YALE UNIVERSITY
DEPARTMENT OF COMPUTER SCIENCE
CPSC 367: Cryptography and Computer Security | Handout #5 | |
Professor M. J. Fischer | February 6, 2017 | |
Homework Assignment 4
Due: Tuesday, February 12, 2019
The goal of this assignment is to test your understanding of the concepts of block cipher, information leakage, and perfect security.
Twister
Twister is a block cipher on 3-letter blocks. It uses both substitution and transposition. The message
space and ciphertext space
are triples of letters, encoded by numbers in the range [0..25] as with the
Caesar cipher. The key space
= {0,…,77}. Note that |
| = 78 = 26 × 3.
Twister encryption is the composition of two ciphers Ek1 and Ek2, so Ek = Ek2 ∘ Ek1. The first cipher,
is the shift substitution used by the Caesar cipher, applied separately to each letter of the message block (m1,m2,m3). The second cipher,
is a transposition cipher, where the letter in position j is moved to position tk(j), where tk(j) = ((j + k - 1) mod 3) + 1. Thus, m′tk(j) = mj,
Please answer questions 3 and 4 with respect to both information leakage and to the difficulty of carrying out a brute-force attack. As usual, we assume keys are chosen uniformly at random from the key space.