Recap of Historical Cryptography

Let’s have a look at a summary of the chapter.

We'll cover the following

Summary

In this chapter, we have examined a number of historical cryptosystems. Although none of these cryptosystems is suitable for modern use, they provide several important design lessons for modern cryptosystems. These include the following:

  • A large keyspace is necessary for a practical cryptosystem, but a large keyspace alone does not guarantee security.

  • It’s possible to break a cryptosystem without first determining the key. Designers of cryptosystems thus need to worry about much more than just the protection of the key.

  • The ciphertext produced by a cryptosystem should disguise the statistics of the underlying plaintext alphabet.

  • Effective techniques for disguising plaintext statistics include increasing alphabet size, ensuring plaintext letters encrypt to a variety of different ciphertext letters, and introducing positional dependency, but these properties alone do not guarantee security.

  • Efficiency and security are often traded off against one another when designing a cryptosystem.

  • It is unlikely that anyone will use a cryptosystem in which the balance of efficiency versus security is inappropriate. In particular, secure cryptosystems that are inefficient to use in practice aren’t a good fit for most applications.

  • We can design cryptosystems to be secure against attacks we know and understand, but unknown attacks could be discovered at any time in the future.

Get hands-on with 1400+ tech skills courses.