Experiments with the Cryptool Software

Experiments with the Cryptool Software

Kannan Balasubramanian (Mepco Schlenk Engineering College, India)
DOI: 10.4018/978-1-5225-2915-6.ch015

Abstract

Researchers have developed many different types of software for implementing Cryptography algorithms. One such software is Cryptool. This software can be used to demonstrate many Classical Cryptosystems and symmetric-Key Cryptosystems like DES and AES. This software can be used to demonstrate Public Key Cryptosystems like RSA and ECC as well as many hash algorithms like MD5, SHA-1, SHA-256, and SHA-512. The usage of the algorithms and sample input and outputs obtained from the software are included for the beginners and learners to the area of Cryptography.
Chapter Preview
Top

Cryptool 1

The Cryptool 1 software supports Cryptography algorithms under the following major headings:

  • 1.

    Encrypt/Decrypt

  • 2.

    Digital Signatures/PKI

  • 3.

    Individual Procedures

  • 4.

    Analysis

The algorithms in each of the above classes are discussed below:

Encrypt/Decrypt: Under this category, four different groups of algorithms are presented: Symmetric(classic), Symmetric(Modern), Asymmetric and Hybrid. The Classical symmetrical algorithms supported are: Caesar/Rot-13, Vegenere, Hill, Substitution/Atbash, Playfair, ADFGVX, Byte Addition, XOR, Vernam/OTP, Homophone, Permutation/Transposition, Solitaire, Scytale/Rail Fence.

The inputs to the above algorithms and the output from the Classical Symmetrical algorithms are presented below:

  • Caesar/Rot-13:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: 3

  • Output: DEFGHIJKLMNOPQRSTUVWXYZABC (for Caesar)

  • NOPQRSTUVWXYZABCDEFGHIJKLM (for Rot-13, No Key is Required)

  • Vegenere:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: ACEGIKMOQSUWYACEGIKMOQSUWY

  • Hill:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key:

  • Output: KUCOUIMCEWWQOKGEYYQSIMAGSA

  • Substitution:

  • Input: SUBSTITUTION

  • Key: KEY

  • Output: RTERSGSTSGNM

  • Atbash:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: ZYXWVUTSRQPONMLKJIHGFEDCBA

  • Playfair:

  • Input: AB CD EF GH IX IK LM NO PQ RS TU VW XY ZX

  • Output: BC DE AK HI HY KF MN OP LU ST UQ WX YZ VY

  • ADFGVX:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Password: PASSWORD

  • Output: AVFAVFAGDXGDXFAVFAVAADFFGVADDFGGAADFFGVDXGDXGDADDFGG

  • Vernam/OTP:

  • Input: ONETIMEPAD

  • Key: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: 0E 0C 06 10 0C 0B 02 18 08 0E (in Hexadecimal format)

  • Homophone:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: random key

  • Output: 98 A8 67 EB DA 4B 91 2B 96 C7 5F 13 46 D6 2A E7 08 BD F4 1F 0F B3 CD 8F 21 E1 (in hexadecimal Format)

  • Permutation/Transposition:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • KEY: Key

  • Output: JKLMNOPQRABCDEFGHISTUVWXYZ

  • Solitaire:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Keystream: 4,49,10,24,8,51,44,6,4,33,20,39,19,34,42,21,21,18,24,36,52,51,49,25,8,3

  • Output: EYMBM EYNMQ EYFVE KLJQD UUTWG C

  • Scytale/Rail Fence:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: 2

  • Output: EVYEM KBLMJ EQYDN UMUQT EWYGF C (Scytale)

  • EYMBM EYNMQ EYFVE KLJQD UUTWG C (Rail Fence)

Complete Chapter List

Search this Book:
Reset