06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.6. SUMMARY 67<br />

To put it more bluntly, guessing one letter correctly allows us to break Caesar<br />

ciphers. Guessing two letters correctly allows us to break Decimation and Linear<br />

ciphers.<br />

4.6 Summary<br />

A Linear Cipher is a combination <strong>of</strong> a Decimation and a Shift Cipher, and<br />

so has both a multiplicative and an additive key. The additive key can be<br />

chosen at random, like in a Shift Cipher, but, like in a Decimation Cipher, the<br />

multiplicative key must be chosen so that it is relatively prime to the modulus.<br />

A relatively quick way <strong>of</strong> computing greatest common divisors is with the<br />

Euclidean Algorithm. To compute the gcd <strong>of</strong> two numbers, the algorithm uses a<br />

process <strong>of</strong> repeated remainder operations in which the larger <strong>of</strong> the two numbers<br />

is continually replaced by the remainder <strong>of</strong> the larger divided by the smaller.<br />

By putting this into a table and making use <strong>of</strong> the quotients involved, the multiplicative<br />

inverse can also quickly be found. Since Koblitz’s Kid-RSA depends<br />

for its security on the inability for an adversary to compute multiplicative inverses,<br />

we see it not secure at all, but is intended as a toy system, intended to<br />

demonstrate the concept <strong>of</strong> public keys.<br />

Decimation and Linear Ciphers do a better job <strong>of</strong> mixing the ciphertext<br />

alphabet than a Caesar Cipher does. Letters that are adjacent in the plaintext<br />

alphabet are not adjacent once enciphered, they are k letters apart, where k<br />

is the multiplicative key <strong>of</strong> the cipher. While this prevents us from using the<br />

hills and valley patterns <strong>of</strong> the normal frequency to break the cipher, it provides<br />

enough order so that if two ciphertext letters can be matched with their plaintext<br />

counterparts either <strong>of</strong> these ciphers can be broken.<br />

4.7 Topics and Techniques<br />

1. How many keys does a Linear Cipher need<br />

2. How do we encipher with a Linear Cipher<br />

3. What is the greatest common divisor <strong>of</strong> two numbers<br />

4. What is the Euclidean Algorithm<br />

5. What does relatively prime mean When are two numbers relatively<br />

prime<br />

6. How do we use the Euclidean Algorithm to find a gcd<br />

7. What is a multiplicative inverse<br />

8. When does a number have a multiplicative inverse modulo n

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!