Page 44 - DCAP516_COMPUTER_SECURITY
P. 44

Computer Security




                    Notes          4.  Encryption methods have historically been divided into ……………. categories.
                                   5.  In a ………………… cipher each letter or group of letters is replaced by another letter or
                                       group of letters.

                                   6.  …………………………………. ciphers, in contrast, record the letters but do not disguise
                                       them. Substitution ciphers and codes preserve the order of the plaintext but disguise them.
                                       Transposition ciphers, in contrast, record the letters but do not disguise them.

                                   4.3 Data Encryption Standard

                                   In January 1977, the US government adopted a product cipher developed by IBM as its official
                                   standard for unclassified information. A number of manufacturers implemented this encryption
                                   algorithm known as the ‘Data Encryption Standard’ (National Bureau of Standards, 1977) in
                                   hardware, thus making it fast. The availability of fast and cheap hardware, in turn, has stimulated
                                   many other users to adopt DES. The explanation of the DES algorithm is beyond the scope of this
                                   book. One way to strengthen DES is to insert random characters into the plaintext according to
                                   the well defined rules. In addition, dummy messages can be inserted between the real ones
                                   accordingly to get another rule. This principle is called a null cipher. Null ciphers are waste of
                                   bandwidth but they are difficult to break. On leased private lines, there is something garbage
                                   transmitted whenever the line is idle.

                                   Key Protection

                                   Although hiding the key from intruder is important, it is equally important to hide the key from
                                   oneself. A corporation may not wish to delegate unlimited authority to any one employee. For
                                   example, banks do not give the complete vault combination to any one employee. There are
                                   techniques for sharing cryptographic keys among multiple employees in flexible ways (Shamir,
                                   1979).

                                   Now the problem is of setting up a secure communication between people who never earlier
                                   communicated. Until Defie and Hillman’s (1976) article, all cryptographers simply took for
                                   granted that both the encryption and decryption keys must be kept secret. What Defie and
                                   Hillman proposed was to use an encryption algorithm, ‘E’, and a decryption algorithm, D, with
                                   E and D chosen so that deriving D even given a complete description of E would be effectively
                                   impossible. There are three requirements for this:
                                   1.  D (E (P)) = P.

                                   2.  It is exceedingly difficult to deduce D from E.
                                   3.  E cannot be broken by a chosen plaintext attack.
                                   The method works like this – any person or organization wishing to receive secret messages,
                                   first devices two algorithms, E and D, meeting the above requirements. The encryption algorithm
                                   or key is then made public, hence named ‘public key encryption’. This might be done by putting
                                   it in a file that anyone who wanted to, could read.
                                   For example, A and B had no previous contact and want to establish secure communication. Both
                                   A and B encryption keys, EA and EB respectively, are assumed to be in publicly readable file.
                                   Now A takes his first message say P, computes EB (p) and sends it to B. Now B decrypts it by
                                   applying its secret key DB [i.e., he computes DB (EB (P)) = P). No one else can read the encrypted
                                   message, EB (P), because the encryption system is assumed strong and too difficult to derive DB
                                   from the publicly known EB.






          38                                LOVELY PROFESSIONAL UNIVERSITY
   39   40   41   42   43   44   45   46   47   48   49