Applications Of Encryptionand Decryption Scheme By Using Binary, Hexa And Octa Systems

Similar documents
MATH3302 Cryptography Problem Set 2

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Perfectly-Secret Encryption

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

10 Modular Arithmetic and Cryptography

Discrete Mathematics GCD, LCM, RSA Algorithm

Public Key Cryptography

Classical Cryptography

Notes 10: Public-key cryptography

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

Number theory (Chapter 4)

CPSC 467b: Cryptography and Computer Security

Introduction to Modern Cryptography. Benny Chor

ENEE 457: Computer Systems Security 10/3/16. Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange

Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009. References. References

Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

Chapter 2. A Look Back. 2.1 Substitution ciphers

Public-Key Encryption: ElGamal, RSA, Rabin

Public-Key Cryptosystems CHAPTER 4

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Public Key Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Multi-Map Orbit Hopping Chaotic Stream Cipher

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

RSA RSA public key cryptosystem

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Cryptography. pieces from work by Gordon Royle

CSCI3381-Cryptography

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

CRYPTOGRAPHY AND NUMBER THEORY

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Week 7 An Application to Cryptography

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

1 Indistinguishability for multiple encryptions

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Solution to Midterm Examination

Introduction to Cryptology. Lecture 2

Chapter 2 : Perfectly-Secret Encryption

Lecture Notes. Advanced Discrete Structures COT S

Lecture 28: Public-key Cryptography. Public-key Cryptography

Lecture 2: Perfect Secrecy and its Limitations

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Computer Science A Cryptography and Data Security. Claude Crépeau

Lecture 5, CPA Secure Encryption from PRFs

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

Lecture 1: Introduction to Public key cryptography

Lecture 8 - Cryptography and Information Theory

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

Cook-Levin Theorem. SAT is NP-complete

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Cryptography. P. Danziger. Transmit...Bob...

Solutions to the Midterm Test (March 5, 2011)

Division Property: a New Attack Against Block Ciphers

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

Elliptic Curve Cryptography

Practice Assignment 2 Discussion 24/02/ /02/2018

Week No. 06: Numbering Systems

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Lattice Reduction Attack on the Knapsack

RSA ENCRYPTION USING THREE MERSENNE PRIMES

Fully homomorphic encryption scheme using ideal lattices. Gentry s STOC 09 paper - Part II

RSA. Ramki Thurimella

CPSC 467b: Cryptography and Computer Security

Mathematics of Cryptography

Implementation Tutorial on RSA

Module 2 Advanced Symmetric Ciphers

Elliptic Curve Computations (1) View the graph and an elliptic curve Graph the elliptic curve y 2 = x 3 x over the real number field R.

Efficient encryption and decryption. ECE646 Lecture 10. RSA Implementation: Efficient Encryption & Decryption. Required Reading

5. Classical Cryptographic Techniques from modular arithmetic perspective

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Introduction to Cryptography

CLASSICAL ENCRYPTION. Mihir Bellare UCSD 1

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)

Encryption: The RSA Public Key Cipher

Dan Boneh. Introduction. Course Overview

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Cryptography Lecture 4 Block ciphers, DES, breaking DES

Jay Daigle Occidental College Math 401: Cryptology

Lecture Notes, Week 6

Quantum Cryptography. Marshall Roth March 9, 2007

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2

Circuit Complexity. Circuit complexity is based on boolean circuits instead of Turing machines.

Math 412: Number Theory Lecture 13 Applications of

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Historical cryptography. cryptography encryption main applications: military and diplomacy

9 Knapsack Cryptography

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

Transcription:

: Applications Of Encryptionand Decryption Scheme By Using Binary, Hexa And Octa Systems G.Venkatasubbaiah, Lecturer in Mathematics, Government College for Men,Kadapa Email:venkat_g2010@yahoo.com Prof. K. Rama Krishna Prasad Department of Mathematics, S.V. University, Tirupati. Dr. V. Vasu Department of Mathematics, S.V. University, Tirupati. Email:vasuvaralakshmi@gmail.com Abstract: The traditional topic of cryptography is encryption. Encryption scheme is used to keep messages or stored data secret. In this paper, we introduce three fundamental basic numbers convertion systems namely binary, octa and hexa decimal convertions that we need to describe encryption schemes in different ciphers and their cryptanalysis. Key words: Encryption, Decryption, Hexa, Octal, Hexa decimal numbers systems, convertions, cipher text, binary text, binary. Introduction: An encryption scheme or cryptosystem is a tuple (P, C, K, E, D) with the following properties. 1. P is a set. It is called the plaintext space. Its elements are called plain texts. 2. C is a set. It is called the ciphertext space. Its elements are called cipher texts. 3. K is a set. It is called the key space. Its elements are called keys. 4. E= {ERkR:k ε K} is a family of functions ERkR: P C. its elements are called encryption functions. 5. D= {DRkR:k ε K} is a family of functions DRkR decryption functions. P C. Its elements are called 127

