Uploaded by Shifa Yashmin

Classical Cryptosystems: Assignment Report

advertisement
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
INSTITUTE OF ADVANCE EDUCATION &RESEARCH
(FORMERLY KNOWN AS DARJEELING UNIVERSAL CAMPUS)
Assignment Report on
Topics Name: Classical Cryptosystem
Name of Subject: Cryptography and Information Security
Subject Code: FYCYS403
Branch: B.sc in Cyber Security
Semester:4th semester
Presented By
Name of Student: Arkapriya Das
University Roll Number: 28840423006
University Registration No.: 232882410046
DUC-288
1
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
Classical Cryptosystem
A classical cryptosystem refers to the traditional methods of encryption and
decryption used to secure communication before the advent of modern
cryptographic algorithms. These systems were mainly based on algorithms
and techniques that are relatively simple but have played a foundational role
in the development of cryptography. Classical cryptosystems generally use
symmetric encryption (where the same key is used for both encryption and
decryption) and include methods like substitution, transposition, and modular
arithmetic.
Features of Classical Cryptosystems:
1. Symmetric Key Encryption: Most classical systems use symmetric key
cryptography, where the same key is used to encrypt and decrypt the
message. The security of the system depends on keeping the key secret.
2. Manual Methods: Many of these systems were historically
implemented by hand, using paper, pens, or simple mechanical devices
(like cipher machines).
3. Vulnerability: Classical cryptosystems are generally not secure by
modern standards and are vulnerable to attacks, particularly with the
advent of powerful computational tools.
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
Common Classical Cryptosystems:1. Caesar Cipher
•
•
•
•
Type: Substitution cipher
Description: One of the simplest and most well-known classical encryption
techniques. Each letter in the plaintext is replaced by a letter some fixed number
of positions down or up the alphabet.
Example: If the shift is 3, then "A" becomes "D", "B" becomes "E", and so on. For
example, the message "HELLO" with a shift of 3 would become "KHOOR".
Strength: Very weak because there are only 25 possible shifts for a 26-letter
alphabet, making it highly susceptible to brute-force attacks.
2. Substitution Cipher
•
•
•
•
Type: Substitution cipher
Description: In a substitution cipher, each element of the plaintext is replaced by
a corresponding symbol or letter. Unlike the Caesar cipher, the substitution is not
necessarily by a fixed number but can involve arbitrary mappings.
Example: The key might map "A" to "M", "B" to "T", "C" to "F", and so on. The
plaintext "ABAC" would then translate to "MTFM".
Strength: While this offers more security than a Caesar cipher, it can still be
broken by frequency analysis or pattern recognition, where the most common
letters are mapped based on their frequency in the language.
3. Transposition Cipher (Permutation Cipher)
•
•
•
•
Type: Transposition cipher
Description: In a transposition cipher, the positions of characters in the plaintext
are shifted according to a certain system, but the characters themselves are not
changed.
Example: A common transposition cipher is the Rail Fence Cipher, where the
plaintext is written in a zigzag pattern (like a fence) and then read off horizontally.
Strength: This type of cipher can be vulnerable to analysis if the structure or
pattern of the transposition is discovered.
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
4. Vigenère Cipher
•
•
•
•
Type: Polyalphabetic substitution cipher
Description: An improvement on the Caesar cipher, the Vigenère cipher uses a
keyword to determine the shift for each letter in the plaintext. Each letter of the
plaintext is shifted according to a corresponding letter in the keyword. The
keyword is repeated as necessary.
Example: If the keyword is "KEY" and the plaintext is "HELLO", you shift each
letter by the corresponding letter in the keyword: "H" shifted by "K" (10
positions), "E" shifted by "E" (4 positions), and so on.
Strength: Much stronger than the Caesar cipher because the shifts vary, but still
vulnerable to frequency analysis if the keyword is too short or repetitive.
5. Playfair Cipher
•
•
•
•
Type: Digraph substitution cipher
Description: The Playfair cipher encrypts digraphs (pairs of letters) instead of
single letters. A 5x5 matrix of letters is used as the key, and the rules for
encryption depend on the position of the letters in the matrix.
Example: If you want to encrypt the digraph "HE", you look up the letters in the
matrix and apply specific rules to combine them into a ciphertext.
Strength: Stronger than simple substitution ciphers because it encrypts pairs of
letters, but still vulnerable to known-plaintext and frequency analysis attacks.
6. One-Time Pad (OTP)
•
•
•
•
Type: Symmetric key cipher
Description: The one-time pad is an unbreakable encryption method if used
correctly. It involves a key that is as long as the plaintext message, completely
random, used only once, and kept secret. Each letter of the plaintext is XORed
with a corresponding letter in the key to produce the ciphertext.
Example: If the key is "1101" and the plaintext is "1010", the ciphertext would be
"0111".
Strength: When used correctly (key is truly random, as long as the plaintext, and
used only once), it provides perfect secrecy. However, managing the key
distribution is difficult, and it's impractical for large-scale communication.
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
Strengths and Weaknesses of Classical Cryptosystems:
Strengths:
•
•
Simplicity: Classical cryptosystems are easy to understand and
implement, making them accessible for historical cryptography.
Manual Implementation: Many classical ciphers can be easily used
without the need for sophisticated technology, making them practical
in earlier times.
Weaknesses:
•
•
•
Vulnerable to Frequency Analysis: Many classical ciphers, particularly
substitution-based systems, are vulnerable to frequency analysis,
where attackers use the frequency of letters in the language to break
the code.
Short Key Lengths: Ciphers like the Caesar cipher and Vigenère cipher
are vulnerable to brute-force attacks when the key space is small (e.g.,
a shift of only 3 positions in Caesar or a short keyword in Vigenère).
Lack of Computational Security: Classical cryptosystems are based on
manual techniques and are not designed for protection against modern
computational power, which makes them easily breakable with modern
methods.
THE END
DUC-288
2
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
4
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT
Download