Page 42 - DCAP516_COMPUTER_SECURITY
P. 42

Computer Security




                    Notes          To make the security better, need to introduce multiple cipher alphabets, to be used in rotation,
                                   known as poly alphabetic cipher. Like the monoalphabetic cipher, this cipher also has a key,
                                   usually a short, easy to remember word or phrases, rather than a string of 26 distinct character.
                                   Substitution cipher need not always work on one letter at a time. The plain text can be encoded
                                   as two characters at a time where first character indicates the row and second column. The
                                   intersection of the 26 × 26 table is the encrypted value. If 26 different tables are prepared, the
                                   trigrams can be encrypted as units by using the first letter of the each trigram to start a table.
                                   So the units encrypted become longer and larger the cipher text begin to resemble like a ‘Code’.
                                   Cipher encrypts a fixed size unit of plaintext with each operation whereas the code encrypts a
                                   single variable-length linguistic unit, typically a single word or phrase. Breaking a code is like
                                   breaking a giant monoalphabetic cipher. Codes have a disadvantage of requiring large books,
                                   which cannot be replaced easily.

                                   4.1.2 Transposition Ciphers

                                   Substitution ciphers and codes preserve the order of the plaintext but disguise them. Transposition
                                   ciphers, in contrast, record the letters but do not disguise them.

                                   Figure 4.1 depicts a common transposition cipher, the columnar cipher. The cipher is keyed by
                                   a non-repeated worker phrase. In this example MEGA BUCK is the key. The purpose of the key
                                   is to number the columns, column L being under the key letter closest to the start of the alphabet
                                   and so on. The plaintext is written horizontally in rows. The cipher text is read out by columns,
                                   starting with the column whose key letter is the lowest.

                                                           Figure 4.1: A Transposition Cipher

                                       M   E  G  A  B  U  C  K         :      the key code
                                                                              Length of key = 8
                                       7  4  5  1  2  8  3  6          :      the numbering of rows
                                                8
                                       P  L  E  A  S  E  T  R
                                       A  N  S  F  E  R  O  N          Cipher text :
                                       E  M  I  L  L  I  O  N          A F L L S K S O S E L A W A T A T O O S S C T C
                                                                       L N M O M A N T
                                    8  D  O  L  L  A  R  S  T          E S I L Y N T W R N N T S O W D P A E D O B U O
                                                                       E R I R I C X B
                                       O  M   Y  S  W  I  S  S
                                       B  A  N  K  A  C  C  O
                                       U  N  T  S  T  X  T  W
                                       O  T  W  O  A  B  C  D

                                   Although modern cryptography uses the same basic areas as traditional cryptography, i.e.,
                                   transposition and substitution, its emphasis is different. Traditionally cryptographers have
                                   used simple algorithms and relied on long keys for their security but now encryption algorithm
                                   is so complex that even if the crypt analyst acquires the vast manuals of encrypted text of his own
                                   choosing, he will not be able to make any sense of it.




                                      Task  Differentiate between substitution and transposition cipher.





          36                                LOVELY PROFESSIONAL UNIVERSITY
   37   38   39   40   41   42   43   44   45   46   47