Experiments with the Cryptool Software

Experiments with the Cryptool Software

DOI: 10.4018/978-1-7998-5351-0.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Researchers have developed many different types of software for implementing Cryptography algorithms. One such software is Cryptool. This software can be used to demonstrate many Classical Cryptosystems and symmetric-Key Cryptosystems like DES and AES. This software can be used to demonstrate Public Key Cryptosystems like RSA and ECC as well as many hash algorithms like MD5, SHA-1, SHA-256, and SHA-512. The usage of the algorithms and sample input and outputs obtained from the software are included for the beginners and learners to the area of Cryptography.
Chapter Preview
Top

Cryptool 1

The Cryptool 1 software supports Cryptography algorithms under the following major headings:

  • 1.

    Encrypt/Decrypt

  • 2.

    Digital Signatures/PKI

  • 3.

    Individual Procedures

  • 4.

    Analysis

The algorithms in each of the above classes are discussed below:

Encrypt/Decrypt: Under this category, four different groups of algorithms are presented: Symmetric(classic), Symmetric(Modern), Asymmetric and Hybrid. The Classical symmetrical algorithms supported are: Caesar/Rot-13, Vegenere, Hill, Substitution/Atbash, Playfair, ADFGVX, Byte Addition, XOR, Vernam/OTP, Homophone, Permutation/Transposition, Solitaire, Scytale/Rail Fence.

The inputs to the above algorithms and the output from the Classical Symmetrical algorithms are presented below:

  • Caesar/Rot-13:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: 3

  • Output: DEFGHIJKLMNOPQRSTUVWXYZABC (for Caesar)

  • NOPQRSTUVWXYZABCDEFGHIJKLM (for Rot-13, No Key is Required)

  • Vegenere:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: ACEGIKMOQSUWYACEGIKMOQSUWY

  • Hill:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: 978-1-7998-5351-0.ch025.m01

  • Output: KUCOUIMCEWWQOKGEYYQSIMAGSA

  • Substitution:

  • Input: SUBSTITUTION

  • Key: KEY

  • Output: RTERSGSTSGNM

  • Atbash:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: ZYXWVUTSRQPONMLKJIHGFEDCBA

  • Playfair:

  • Input: AB CD EF GH IX IK LM NO PQ RS TU VW XY ZX

  • Output: BC DE AK HI HY KF MN OP LU ST UQ WX YZ VY

  • ADFGVX:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Password: PASSWORD

  • Output: AVFAVFAGDXGDXFAVFAVAADFFGVADDFGGAADFFGVDXGDXGDADDFGG

  • Vernam/OTP:

  • Input: ONETIMEPAD

  • Key: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Output: 0E 0C 06 10 0C 0B 02 18 08 0E (in Hexadecimal format)

  • Homophone:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: random key

  • Output: 98 A8 67 EB DA 4B 91 2B 96 C7 5F 13 46 D6 2A E7 08 BD F4 1F 0F B3 CD 8F 21 E1 (in hexadecimal Format)

  • Permutation/Transposition:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • KEY: Key

  • Output: JKLMNOPQRABCDEFGHISTUVWXYZ

  • Solitaire:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Keystream: 4,49,10,24,8,51,44,6,4,33,20,39,19,34,42,21,21,18,24,36,52,51,49,25,8,3

  • Output: EYMBM EYNMQ EYFVE KLJQD UUTWG C

  • Scytale/Rail Fence:

  • Input: ABCDEFGHIJKLMNOPQRSTUVWXYZ

  • Key: 2

  • Output: EVYEM KBLMJ EQYDN UMUQT EWYGF C (Scytale)

  • EYMBM EYNMQ EYFVE KLJQD UUTWG C (Rail Fence)

Complete Chapter List

Search this Book:
Reset