Some Simple Cryptosystems .ppt
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《Some Simple Cryptosystems .ppt》由用户(hyngb9260)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Some Simple Cryptosystems
- 资源描述:
-
1、Kyungpook National UniversityInformation Security Lab.Some Simple Cryptosystems 2012.06.26.(Tue)Yuan Xiyuanxi_Kyungpook National UniversityInformation Security Lab./27Outline1,The contents that I simply understanding of the Cryptography2,The Shift Cipher3,The Substitution Cipher4,The Vigenere Cipher
2、5,The Hill Cipher 6,The Permutation Cipher7,Stream Cipher2 2Kyungpook National UniversityInformation Security Lab./271,The contents that I Simply understanding of the Cryptography1.Cryptography is a method which can hide the communicating words and documents when they spread by medium.Notice:The doc
3、uments are unreadable documents or they maybe just a gibberish,when they spread by medium.But the people who accept the documents,they must have a key,or key sets.Then,they can use key to decode ciphertext with the given injective functions.3 3Kyungpook National UniversityInformation Security Lab./2
4、71,The contents that I Simply understanding of the Cryptography4 4Kyungpook National UniversityInformation Security Lab./271,The contents that I Simply understanding of the Cryptography3.Encryption operation:5 5plaintext ciphertext mediumKyungpook National UniversityInformation Security Lab./271,The
5、 contents that I Simply understanding of the Cryptography4.Decryption operation:6 6ciphertext plaintext mediumKyungpook National UniversityInformation Security Lab./272,The shift cipher1.What is the shift cipher?The shift cipher is based on modulararithmetic.First,we give letter a integer type value
6、.Then we can understand shift cipher as that plus a number(K)on the assigned letter.7 7Kyungpook National UniversityInformation Security Lab./272,The shift cipher2.Modular arithmeticDefinition:Suppose a and b are integers,and m is a positive integer.Then we write a b(mod m)if m divides b-a.The phras
7、e a b(mod m)is called a congruence,and it is read as“a is congruent to b modulo m.”The integer m is called the modulus.8 8Kyungpook National UniversityInformation Security Lab./272,The shift cipher2.Modular arithmetic some properties of modular arithmetic:1,addition is closed.for any a,b ,a+b .2,add
8、ition is commutative.for any a,b ,a+b=b+a.3,addition is commutative.for any a,b ,(a+b)+c=a+(b+c).4,0 is an additive identity.for any a ,a+0=0+a=a.5,the additive inverse of any a is m-a,a+(m-a)=(m-a)+a=0 for any a 6,multiplication is closed,for any a,b ,ab .9 9Kyungpook National UniversityInformation
9、 Security Lab./272,The shift cipher2.Modular arithmetic 7,multiplication is commutative,for any a,b ,ab=ba.8,multiplication is associative,for any a,b,c ,(ab)c=a(bc).9,1 is a multiplication identity,for any a ,a*1=1*a=a.10,the distributive property is satisfied,for any a,b,c ,(a+b)c=(ac)+(bc)and a(b
10、+c)=(ab)+(ac).1010Kyungpook National UniversityInformation Security Lab./272,The shift cipherShift cryptosystem:let=,for 0K25,define:(x)=(x+K)mod 26 and (y)=(y-K)mod 26 (x,y ).1111Kyungpook National UniversityInformation Security Lab./273,The Substitution cipherWhat is the substitution cipher?To put
11、 it simply,the substitution cipher is use a new letter to substitute for another letter of plaintext.1212Kyungpook National UniversityInformation Security Lab./273,The Substitution cipherSubstitution cryptosystem:Let P=C=,K consists of all possible permtation of the 26symbols 0,1,2,.,25,for each eac
12、h permutation K,define:(x)=(x),and define:(y)=(y),Where is the inverse permutation to .1313Kyungpook National UniversityInformation Security Lab./273,The Substitution cipherFor instance:(x):(y):1414P:abcdefghC:XNYAHPOGijklmnopqZQWBTSFLRrstuvwxyzCVMUEKJDIC:ABCDEFGHP:dlryvoheIJKLMNOPQzxwptbgpjRSTUVWXY
13、ZqnmuskaciKyungpook National UniversityInformation Security Lab./273,The Affine cipherWhat is the substitution cipher?The affine cipher is a special case of substitution cipher.in the affine cipher,we restrict the encryption function to function of the form:e(x)=(ax+b)mod 26,a,b .Then we find a issu
14、e which it is necessary to ask when an affine function is injective.1515Kyungpook National UniversityInformation Security Lab./273,The Affine cipher1.Theorem:The congruence axb(mod m)has a unique solution x ,for every b if only if gcd(a,m)=1.1616Kyungpook National UniversityInformation Security Lab.
15、/273,The Affine cipher2.The number of possible keys.Eular-function:Suppose a1 and m2 are integers.If gcd(a,m)=1,then we say that a and m are Relatively prime.The number of integers inThat are relatively prime to m is often denoteby(m)(this function is called the Euler-function)1717Kyungpook National
16、 UniversityInformation Security Lab./273,The Affine cipherThe proof of Eular-function:Now,please look at the blackboard:1818Kyungpook National UniversityInformation Security Lab./273,The Affine cipher3.Affine cryptosystem Let P=C=,and let K=(a,b)X :gcd(a,26)=1.For K=(a,b)K,define:(x)=(ax+b)mod26And
17、(y)=(y-b)mod26(x,y ).1919Kyungpook National UniversityInformation Security Lab./273,The Affine cipher2020Kyungpook National UniversityInformation Security Lab./274,The vigenre cipherWhat is the vigenre cipher?This cipher is named after Blaise de Vigen-re,who lived in sixteenth century.We can associa
18、te each key K with an alphabetic string of length m,called a keyword.The vigenere cipher encryprs m alphabetic character at a time,each plaintext alement is equivalent to m alphabetic characters.2121Kyungpook National UniversityInformation Security Lab./274,The vigenre cipher1.Property of the vigene
19、re cipher The vigenre cryptosystems is a polyalph-abetic cryptosystem.2222Kyungpook National UniversityInformation Security Lab./274,The vigenre cipher2,Vigenre cipher cryptsystem Let m be a positive integer.Define P=C=K=.For a key,K=,we define:and where all operation are performed in .2323+)Kyungpo
展开阅读全文