Wednesday, June 5, 2019

An Introduction To Cryptology Computer Science Essay

An Introduction To Cryptology Computer Science Essay cryptanalytics was use only for military and diplomatical communication until the bob upment of public mainstay cryptology. Secrecy is one of most important requirement for whatsoever communication and it becomes more important when the content of communication is for military and diplomatic purpose.Hieroglyphs used by Egyptians argon earliest known example of cryptograph in 1900 BC. These hieroglyphics were used to issue the stories of the life of kings and describe the great acts of his life. virtually 500 BC Hebrew scholars used mono alphabetic substitution picture such as Atbash cipher. just about 400 BC the Spartans also demonstrable a Scytale cipher that used ribbons of parchment for writing any secret message after wrapping it just about a cylindrical rod named as Scytale. In second one C BC Greek historian Polybius invented Polybius full-blooded a type of substitution ciphers. Around 1st century BC the Roman emperor Julius Ceaser used the substitution cipher named after him as Ceaser look. The Caesar Cipher is a Monoalphabetic type Cipher.Around 9th century AD the Arab Mathematician Ab Ysuf Yaqb ibn Isq al-Kind popularly known as Al-Kindi published the first text book on cryptnalysis of ciphers named Risalah fi Istikhraj al-Muamma (On Deciphering Cryptographic Messages). This book mountain be stated as the pioneer of the medieval cryptography. In this book Al-Kindi described the frequency analysis technique for deciphering substitution ciphers and few polyalphabetic substitution ciphers. The relational frequency of symbols is used in Frequency analysis to decode the message. Al-Kindi used this technique on Quran to understand the meaning for religious purpose.The field of cryptography had not do any signifi erectt development until 15th century when the Italian mathematician Leon Battista Alberti known as The Father of Western Cryptology, developed the concept of polyalphabetic su bstitution. Although he had not made any practical cipher but by using this concept a practical Poly-Alphabetic substitution cryptographic system was developed by French cryptographer BLAISE DE VIGENERE, which was named after him and called as VIGENERE SQUARE. For a long time this cipher was believed to be infrangible but around 1854, CHARLES BABBAGE, an English mathematician and engineer, repair known as father of Computer Science for his development work of difference engine that become the first mechanical computer, successfully cracked the Vigenere Square Cipher by using the method of statistical analysis.Cryptography was widely used in World War I and II. The most famous attendant of World War I is of German foreign Minister Zimmerman Telegram that changed the whole World War I and involved the America in manhood war which was neutral till that date and Germany was finally defeated.Unlike the past cryptographic algorithms in which the main concentration was on hiding the a lgorithm or technique the modern ciphers needed the technique or algorithm which can be widely used and whose security should not be compromised if the algorithm is known.To figure and decrypt the information, a gravestone is used in modern cryptographic algorithms which convert the message and data in such format which are forgetful to the receiver through encryption and then return them to the original form through decryption process.Claude E. Shannon, father of modern cryptography has contributed his work to cryptography in the form of A mathematical theory of cryptography and A Communications Theory of Secrecy Systems which are considered as the foundation of modern cryptography.In seventies the field of cryptography has witnessed both major developments. First was the development of data Encryption Standard (DES) by IBM, which was accepted as standard after some modification by the NSA in 1977 and it was later replaced by the Advanced Encryption Standard (AES) in 2001. The second development which is more important and that changed the whole running(a) process and use of cryptography is the development of customary Key Cryptography. It was started with the publication of the paper titled New Directions in Cryptography, by Whitfield Diffie and Martin Hellman and similar development made by Ron Rivest, Adi Shamir and Leonard Adleman, who were the first to publicly describe the algorithm in 1977 and it was named after them as RSA algorithm.An Introduction to CryptologyThe word cryptology is a combination of two greek words, kryptos, which means hidden and logos means study. Cryptology is as old as writing itself and it has been primarily for thousands of years it had been used for securing military and diplomatic communications.The field of Cryptology can be further classify into two main fields, namely Cryptography and Cryptanalysis. On the one hand the cryptographers try to develop a system or algorithm that will be safe and cover for communica tion while on the other hand the cryptanalysts seek weaknesses in the developed system and try to breach the security of the system. The two works can be considered against each other but the work of cryptanalysts cannot be perpetually negative and they can work for the betterment of the developed system by