replaces by is is 6. For each e ε K there is d ε K such that DRdR(EReR(p))=p for all p ε P. Alice can use an encryption scheme to send a confidential message m to BOB. She uses an encryption key e. Bob uses the corresponding decryption key d. Alice compute the ciphertext c=erer(m) and sends it to bob. Bob can obtain the plain text as m=drdr(e). clearly the decryption key must be secret. As first example of an encryption scheme, we describe the Caesar cipher. The plaintext space, cipher text space and key space are [(A,B Z). we identify the letters A, B Z according to table with numbers 0,1, 25 respectively. This enables us to compute with letters. For e ZR26 Rthe encryption functions EReR EReR:Σ Σ, ψ (ψ+e) mod 26. Analogously, for d ZR26R the decryption function DRdR DRdR:Σ Σ, ψ (ψ-d) mod 26 The decryption key for the encryption key e is d=e. this is however not true for every cryptosystem. The Caesar cipher can easily be modified such that the plaintext space and sequences W=(WR1R, WR2R WRnR) with Wi Σ, 1 i n. again the key space is ZR26R. The encryption function EReR called the Caesar cipher. each letters WRiR WRiR+e mod 26, 1 i n.this also is Definition of binary: Binary is the natural way most digital circuits represent and multipulate numbers. (common misspellings are binary, Bienary (or) binery ) binary 128

numbers are something represented by preceeding the values with ob as in ob101. Binary is sometimes abbreviated as BIN. Binary counting : 0,1,10,11,100,101,110, 111, 1000, 1001, 1010, 1011, 1100, 1101, 1110, 1111, 10000, 10001, and so on. Definition of Octal: Octal (Base 8) was previously a popular choice for representing digital circuits numbers in a form that is more compact than binary. Octal is sometimes abbreviated as OCT. Octal counting goes as 0,1,2,3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21 and so on. Definition of Hexa Decimal : Hexa decimal (base 16) is currently the most popular choice for representing digital circuits numbers in a form that is more compact than binary (common misspellings are Hexadecimal, or Hex decimal) Hexa decimal numbers are sometimes represented by preceding the value with OX as in OX1 B84. Hexadecimal is sometimes abbreviated as Hex: Hexa decimal counting goes as 0,1,2,3,4,5,6,7,8, 9, A, B, C, D, E, F, 10 and 11. All four number systems are equally capable of representing any numbers. Further more, a number can be perfectly converted between the various number systems without any loss of numeric values. At first binary, it seems like using any number systems. Other than binary number system is complicated and unnecessary. However, since the job of electrical and software engineers is to work with digital circuits, engineer s require number 129

system that can best transfer information between the human world and the digital circuits world. If turns out that the way in which a number is represented can make it easier for the engineer to perceive the meanings of the numbers as it applies to a digital circuits. In other words, the appropriate number system can actually make things less complicated. Correspondence between letters and binary sysertem numberss. A B C D E F G H I J K L 00000 00001 00010 00011 00100 00101 00110 00111 01000 01001 01010 01011 M N O P Q R S T U V W X 01100 01101 01110 01111 10000 10001 10010 10011 10100 10101 10110 10111 Y Z 11000 11010 2. Corresponding between letters and octa decimal system A B C D E F G H I J K L 0 1 2 3 4 5 6 7 10 11 12 13 M N O P Q R S T U V W X 14 15 16 17 20 21 22 23 24 25 26 27 Y Z 30 31 3. Corresponding between letters and Hexa decimal system A B C D E F G H I J K L 0 1 2 3 4 5 6 7 8 9 A B 130

: ΨRiR M N O P Q R S T U V W X C D E F 10 11 12 13 14 15 16 17 Y Z 18 19 Problem 1 Suppose Subash wants to encrypt the plaintext message CRYPTANALYSIS using one time pad. He first convert the letters into Binary bit string. C R Y P T 00010 10001 11000 01111 10011 A N A L Y 00000 01101 00000 01011 11000 S I S 10010 01000 10100 The one time pad requires a Key Consisting of a Randomly selected string of Bits that is the same length as the message suppose we use key e= 11000 10100 11001 01100 11001 00001 00011 00001 10100 00111 01101 01101 The encryption function ERe Ris EReR (mod 26) Σ Σ defined by (ΨRi R+R ReRiR) Plain Text Key Cipher Text C = 00010 11000 00001 = B R = 10001 10100 01011 = L Y = 11000 11001 10111 = X P = 0111 01100 00001 = B 131

