis

      which is the correct length to encrypt her message above. Then to encrypt, Trudy computes the ciphertext upper C as

StartLayout 1st Row 1st Column Blank 2nd Column monospace h 3rd Column monospace e 4th Column monospace i 5th Column monospace l 6th Column monospace h 7th Column monospace i 8th Column monospace t 9th Column monospace l 10th Column monospace e 11th Column monospace r 2nd Row 1st Column upper P 2nd Column 001 3rd Column 000 4th Column 010 5th Column 100 6th Column 001 7th Column 010 8th Column 111 9th Column 100 10th Column 000 11th Column 101 3rd Row 1st Column upper K 2nd Column 111 3rd Column 101 4th Column 110 5th Column 101 6th Column 111 7th Column 100 8th Column 000 9th Column 101 10th Column 110 11th Column 000 4th Row 1st Column upper C 2nd Column 110 3rd Column 101 4th Column 100 5th Column 001 6th Column 110 7th Column 110 8th Column 111 9th Column 001 10th Column 110 11th Column 101 5th Row 1st Column Blank 2nd Column monospace s 3rd Column monospace r 4th Column monospace l 5th Column monospace h 6th Column monospace s 7th Column monospace s 8th Column monospace t 9th Column monospace h 10th Column monospace s 11th Column monospace r EndLayout

      Converting these ciphertext bits back into letters, the ciphertext message to be transmitted is srlhssthsr .

      When her fellow Nazi spy, Eve, receives Trudy's message, she decrypts it using the same shared key and thereby recovers the plaintext

StartLayout 1st Row 1st Column Blank 2nd Column monospace s 3rd Column monospace r 4th Column monospace l 5th Column monospace h 6th Column monospace s 7th Column monospace s 8th Column monospace t 9th Column monospace h 10th Column monospace s 11th Column monospace r 2nd Row 1st Column upper C 2nd Column 110 3rd Column 101 4th Column 100 5th Column 001 6th Column 110 7th Column 110 8th Column 111 9th Column 001 10th Column 110 11th Column 101 3rd Row 1st Column upper K 2nd Column 111 3rd Column 101 4th Column 110 5th Column 101 6th Column 111 7th Column 100 8th Column 000 9th Column 101 10th Column 110 11th Column 000 4th Row 1st Column upper P 2nd Column 001 3rd Column 000 4th Column 010 5th Column 100 6th Column 001 7th Column 010 8th Column 111 9th Column 100 10th Column 000 11th Column 101 5th Row 1st Column Blank 2nd Column monospace h 3rd Column monospace e 4th Column monospace i 5th Column monospace l 6th Column monospace h 7th Column monospace i 8th Column monospace t 9th Column monospace l 10th Column monospace e 11th Column monospace r EndLayout

      Let's consider a couple of scenarios. First, suppose that Trudy has an enemy, Charlie, within the Nazi spy organization. Charlie claims that the actual key used to encrypt Trudy's message is

upper K prime equals left-parenthesis 101 111 000 101 111 100 000 101 110 000 right-parenthesis period

      Eve decrypts the ciphertext using the key given to her by Charlie and obtains

StartLayout 1st Row 1st Column Blank 2nd Column monospace s 3rd Column monospace r 4th Column monospace l 5th Column monospace h 6th Column monospace s 7th Column monospace s 8th Column monospace t 9th Column monospace h 10th Column monospace s 11th Column monospace r 2nd Row 1st Column upper C 2nd Column 110 3rd Column 101 4th Column 100 5th Column 001 6th Column 110 7th Column 110 8th Column 111 9th Column 001 10th Column 110 11th Column 101 3rd Row 1st Column upper K prime 2nd Column 111 3rd Column 101 4th Column 110 5th Column 101 6th Column 111 7th Column 100 8th Column 000 9th Column 101 10th Column 110 11th Column 000 4th Row 1st Column upper P prime 2nd Column 001 3rd Column 000 4th Column 010 5th Column 100 6th Column 001 7th Column 010 8th Column <hr><noindex><a href=Скачать книгу