trying to find out the weaknesses in the cryptographic algorithm and fix it.CryptographyCryptography is the technique for writing secretly so that the unintended recipients cannot comprehend the original message. It transforms the information into such an unintelligible form so that illegitimate or unintended users cannot devise the original meaning of the message and it looks like a garbage value for them. But the main consideration during the transformation is that the process mustiness be reversible so that the intended user can get the original information after applying the original key and process. This is the traditional use of cryptography but in modern times the scope of cryptography has widened.CryptanalysisCryptanalysis is the field of study that deals with the techniques that verify and assert the security of the protocol or system. The objective of the cryptanalysis techniques is to assess the security claims of the cryptographic algorithm or system. Cryptanalysts try to develop an flak catcher to show that claimed security level is not achieved referable to weaknesses in the cryptographic system.It is difficult to define when a cryptosystem is broken. Generally, efficiency of an attack is compared with the efficiency of exhaustive key search attack and if the efficiency of attack is slight than it then it is considered an attack on the cryptographic system.Classification of attacks can be made on the basis of the amount of information available to attacker Ciphertext-only attack The attacker has access to the ciphertext only. Known-plaintext attack In this case the attacker has access to both the plaintext and the corresponding ciphertext . This attack can be employed when the attacker has express access to the encrypting cheat. Chosen-Plaintext attack The attacker selects a plaintext and generates corresponding ciphertext using the correct key. This can only be applied if the attacker has access to encryption device and is able to encrypt a message of choice using this device. The goal of such type of attack is to discover the secret key or algorithm for any given encrypted text. Chosen-Ciphertext attack The attacker selects a ciphertext and generates corresponding plaintext using the correct key. This can only be possible if the attacker has access to decryption device and is able to decrypt a message of choice using this device. The goal of such type of attack is also to discover the secret key or algorithm for any given encrypted text.The goals of such attacks in general can be classified as secret key recovery, plaintext recovery without acquire the key or the discovery of the encryption/decryption algorithm. Classification of Cryptographic primitivesUnkeyed CryptographyUnkeyed cryptosystem is that cryptosystem which does not use any key or parameter for application. Examples of such system are one-way functions, cryptographic hash functions, and random bit generators.Public Key or Asymmetric CryptographyPublic Key or Asymmetric Key cryptography is the latest addition to the cryptographic techniques that has changed the basic uses of cryptography. Two different keys are used for encryption and decryption in Public or asymmetric key cryptography. Public key is being used for encryption and it is known to everyone and is freely distributable but the encrypted message can only be decrypted by using the private key corresponding to public key which is known only to the authorized person. Public key cryptography evolved to solve the problems of Secret key cryptography but it is very slow in comparison to secret key cryptography. Public key cryptography cannot be used for steep volume encrypt ion. Therefore we use combination of Public and clannish Key cryptography for practical applications.Secret Key or Private Key or Symmetric Key CryptographyIn Symmetric Key or Secret Key cryptography, only a single key is used to encrypt and decrypt. It is also called Private Key cryptography. The main problem of the secret key cryptography is the sharing of same key by sender and receiver. In the case of unsecure channels, there is no mean to exchange key firmly. The secret key must be shared using any secure channel before communication take place and for such purpose Public Key cryptography is generally used.An overview of Symmetric AlgorithmsSymmetric key cryptography is still highly used due to its efficiency and is generally used where high volume of data is encrypted. Symmetric key primitives can be classified into two basic designs namely Block Cipher and pelt Cipher.Block CiphersBlock cipher is a symmetric key encryption which divides the input rain buckets of plaintex t into rigid size of blocks, generally 64, 128 or 256 bits long and using a fixed transformation (substitutions and permutations) on every block on by one. These transformations are repeated many times to obtain highly nonlinear output bits. The two most popular block ciphers are DES and AES.Modes of operationA block cipher performs fixed transformations on any block of data and results in same ciphertext for same plaintext, hence can only be considered secure for a single block of data. A mode of operation is actually a way of encryption using a block cipher securely for data more than one block. The Block ciphers are used in one of the five modes to operate for