T = 10011 11001 10010 = S A = 00000 00001 00001 = B N = 01101 00011 10000 = Q A = 00000 00001 00001 = B L = 01011 10100 00101 = F Y = 11000 00111 00101 = F S = 10010 01101 00101 = F I = 01000 10111 00101 = F S = 10010 01101 00101 = F Converting the ciphertext bits back into letter the cipher text message to be transmitted is BLXB SBQBFFFFF When he wants decrypts it using same key Cipher Text Key PlainText 00001 = B 11000 C = 00010 01011 = L 10100 R = 10001 10111 = x 11001 Y = 11000 00001 = B 01100 P = 0111 10010 = S 11001 T = 10011 00001 = B 00001 A = 00000 10000 = 16 00011 N = 01101 00001 = B 00001 A = 00000 00101 = F 10100 L = 01011 00101 = F 00111 Y = 11000 00101 = F 01101 S = 10010 00101 = F 10111 I = 01000 00101 = F 01101 S = 10010 132

: Decryption function DRd Ris DRdR 26) Problem - 2 d = e (key) Σ Σ defined by and there by recovers the original message. ΨR R (ΨR R-R Rd) (mod Suppose a person wants the plain text message PROBABILITY to encrypt using one time pad.he first consults OCTA DECIMAL SYSTEM table to convert the letters to the octa system. P R O B A B I L I T Y 17 27 16 1 0 1 11 13 10 23 31 the encryptin function E is E : f f by ΨRiR (ΨRi R+R ReRiR) (mod 26) Plain Text Key Cipher Text 17 = P 011 20 = Q 27 = R 010 3 = D 16 = O 000 16 = O 1 = B 011 4 = E 0 = A 101 4 = E 1 = B 110 7 = H 11 = I 100 12 = K 13 = L 011 16=O 10 = I 11 17=P 23 = T 111 4=E 31 = Y 001 6=G Convertign the ciphertext OCTA bits back to letters the cipher text is QDOEEHKOPEG When we wants decrypts it using same key. 133

: Cipher Text Key Plain Text 20 = Q 011 17 = P 3 = D 010 27 = R 16 = O 000 16 = O 4 = E 011 1 = B 4 = E 101 0 = A 7 = H 110 1 = B 12 = K 100 11 = I 16=O 011 13 = L 17=P 11 10 = I 4=E 111 23 = T 6=G 001 31 = Y decryption function DRd Ris DRdR f f defined byψr R (ΨR R-R Rd) (mod 26) and there by recovered the orginal message PROBABILITY where d = e Problem 3 Suppose a person wants the plain text message TELEVISI to encrypt using one time pad.we first convert the letters to the Hexa bit string. Plain Text Key Cipher Text T = 13 001 U E = 4 010 V 1 = 8 010 Q E = 4 100 I V = 5 110 R I = 8 100 S S = 12 001 T I = 8 100 S 134

PR1R = + CR1R + = + is : + & + = encrypted = + Converting the ciphertext Hexa, bits back to letters ciphertext is UVQIRSTS Now we wants decrypt it using same key. Cipher Text Key Plain Text U 001 T = 13 V 010 E = 4 Q 010 1 = 8 I 100 E = 4 R 110 V = 5 S 100 I = 8 T 001 S = 12 S 100 I = 8 Deccrypting function DRdR DRdR f f by ΨR R (ΨR R-R Rd) (mod 26) and there by recovers the original message as TELEVISI Problem 4 Now we use two plain text message PR1R R PR2 as CR1R PR1R e and CR2R e that is we have two messages encrypted with same key one time (e) = PR2R In this cryptanalysis we have CR2R PR1R e + PR2R e = PR1R PR2 and key has disappeared from problems. Lets consider using one time pad in depth using binary bit encoding. Suppose we take MAN = 01100 00000 01101, PR2R CAN = 00010 00000 01101 and both are encrypted with same key 11000 10101 11100 Plain Text PR1 Key Cipher Text CR1 001100 = M 11000 01010 = K 135

+ 00000 = A 10101 10101 = V 01101 = N 11100 10000 = Q Plain Text PR2 Key Cipher Text CR2 00010=C 11000 00000 = A 00000=A 10101 10101 = V 01101=N 11100 10000 = Q Now CR1R CR2 Cipher text Plain Text C 1 + C 2 P 1 + P 2 01010 + 00000 K 10101 + 10101 Q 10000 + 10000 G References : 1. Advanced Encryption standard http:// csrc.nist. gov/encryption/aes/ 2. Data encryption standard (DES),Federal information processing Standards publication 46-3-1999 3. Oded Goldreich,Foundations of cryptography Volume II Basic applications 4. Mark Stamp, Information Security principles and practice, 2002. 5. A.R. Vasishtha,Modern Algebra, Krishna Prakashan Mandir, Meerut. 6. Advanced encryption standanred (AES),Federal information processing Standards publications,197,2001. 7. SergeLang,Introduction to linear algebra,second edition, springer 8. Oded Goldreich, Foundations of cryptography, volume I, Basic applications. 136

P edition, 9. Dr. B.S. Grewal, Higher engineering mathematics, 40P Publications. th Khanna 137