REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT INSTITUTE OF ADVANCE EDUCATION &RESEARCH (FORMERLY KNOWN AS DARJEELING UNIVERSAL CAMPUS) Assignment Report on Topics Name: Classical Cryptosystem Name of Subject: Cryptography and Information Security Subject Code: FYCYS403 Branch: B.sc in Cyber Security Semester:4th semester Presented By Name of Student: Arkapriya Das University Roll Number: 28840423006 University Registration No.: 232882410046 DUC-288 1 REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT Classical Cryptosystem A classical cryptosystem refers to the traditional methods of encryption and decryption used to secure communication before the advent of modern cryptographic algorithms. These systems were mainly based on algorithms and techniques that are relatively simple but have played a foundational role in the development of cryptography. Classical cryptosystems generally use symmetric encryption (where the same key is used for both encryption and decryption) and include methods like substitution, transposition, and modular arithmetic. Features of Classical Cryptosystems: 1. Symmetric Key Encryption: Most classical systems use symmetric key cryptography, where the same key is used to encrypt and decrypt the message. The security of the system depends on keeping the key secret. 2. Manual Methods: Many of these systems were historically implemented by hand, using paper, pens, or simple mechanical devices (like cipher machines). 3. Vulnerability: Classical cryptosystems are generally not secure by modern standards and are vulnerable to attacks, particularly with the advent of powerful computational tools. REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT Common Classical Cryptosystems:1. Caesar Cipher • • • • Type: Substitution cipher Description: One of the simplest and most well-known classical encryption techniques. Each letter in the plaintext is replaced by a letter some fixed number of positions down or up the alphabet. Example: If the shift is 3, then "A" becomes "D", "B" becomes "E", and so on. For example, the message "HELLO" with a shift of 3 would become "KHOOR". Strength: Very weak because there are only 25 possible shifts for a 26-letter alphabet, making it highly susceptible to brute-force attacks. 2. Substitution Cipher • • • • Type: Substitution cipher Description: In a substitution cipher, each element of the plaintext is replaced by a corresponding symbol or letter. Unlike the Caesar cipher, the substitution is not necessarily by a fixed number but can involve arbitrary mappings. Example: The key might map "A" to "M", "B" to "T", "C" to "F", and so on. The plaintext "ABAC" would then translate to "MTFM". Strength: While this offers more security than a Caesar cipher, it can still be broken by frequency analysis or pattern recognition, where the most common letters are mapped based on their frequency in the language. 3. Transposition Cipher (Permutation Cipher) • • • • Type: Transposition cipher Description: In a transposition cipher, the positions of characters in the plaintext are shifted according to a certain system, but the characters themselves are not changed. Example: A common transposition cipher is the Rail Fence Cipher, where the plaintext is written in a zigzag pattern (like a fence) and then read off horizontally. Strength: This type of cipher can be vulnerable to analysis if the structure or pattern of the transposition is discovered. REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT 4. Vigenère Cipher • • • • Type: Polyalphabetic substitution cipher Description: An improvement on the Caesar cipher, the Vigenère cipher uses a keyword to determine the shift for each letter in the plaintext. Each letter of the plaintext is shifted according to a corresponding letter in the keyword. The keyword is repeated as necessary. Example: If the keyword is "KEY" and the plaintext is "HELLO", you shift each letter by the corresponding letter in the keyword: "H" shifted by "K" (10 positions), "E" shifted by "E" (4 positions), and so on. Strength: Much stronger than the Caesar cipher because the shifts vary, but still vulnerable to frequency analysis if the keyword is too short or repetitive. 5. Playfair Cipher • • • • Type: Digraph substitution cipher Description: The Playfair cipher encrypts digraphs (pairs of letters) instead of single letters. A 5x5 matrix of letters is used as the key, and the rules for encryption depend on the position of the letters in the matrix. Example: If you want to encrypt the digraph "HE", you look up the letters in the matrix and apply specific rules to combine them into a ciphertext. Strength: Stronger than simple substitution ciphers because it encrypts pairs of letters, but still vulnerable to known-plaintext and frequency analysis attacks. 6. One-Time Pad (OTP) • • • • Type: Symmetric key cipher Description: The one-time pad is an unbreakable encryption method if used correctly. It involves a key that is as long as the plaintext message, completely random, used only once, and kept secret. Each letter of the plaintext is XORed with a corresponding letter in the key to produce the ciphertext. Example: If the key is "1101" and the plaintext is "1010", the ciphertext would be "0111". Strength: When used correctly (key is truly random, as long as the plaintext, and used only once), it provides perfect secrecy. However, managing the key distribution is difficult, and it's impractical for large-scale communication. REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT Strengths and Weaknesses of Classical Cryptosystems: Strengths: • • Simplicity: Classical cryptosystems are easy to understand and implement, making them accessible for historical cryptography. Manual Implementation: Many classical ciphers can be easily used without the need for sophisticated technology, making them practical in earlier times. Weaknesses: • • • Vulnerable to Frequency Analysis: Many classical ciphers, particularly substitution-based systems, are vulnerable to frequency analysis, where attackers use the frequency of letters in the language to break the code. Short Key Lengths: Ciphers like the Caesar cipher and Vigenère cipher are vulnerable to brute-force attacks when the key space is small (e.g., a shift of only 3 positions in Caesar or a short keyword in Vigenère). Lack of Computational Security: Classical cryptosystems are based on manual techniques and are not designed for protection against modern computational power, which makes them easily breakable with modern methods. THE END DUC-288 2 REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT 4 REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT REPORT WRITING ON ASSIGNMENT (CA2)-MAKAUT