Question

In: Computer Science

Kleptography Describe substitution, Mon alphabets, and other classes, and attacks

Kleptography

Describe substitution, Mon alphabets, and other classes, and attacks

Solutions

Expert Solution

Substitution technique in which letters of plaintext is replaced by letter, number or symbols.

Substitution techniques:

1) Monoalphabetic

2) polyalphabetic cipher

1) vigenere cipher

2) playfair cipher

3) hill cipher

4) one time pad

1) Monoalphabetic cipher

Monoalphabetic cipher is substitution cipher in which each character or symbol in plaintext is replaced by same character in ciphertext regardless their position.

There is one to one relationship between character in plaintext and ciphertext.

Means if letter A is replaced with C ,every time when letter A comes in plaintext is replaced with C.

Example plaintext :hello

Ciphertext : jgnnq

So monoalphabetic cipher easier to break because of the frequency of they reflect frequency of letters of plaintext.

2) polyalphabetic cipher

In polyaphabetic substitution cipher each occurrence of character has different substitute.

Relationship between character in plaintext and character in ciphertext is one to many.

Means letter a is encrypted as c in starting and at the end when letter a comes encrypted as n.

One Time pad :

In which length of the key is same as length of the plaintext.

Key is used only once.

Example plaintext :hello

Key : abcda

Ciphertext : igopp

Types of cryptography attack

1)known plaintext attack

In known plaintext attack attacker know plaintext for some part of ciphertext.

Then attacker need to decrypt rest of ciphertext using that information either by using key or some other methods.

2)choosen plaintext attack

Chosen plaintext attack is similar to known plaintext attack but here attacker choose plaintext with ciphertext and find out key.

Once attacker find out key attacker know encryption process and attacker able to decrypt message using this key information.

3)choosen ciphertext attack

In choosen ciphertext attack attacker choose decrypted portion of ciphertext.

Then compare decrypted ciphertext with plaintext in order to finding a key.

4)choosen key

In choosen key attack attacker have some knowledge about various keys used in cipher.

He knows exactly what keys have been used.

5)ciphertext only

In ciphertext only attack attacker know ciphertext of message that can be encrypted using some encryption algorithm.

Attacker aim is to find out key that can be used to decrypt other messages.


Related Solutions

Steganography Describe substitution, Mon alphabets, and other classes, and attacks
Steganography Describe substitution, Mon alphabets, and other classes, and attacks
Explain the different classes of attacks that should be resisted by a secure block cipher
Explain the different classes of attacks that should be resisted by a secure block cipher
How do I use ASCPII that produces two alphabets where one is uppercase and the other...
How do I use ASCPII that produces two alphabets where one is uppercase and the other lowercase using C++ Lets use Y and/or A  
Describe how polyalphabetic substitution works
Describe how polyalphabetic substitution works
Describe the common classes of receivables,& Describe the accounting for uncollectible receivables.
Describe the common classes of receivables,& Describe the accounting for uncollectible receivables.
Describe the common classes of receivables,& Describe the accounting for uncollectible receivables.
Describe the common classes of receivables,& Describe the accounting for uncollectible receivables.
1.Describe the difference between direct and indirect attacks. 2.Describe the balance between information security and access....
1.Describe the difference between direct and indirect attacks. 2.Describe the balance between information security and access. 3.Explain the difference between a policy and a standard. 4.Go to http://www.NIST.govand find the Incident Response template. Fill in the information on the template.
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
describe the substitution method and the elimination method of solving a system of equations. do they...
describe the substitution method and the elimination method of solving a system of equations. do they always give the same answers? what is the difference between the methods?
(Java) Please describe how API's can be created using abstract classes, interfaces and regular classes.
(Java) Please describe how API's can be created using abstract classes, interfaces and regular classes.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT