Encryption Fiction: Measuring Security & Substitution Algorithms

AI Thread Summary
Measuring the security of an encryption algorithm involves understanding several key concepts. There are no definitive rules for assessing security, but two critical techniques include adherence to Shannon's principles of confusion and diffusion, and ensuring the mathematical foundation of the encryption method is rooted in NP Class problems. Various types of attacks can target encryption, including ciphertext-only, known plaintext, probable plaintext, chosen plaintext, and chosen ciphertext attacks. Effective countermeasures often rely on common sense and statistical analysis. For substitution algorithms, while the Enigma machine is a historical example, modern algorithms like DES and AES also utilize substitution and permutation techniques to enhance security. DES employs these transformations to create confusion and diffusion, while AES's substitution is based on inverse modulo operations in the GF(2^8) field.
mtanti
Messages
172
Reaction score
0
I need to know how to measure the security of an encryption algorithm. I have no idea how code breakers do their job so I cannot rate an innovative algorithm. Also, does a substitution algorithm like the enigma used to work exist?
 
Computer science news on Phys.org
There is no hard and fast rule to measure security. There are two techniques that we normally look out for,
1. Adherence to shannon's principle of confusion and diffusion
2. Mathematical background for the encryption method (if there is one at all) should have its root in one of the NP Class problems.

have no idea how code breakers do their job so I cannot rate an innovative algorithm.
There are 5 possible attacks on an encryption.
1. ciphertext only attack
2. known plaintext attack
3. probable plaintext attack
4. chosen plaintext attack
5. chosen ciphertext attack
A very handy tool in such attacks is a] common sense b] statistics
You can pick up any good encryption book and read up on how each of the encryptions can be attacked. (many material is available even on net)

Also, does a substitution algorithm like the enigma used to work exist
DES uses substition and permutation as its basic transformations to introduce confusion and diffusion in the encryption method. Even AES uses substitution but its substitution is based on inverse modulo in GF(2^8) field.

-- AI
 
This week, I saw a documentary done by the French called Les sacrifiés de l'IA, which was presented by a Canadian show Enquête. If you understand French I recommend it. Very eye-opening. I found a similar documentary in English called The Human Cost of AI: Data workers in the Global South. There is also an interview with Milagros Miceli (appearing in both documentaries) on Youtube: I also found a powerpoint presentation by the economist Uma Rani (appearing in the French documentary), AI...
Back
Top