Encryption Fiction: Measuring Security & Substitution Algorithms

Click For Summary
Measuring the security of an encryption algorithm involves understanding several key concepts. There are no definitive rules for assessing security, but two critical techniques include adherence to Shannon's principles of confusion and diffusion, and ensuring the mathematical foundation of the encryption method is rooted in NP Class problems. Various types of attacks can target encryption, including ciphertext-only, known plaintext, probable plaintext, chosen plaintext, and chosen ciphertext attacks. Effective countermeasures often rely on common sense and statistical analysis. For substitution algorithms, while the Enigma machine is a historical example, modern algorithms like DES and AES also utilize substitution and permutation techniques to enhance security. DES employs these transformations to create confusion and diffusion, while AES's substitution is based on inverse modulo operations in the GF(2^8) field.
mtanti
Messages
172
Reaction score
0
I need to know how to measure the security of an encryption algorithm. I have no idea how code breakers do their job so I cannot rate an innovative algorithm. Also, does a substitution algorithm like the enigma used to work exist?
 
Computer science news on Phys.org
There is no hard and fast rule to measure security. There are two techniques that we normally look out for,
1. Adherence to shannon's principle of confusion and diffusion
2. Mathematical background for the encryption method (if there is one at all) should have its root in one of the NP Class problems.

have no idea how code breakers do their job so I cannot rate an innovative algorithm.
There are 5 possible attacks on an encryption.
1. ciphertext only attack
2. known plaintext attack
3. probable plaintext attack
4. chosen plaintext attack
5. chosen ciphertext attack
A very handy tool in such attacks is a] common sense b] statistics
You can pick up any good encryption book and read up on how each of the encryptions can be attacked. (many material is available even on net)

Also, does a substitution algorithm like the enigma used to work exist
DES uses substition and permutation as its basic transformations to introduce confusion and diffusion in the encryption method. Even AES uses substitution but its substitution is based on inverse modulo in GF(2^8) field.

-- AI
 
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...

Similar threads

Replies
43
Views
6K
  • · Replies 52 ·
2
Replies
52
Views
6K
  • · Replies 8 ·
Replies
8
Views
2K
Replies
7
Views
2K
Replies
5
Views
1K
  • · Replies 3 ·
Replies
3
Views
3K
  • · Replies 99 ·
4
Replies
99
Views
7K
Replies
5
Views
2K
  • · Replies 12 ·
Replies
12
Views
5K
  • · Replies 2 ·
Replies
2
Views
1K