[net.lang.c] Cbenson's data encryption technique

cbenson@reed.UUCP (Jason E. Elliott) (05/14/84)

     I don't know whether those that replied to  my  request
for  a  critique  on  my idea behind it.   (I won't post the
program again unless asked to.)

     Being a mere high school student, and not versed passed
pre-calculus,  I wrote my program using ideas suggested by a
book titled  "Cryptanlisis,  A  Mathematical  Approach".   I
looked  at the Vigenere method primarily because it was sim-
ple to implement, but could be made  complicated  enough  to
deter the pirating of my source by other students.  However,
as you all know, the Vigenere method by itself,  is  not  at
all  hard  to  solve.  However, with the twist that makes my
program a little more complicated, the  key  that  the  user
provides  actually is permuted once for each time that it is
used.

     When the key has been used once,  the  key  is  rotated
left  one letter and used again.  Therefore, there is a one-
to-one correspondance between the number of letters  in  the
key, and the number of keys used.

     A dissemination interval equal to the length of the key
is used to make things even more messy.

     In any case, although  this  program  is  primitive  by
today's  standards,  it  does protect my work from my class-
mates.  (As well as impressing the computer teachers.)

     I hope this makes things a little clearer (if there was
any question as to the program's operation).  I would appre-
ciate any advice or constructive criticism that you in  net-
land  might have.  Also, my request still stands with regard
to my desire to get some kind of estimate as to the relative
difficulty  of  deciphering a message coded with my program.
I would also like some help with finding  the  optimum  key-
to-file-length ratio (that is, the best length of key to use
for a given file).



               As they say:  Thanks in advance
               Jason E. Elliott















                        May 14, 1984

gwyn@brl-vgr.ARPA (Doug Gwyn ) (05/23/84)

Look for references to "unicity distance" in the cryptography
literature.  I am not sure how much knowledge of this is in the
public domain so I am reluctant to discuss it, but it is the
answer to your question about appropriate key length.

henry@utzoo.UUCP (Henry Spencer) (06/01/84)

"Unicity distance" is discussed, as I recall, in some of the more
technical sections of Kahn's "The Codebreakers".  That wouldn't be
a bad place to start.  Note that you must be reading the hardcover
edition -- the paperback is abridged!
-- 
				Henry Spencer @ U of Toronto Zoology
				{allegra,ihnp4,linus,decvax}!utzoo!henry

mab@cadvax (Matt Bishop) (06/12/84)

   You can also look in Dorothy Denning's book, "Cryptography and
Data Security", in the first chapter on cryptography (I think it's
chapter 2, but I'm at home and my copy is at work, so I can't check
that for you.) Also, I don't remember where, but I'm sure Konheim talks
about it in his book "Cryptography".

   Unless you're REALLY mathematically inclined, try Dorothy's book first!

-- 
					Peace,

					Matt Bishop

UUCP:	decvax!decwrl!sun!megatest!mab
ARPA:	megatest!mab@lbl-csam

pjbk@hwcs.UUCP (Peter King) (06/13/84)

Unicity distance and many other cryptographic terms and concepts
are defined and discussed in the following books

Denning, D.E. "Cryptography and Data Security" Addison-Wesley 1982
Konheim, A.G. "Cryptography: A Primer" Wiley 1981
Meyer, C.H. and Matyas, S.M.
	"Cryptography: a New Dimension in Computer Data Security" Wiley 1982

They are a starting point for any attempt to measure the 'strength' of
any encryption technique.

P.S. In the UK even the hardback version of David Kahn's "The Codebreakers"
is an abridged version!