Эротические рассказы

Information Security. Mark StampЧитать онлайн книгу.

Information Security - Mark Stamp


Скачать книгу
StartLayout 1st Row 1st Column Blank 2nd Column monospace k 3rd Column monospace i 4th Column monospace l 5th Column monospace l 2nd Row 1st Column putative upper P 1 2nd Column 011 3rd Column 010 4th Column 100 5th Column 100 3rd Row 1st Column upper C 1 2nd Column 010 3rd Column 001 4th Column 110 5th Column 111 4th Row 1st Column putative upper C 1 2nd Column 001 3rd Column 021 4th Column 010 5th Column 011 EndLayout

      and she can then use this upper K to “decrypt″ upper C 2 and obtain

StartLayout 1st Row 1st Column upper C 2 2nd Column 101 3rd Column 001 4th Column 010 5th Column 111 2nd Row 1st Column putative upper K 2nd Column 001 3rd Column 011 4th Column 010 5th Column 011 3rd Row 1st Column putative upper P 2 2nd Column 100 3rd Column 010 4th Column 000 5th Column 100 4th Row 1st Column Blank 2nd Column monospace l 3rd Column monospace i 4th Column monospace e 5th Column monospace l EndLayout

      2.3.6 Codebook Cipher

      A classic codebook cipher is, literally, a dictionary‐like book containing (plaintext) words and their corresponding (ciphertext) codewords. To encrypt a word, the cipher clerk would simply look it up in the codebook and replace it with the corresponding codeword. Decryption, using the inverse codebook, is equally straightforward. Below, we briefly discuss the Zimmermann Telegram, which is surely the most infamous use of a codebook cipher in history.

      The security of a classic codebook cipher depends primarily on the physical security of the book itself. That is, the book must be protected from capture by the enemy. In addition, statistical attacks analogous to those used to break a simple substitution cipher apply to codebooks, although the amount of data required is much larger. The reason that a statistical attack on a codebook is more difficult is due to the fact that the size of the “alphabet″ is far greater, and consequently, significantly more data must be collected before the statistical information can rise above the noise.

      As late as World War II, codebooks were in widespread use. Cryptographers realized that these ciphers were subject to statistical attack, so codebooks needed to be periodically replaced with new codebooks. Since this was an expensive and risky process, techniques were developed to extend the life of a codebook. To accomplish this, a so‐called additive was generally used.

      Suppose that for a particular codebook cipher, the codewords are all five‐digit numbers. Then the corresponding additive book would consist of a long list of randomly generated five‐digit numbers. After a plaintext message had been converted to a series of five‐digit codewords, a starting point in the additive book would be selected and beginning from that point, the sequence of five‐digit additives would be added to the codewords to create the ciphertext. To decrypt, the same additive sequence would be subtracted from the ciphertext before looking up the codeword in the codebook. Note that the additive book—as well as the codebook itself—is required to encrypt or decrypt a message.

      Often, the starting point in the additive book was selected at random by the sender and sent in the clear (or in a slightly obfuscated form) at the start of the transmission. This additive information was part of the message indicator, or MI. The MI included any non‐secret information needed by the intended recipient to decrypt the message.

      Modern block ciphers use complex algorithms to generate ciphertext from plaintext (and vice versa), but at a higher level, a block cipher can be viewed as a codebook, where each distinct key determines a distinct codebook. That is, a modern block cipher consists of an enormous number of codebook ciphers, with the codebooks indexed by the key. The concept of an additive also lives on, in the form of an initialization vector, or IV, which is often used with block ciphers (and sometimes with stream ciphers as well). Modern block ciphers are discussed in detail in the next chapter.

       The trouble with quotes on the Internet is that it's difficult to determine whether or not they're real.

      —Abraham Lincoln

      In this section, we take a brief look at three instances where classic ciphers played a role in historical events. First, we look at a weak cipher that was used during the controversial U.S. presidential election of 1876. Then we consider the Zimmermann Telegram, which played a pivotal role in World War I. The Zimmermann Telegram was encrypted with a classic codebook cipher. Finally, we discuss the VENONA messages, where Soviet spies in the United States used one‐time pad encryption. This system was used over a long period of time, but most notably for atomic espionage in the 1940s.

      2.4.1 Ciphers of the Election of 1876

      The U.S. presidential election of 1876 was a virtual dead heat. At the time, the Civil War was still fresh in people's minds, Radical Reconstruction was ongoing in the former Confederacy, and the nation was still bitterly divided.


Скачать книгу
Яндекс.Метрика