Escolar Documentos
Profissional Documentos
Cultura Documentos
Upasana
Qn.-1 Encryption of message using hill cipher Message -"meet me at the usual place at ten rather than eight oclock" Digit representation[12,4,4,19,12,4,0,19,19,7,4,20,18,20,0,11,25,11,0,2,4,0,19,19,4,13,17,0,19,7,4,17,19,7,0, 13,4,8,6,7,19,14,2,11,14,2,10]
Key9 5 4 7
Hill cipher encryption is C=PKmod26 Encrypting the 2 letters at a time C1,C2= 9 12 4 * 5 4 7 mod 26
=(138 76)mod 26 = (8 24) =(i y) By using the method the encrypted message will become Encrypted message[8,24,1,19,8,24,17,3,24,21,6,0,2,4,3,25,20,21,10,14,10,16,6,1,23,3,23,16,24,21,17,5,24,2 1,13,13,24,20,11,21,7,18,21,7,6,18,20,20] Encrypted letters- iybt iy rd yvg acecz uvkok qg bxd xqyvrf yvnn yulvh svhgsuu (b) inverse of matrix k Det(k)=43 Adj(k)= 7 -5 -4 9
So Inverse(k)= 1/43 7 -5 -4 9
Decryption of the cipher text P=D(Inverse(k)mod26) So the resulting plaintext will be "meet me at the usual place at ten rather than eight oclock" Qn.-2
5=s,3=p,=e,=d,0=a,)=t,6=f,*=k,;=l,4=h,8=g, 2=c,.=m,=n,]=p,:=q,(=j,9=I,?=o,=r,1=u
So the encrypted message will be
left-hand input and the sub key for this round. So, at each round, only one new 32-bit block is created. If we label each new block mi(2<=i<=17), then the intermediate message halves are related as follows: mi+1 = mi-1 { f(mi, Ki), i = 1, 2, , 16 In differential cryptanalysis, we start with two messages, and, with a known XOR difference delta m = m XOR m and consider the difference between the intermediate message halves: Delta m=mi-1 XORmi-1 =[mi-1 XOR f(mi,ki)] XOR [mi-1 XOR f(mI,ki)] Delta mi-1 XOR [(f(mi,ki) XOR f(mI,ki)] Linear Cryptanalysis This attack is based on finding linear approximations to describe the transformations performed in DES.This method can find a DES key given 2^43 known plaintexts, as compared to 2^47 chosen plaintexts for differential cryptanalysis. Although this is a minor improvement, because it may be easier to acquire known plaintext rather than chosen plaintext, it still leaves linear cryptanalysis infeasible as an attack on DES. So far, little work has been done by other groups to validate the linear cryptanalytic approach. e.g For a cipher with -bit plaintext and ciphertext blocks and an -bit key, let the plaintext block be labelled P[1], P[n], the cipher text block C[1], C[n], and the key K[1], , K[m]. Then A[I,j,..,k]=A[i] XOR A[j] XOR..XOR A[k]. The objective of linear cryptanalysis is to find an effective linear equation of the form: P(a1,a2,a3..aa) XOR C[b1,b2,b3bb]=K[c1,c2,c3.cc]. Qn.-3 (b) Given key sizes (32, 56, 128, 168 bit keys): Number of alternative keys for 32 bit (i) Alternatives key 2^32=4294967296 (ii) Time required at 1 decryption/s Suppose 2^56 take 1sec to decrypt then time taken=(1/2^56)*2^32=1/2^22sec =(2.38*10^-7)10^-6 s Number of alternative keys for 56 bit (i) Alternatives key 2^56=72057594037927936 (ii) Time required at 1 decryption/s Suppose 2^56 take 1sec to decrypt then time taken=(1/2^56)*2^56=1sec =1*10^-6 s Number of alternative keys for 128 bit
(i) Alternatives key 2^128 (ii) Time required at 1 decryption/s Suppose 2^56 take 1sec to decrypt then time taken=(1/2^56)*2^128 =2^56sec =2^56*10^-6 s Number of alternative keys for 32 bit (i) Alternatives key 2^168 (ii) Time required at 1 decryption/s Suppose 2^56 take 1sec to decrypt then time taken=(1/2^56)*2^168 =2^122sec =2^122*10^-6 s
(a). taking the binary representation of key 00000001 00100011 10001001 10101011 Applying the PC-1 01000101 11001101 01100111 11101111
0010101 0011110
0100000 0000000
Now taking the C0 and D0 of 28 bit each C0 1111000 0110011 0010101 0100000 D0 1010101 0110011 0011110 0000000 Applying the one left shift to get C1 and D1 C1 1110000 1100110 0101010 1000001 D1 0101010 1100110 0111100 0000001
10011011
01001001
10100101
Now the plaintext becomes IP. And the IP is 11001100 00000000 11001100 11110000 10101010 11110000
11111111 10101010
Splitting the IP L0 11001100 00000000 11001100 11111111 (32 bit) R0 11110000 10101010 11110000 10101010 (32 bit) (c). Applying the expansion on R0
Now the R0 become E (R0) of 48 bit 01111010 00010101 01010101 01111010 (d). Calculating E(R0 0111101 ) 0 K1 0000101 1 A 0111000 1 the A= E(R0) XOR K1 0001010 010101 011110 1 01 10 0000001 011001 100110 0 11 11 0001011 001100 111000 1 10 01
00010101
01010101
(e). S-box substitution Combining the above result in 6 bit form for S-box substitution 01110 01000 01110 11001 11100 01010 11001 11000 0 1 0 0 0 1 1 0 Calculating the S-box value
Row and Column Row 0 Column 13 Row 1 Column 8 Row 0 Column 13 Row 2 Column 9 Row 2 Column 12 Row 1 Column 10 Row 3 Column 9
Value 9 12 4 1 6 13 5
110000
Row 2 Column 8
0000
(f). Values after S-box substitution S-box 1001 1100 0100 0001 0110 1101 0101 0000
(g). Applying the permutation to get P(S-box) S-box 1001 1100 0100 0001 0110 1101 0101 0000
P(S-box) 1001 0010 1001 1101 0010 0000 1001 1110 (h). Calculating the P(S-box) 1001 0010 L0 1100 1100 R1 0101 1110 R1=P(S-box) XOR L0 1001 1101 0010 0000 1001 1110 0000 0000 1100 1100 1111 1111 1001 1101 1110 1100 0110 0001
Now the R1 is 0101 1110 1001 1101 1110 1100 0110 0001 And L1 is 1111 0000 1010 1010 1111 0000 1010 1010 (i). Calculating the cipher text by combining L1 and R1 FOAAFOAA5E9DEC61