breaking the linearity. A cryptographic mode ordinarily consists of basic cipher, some sort of feedback, and some simple operations.Electronic Code Book (ECB) ModeCipher block Chaining (CBC) ModeCipher Feedback (CFB) Mode rig Feedback (OFB) ModeThe counter (CTR) ModeStream CiphersSymmetric Cryptographic systems encrypt pl aintext messages unit by unit, and unlike block ciphers, which encrypt block of plaintext using fixed transformation, Stream Ciphers encrypt individual units or character of plaintext using a time-varying transformation.It takes the secret key and initialization vector (IV) as input and generates a malingerer random sequence of digits called key period using pseudo random generator, usually part of Stream Ciphers. ciphertext digits are generated by XORing the keystream digits with the plaintext digits.The stream ciphers are classified into two split as synchronous and asynchronous stream ciphers on the basis of application of internal state in further encryption of digits. Stream ciphers have vie an important role in cryptography and still being used due to its efficiency and especially, in hardware implementations where hardware resources are restricted.Stream ciphers are the main topic of research in this thesis and it will be discussed more comprehensively in later chapters. F or a general description of stream ciphers, see chapter 2.Scope of CryptologyToday the cryptology is not just limited to data encryption and decryption as mentioned above, it has a wide regurgitate of usages. The field of cryptology is an emerging field in which continuous expansions and modifications are taking place. The field of cryptography was evolved for military usage but it has now spread out and is highly used in civilian applications also. Cryptography is the study of mathematical techniques, algorithms and protocols that can try four basic services for information security, namely privacy, authentication, data integrity and non-repudiation.Privacy or confidentiality The basic goal of cryptography is to keep the information secret from unauthorized persons. Cryptography is the most common mean to provide confidentiality or privacy to the information.Data justice Data integrity means that system must be able to detect the unauthorized manipulation of the data. Data mani pulation refers to insertion, deletion or substitution of data.Authentication Authentication service provides the ability to correctly identify the parties in the communication and origin of the data.Non-Repudiation Non-repudiation service prevents an entity from denying any activity done by itself or existence of a communication at any later stage in case of any dispute.Stream Cipher StandardizationMajor effort towards standardization of cryptographic primitives was started by European Commission research project funded from 2000-2003 in form of NESSIE (New European Schemes for Signatures, Integrity and Encryption). In March 2000 NESSIE urged the public for submissions of cryptographic primitives, and against this call 42 primitives were submitted in February 2003. The submissions were selected in different categories for standardization. Various cryptographic primitives were standardized except Stream Ciphers and no(prenominal) of the six submitted stream ciphers were considered as upto standard. During this period another organization, the International Standards Organizations ISO/IEC 18033 also initiated a similar project for standardization and selected two stream ciphers SNOW 2.0 and MUGI. separate than these two efforts a Cryptography Research and Evaluation Committee was set up by the Japanese Government which started a project CRYPTREC in 2001 to label and recommend the cryptographic primitives in different category for use. In the stream cipher category, three ciphers were recommended that are MUGI, MULTI-S01 and RC4 (128-bit keys only). But, Later on these ciphers were also found to be susceptible to the cryptanalytic attacksThis failure on the side of cryptographic primitives in stream cipher category prompted Adi Shamir in 2004 RSA Data Security Conference to question, whether there is a need for Stream Ciphers or not. He also defined two areas were Stream Ciphers can still be useful where exceptionally high throughput is required in software a nd exceptionally low resource consumption is required in hardware.To explore the Stream Cipher condition and to develop a state of art stream cipher which can secure and fulfill the above mentioned requirements, ECRYPT launched the eSTREAM project in 2004.eSTREAM made a call for submission in two categories hardware based and software based stream ciphers. In response to this call 34 ciphers were submitted in both the categories. In different phases of this project, cipher profiles were declared. The final profile issued in January 2012, seven ciphers were selected. The selected ciphers are HC-128, Rabbit, Salsa20/12 and SOSEMANUK in profile 1 (Software based Ciphers) and Grain v1, MICKEY 2.0 and Trivium in profile 2 (Harware based cipher). Even after these standardization efforts, many weaknesses were found in these ciphers.This state of Stream Ciphers has led me to involve in the research of the Stream Cipher and work towards a secure and efficient Stream Cipher.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.