Académique Documents
Professionnel Documents
Culture Documents
Introduction
Cryptography is the art of
hiding and uncovering
messages.
Dates to 1900 BCE.
Earliest examples are shift
ciphers, also called Caesar
ciphers.
Caesar ciphers are special
cases of a general
monoalphabetic cipher.
Iraqi polymath Abu Yusuf alKindi broke the
monoalphabetic cipher in
the 800s.
Polyalphabetic Ciphers
The more sophisticated
polyalphabetic ciphers started
appearing in the 15th century.
Essentially, encodes each
letter in a different Caesar
cipher.
Rarely used until the 1800s.
Vigenere cipher, le chiffre
indichiffrable.
Cracked by Charles Babbage
and then again by Friedrich
Kasiski.
Reached their apex with the
Enigma machine in WW2.
Enigma
Simplified form of the Enigma
on the right.
Basically, passes each letter
through three substitutions
via rotors that change the
alphabet after a certain
number of keystrokes.
A reflector rotor then ensured
that no letter could be
encoded as itself.
A plugboard allowed letters to
be swapped before going
through the rotors.
Army Enigma units had over
158 quintillion possible
configurations.
Early Cryptanalysis
Cryptanalysis can be divided into
brute-force attacks (trying all
combinations), cracking the
ciphers algorithm, and cracking
the psychology of the user.
The Caesar cipher is easy to
break by brute force, as there
are only 25 possible ciphers.
However, the monoalphabetic
cipher is much harder to break in
this way.
Al-Kindi used frequency analysis
to show how anyone could break
a monoalphabetic cipher.
This method was popularized by
Edgar Allan Poe.
Later Cryptanalysis
The Vigenere cipher can
similarly be cracked by looking
for repeating patterns in the
encoded text to divine the
length of the key.
Once the keys length is
discovered, the message
becomes a number of Caesar
ciphers equal to the length of
the key.
However, a key equal in length
to the message and randomly
generated is unbreakable for a
single message.
This is called a one-time pad.
Cracking Enigma
Enigma was effectively immune to
brute-forcing attacks.
The main avenues of attacking the
algorithms were via the plugboard
and the reflector.
Still required dedicated
electromechanical computers to
launch the attacks.
More profitable was attacking via
cribs- common structures in
messages.
Reduced search-space down
significantly.
Enigma was consistently cracked
during the war.
Modern Cryptography
Public-Key Cryptography
Modern Cryptanalysis
However, RSA is only
unbreakable in that it takes a
long time (proportional to
log(N)^1/3*(log(log(N)))^2/3,
where N is the number to be
factored) to crack the numbers. If
a more efficient way to factor
were discovered, RSA would be
broken.
There is a way to factor more
efficiently, known as Shors
algorithm.
Shors algorithm cannot be run
on a computer within the
classical realm. Its one of the
class of algorithms known as
quantum algorithms.
Quantum Computing
However
Symmetric keys are not
much more vulnerable to
quantum computing than to
classical computation, as far
as we know.
So why use asymmetric
keys?
However, we have focused
on two sides of the
cryptanalysis triangle.
The third side is people.
One of the biggest problems
in cryptography is getting
keys out to people securely.
Quantum Cryptography
Quantum Cryptography
Quantum Cryptography
Similar attempts to use quantum
physics to guarantee the location of
a particular receiver (a way to get
around authentication problems
with QKD) have also been shown to
be theoretically vulnerable given
sufficient entangled particles.
In practice, though, both quantum
commitment and quantum
positioning can be very secure due
to the fact that arbitrary computing
power or entangled particles are
not available.
The Future
Quantum cryptography and
quantum computing are in their
infancy.
For example, a paper published
last year in the Physical Review
Letters showed that quantum
commitment can be made
absolutely secure using
relativistic constraints and
multiple agents sending and
receiving.
Quantum computers are still
weaker than even the first
electronic computers and only
the surface has been scratched
for possible qubits
The opportunities available are
incredible for anyone interested
in the field.