Professional Documents
Culture Documents
Qutyba A. Al-Tallaq
Information Technology School
Al-Balqa’ Applied University
Salt- Jordan
Abstract In ancient times, written text had its own built in encryp-
tion, not everyone could read. Cryptology became more
Modern society has a significant interest in keeping in- widespread with the growing education levels of society, but
ormation secure. Fields such as Commerce, military, and it still continued to be used mostly by highly secretive orga-
imple personal communication all have a need to keep nizations or people.
heir data unreadable by unauthorized people. This paper The World Wars at the beginning half of the twentieth cen-
xplores the concept of data encryption. The history of en- tury created a need for better encryption, and as a result new
ryption is presented from then up through the modern age. methods had to be developed. Also into the current informa-
inally, an in-depth analysis and description of the mathe- tion age, vital data is transmitted so much more frequently,
matics that make encryption work is presented then view the creating a need to limit access by those with malicious in-
pplication created to implement the encryption methods. tent.
3. Encryption Methods
. Keywords
3.1. DES
Encryption, Cryptology, CryptoSystem, Compression,
Cipher Text DES stands for”DATA ENCRYPTION STANDARD”,
in des we follow a number of steps include XOR operations
and a number of tables permutations through a number of
. Introduction stages with each stage output as input to the other. [2]
Figure 1 shows the methodology of the DES.
Cryptography is one of the oldest fields of technical
tudy we can find records of, going back at least 4,000
ears. It is quite noteworthy that of all the cryptosystems
eveloped in those 4,000 years of effort; only 3 systems in
Figure 2 shows the using of DES Encryption/Decryption, entry on the string table, the first 256 entry are filled with
ur application showing a full result view. the common characters by default then the other entries are
filled with a new string from the input string when no mach
occurred. [3]
Figure 4 shows the methodology of the LZW Decompres-
sion.
Figure 2. DES
.2. LZW
Figure 4. LZW Decompression
Figure 5. LZW
1. Create super increasing set b = [b1, b2 bk], (Part of 3.4. Rabin Public-Key Encryption
private key).
The Rabin cryptosystem is an asymmetric cryptographic
2. Mix private key up with permutation. technique, whose security, like that of RSA, is related to the
difficulty of factorization. However the Rabin cryptosystem
3. Choose a modulus n such that n >b1 + b2 + + bk has the advantage that the problem on which it relies has
been proved to be as hard as integer factorization, which is
4. Choose some multiplier r <n relatively prime to n, (No not currently known to be true of the RSA problem. It has
common divisors, All b × r mod n will be different). the disadvantage that each output of the Rabin function can
be generated by any of four possible inputs; if each output
5. Compute t such that ti = bi×r mod n is a ciphertext; extra complexity is required on decryption
to identify which of the four possible Inputs was the true
6. Create permutation of t and use it to create a plaintext. [6]
The process was published in January 1979 by Michael O.
7. Public key: a Rabin. The Rabin cryptosystem was the first asymmetric
cryptosytem where recovering the entire plaintext from
8. Private key: b, n, r, and the permutation the ciphertext could be proven to be as hard as factoring. [7]
10. For Decryption: 1. Choose two large distinct primes p and q, preferably
the same size.
(a) Compute:
2. Compute n = p×q
r1 mod n.
3. For Encryption: the cipher text c is determined by
(b) Compute s’ =
c=m 2 mod n.
r1 × s mod n.
4. For Decryption (Chinese remainder theorem):
, s is ciphertext.
(a) Mp= c mod p.
(c) Invert knapsack process to find values of b that (b) mq= c mod q.
sum to s’
(c) Choosing p q 3 ( mod 4) allows to compute
(d) Apply the permutation to get the plaintext back square roots by:
mp= c ˆ ( p+1\4) (mod p)
mq= c ˆ ( q+1\4) (mod q)
Figure 6 shows the using of Knapsack Encryp-
(d) Find following:
on/Decryption, our application showing a full result view.
r = ( yp .p. mq + yq .q. mp) mod n , -r = n - r
s = ( yp .p .mq - yq .q. mp) mod n , -s = n - s
One of these square roots mod n is the original
plaintext m.
Figure 7 shows the using of Rabin Encryp- 3.6. Playfair Cipher
on/Decryption, our application showing a full result
iew. Although the Baron Playfair’s name is attached to one
of the better-known classical ciphers, the baron’s friend,
scientist Charles Wheatstone, actually devised the Playfair
cipher. After its creation in 1854, the baron succesfully
lobbied the Brittish government to adopt the cipher for
official use, and thus got his name and not Wheatstone’s,
attached to the cipher.
Nonetheless, it uses some principles common to modern
computer block ciphers. Understanding the Playfair will
give you a beginning insight into modern cryptography-
without all the complex mathematics and number theory.
[8]
Figure 8 shows the using of Vigenre Cipher for Encryp- (b) If both letters fall in the same row, replace each
on/Decryption. with letter to right (wrapping back to start from
end).
(c) If both letters fall in the same column, replace
each with the letter below it (again wrapping to
top from bottom).
(d) Otherwise each letter is replaced by the one in its
row in the column of the other letter of the pair.
Figure 9 shows the using of Playfair Cipher for Encryp- Figure 10 shows the using of Trifid Cipher Encryp-
on/Decryption. tion/Decryption, our application showing a full result view.
2. For Decryption:
Figure 12 shows the using of Cipher Block Chaining En- 2. Decryption: See Figure 14
ryption/Decryption, our application showing a full result
iew.