11.07.2015 Views

Abstract Algebra Theory and Applications - Computer Science ...

Abstract Algebra Theory and Applications - Computer Science ...

Abstract Algebra Theory and Applications - Computer Science ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.1 PRIVATE KEY CRYPTOGRAPHY 99characters appearing in the intercepted message often makes its decryptionpossible.Example 2. Suppose we receive a message that we know was encrypted byusing a shift transformation on single letters of the 26-letter alphabet. Tofind out exactly what the shift transformation was, we must compute b inthe equation f(p) = p + b mod 26. We can do this using frequency analysis.The letter E = 04 is the most commonly occurring letter in the Englishlanguage. Suppose that S = 18 is the most commonly occurring letter inthe ciphertext. Then we have good reason to suspect that 18 = 4+b mod 26,or b = 14. Therefore, the most likely encrypting function isf(p) = p + 14 mod 26.The corresponding decrypting function isf −1 (p) = p + 12 mod 26.It is now easy to determine whether or not our guess is correct.Simple shift codes are examples of monoalphabetic cryptosystems.In these ciphers a character in the enciphered message represents exactlyone character in the original message. Such cryptosystems are not verysophisticated <strong>and</strong> are quite easy to break. In fact, in a simple shift asdescribed in Example 1, there are only 26 possible keys. It would be quiteeasy to try them all rather than to use frequency analysis.Let us investigate a slightly more sophisticated cryptosystem. Supposethat the encoding function is given byf(p) = ap + b mod 26.We first need to find out when a decoding function f −1 exists.decoding function exists when we can solve the equationSuch ac = ap + b mod 26for p. By Proposition 2.1, this is possible exactly when a has an inverse or,equivalently, when gcd(a, 26) = 1. In this casef −1 (p) = a −1 p − a −1 b mod 26.Such a cryptosystem is called an affine cryptosystem.Example 3. Let us consider the affine cryptosystem f(p) = ap + b mod 26.For this cryptosystem to work we must choose an a ∈ Z 26 that is invertible.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!