CSCI 10 Lecture Notes - Lecture 16: Phil Zimmermann, Feistel Cipher, Horst Feistel

31 views3 pages

Document Summary

Cs event thursday at 4pm in daly science 207. Shifts each letter by a fixed amount (usually three letters) Vulnerable to stat analysis (since most letters it should model the frequencies of letters) Usually human element is the biggest factor that causes cracks. Still vulnerable to statistical attack if keyword is short relative to message length. Vigenere with keyword size equal to message size. Encrypted message cannot be english otherwise frequency analysis can be used. Typically keys are 128 to 256 bits. Destroys frequency distribution; small change in the input yield dramatic change in the output. Security vulnerability in dh key exchange implementations. Most internet traffic is secured using the same common paint. Estimated to cost a (cid:498)few hundred million dollars(cid:499) to build hardware. Conclusion: we can"t all use the same common paint on a large percentage of internet traffic that can break one common paint (get back the color) per year.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers