Cryptology - I: Symbols and Notation

Instructors: R.E. Newman-Wolfe and M.S. Schmalz


In this class, we must express cryptologic transformations and operations in a rigorous fashion, in order to (a) understand their structure and function, (b) predict consequences of changing transform parameters, and (c) have a unified basis for comparing cryptographic algorithms. Currently, the only rigorous, concise notation that unifies image and signal processing (of which cryptology is a part) is called image algebra. Some of you may have heard of this notation, which was invented here at UF by Gerhard Ritter. Image algebra is a rigorous, concise notation that unifies linear and nonlinear mathematics in the image domain. Image algebra was developed at UF under DARPA and Air Force support since the early 1980s to provide a simple, powerful notation for describing image and signal processing algorithms in a unified, high- level manner.

The following theory is a small subset of image algebra, since the aim of this class is not to teach the details of image algebra. Rather, we are teaching basic cryptology within the context of image algebra, for the above-mentioned reasons. Thus, we provide the following brief theoretical introduction.

NOTE: Bold-italic-face titles or names denote cryptologic terms that we will use in class.

1. Sets and Set Operations

Sets are the basic entities in image algebra and are the building blocks of mappings that we will subsequently use to define images. A few concepts and conventions are noteworthy:

2. Images or Messages

One usually thinks of an image as a two-dimensional array of reals or integers. Unfortunately, that definition is too restrictive for modern image and signal processing, of which cryptography and cryptanalysis are a part. Thus, we use the image algebra definition of an image, which generalizes all images.

3. Image Operations.

In order to manipulate images or messages, we must specify a few simple operations. Fortunately, cryptology is not as complex notationally as image processing, so we can concentrate on the pointwise unary and binary operations that are frequently used in cryptography, as well as simple image-template operations (Section 6).

4. Domain Transformations.

An important class of encryptions are called transpostions, in which the domain of a plaintext message is manipulated so that the symbol order is rearranged. Let a denote an image in FX, and define a spatial transformation f: Y -> X. For purposes of simplicity, assume that f is a one-to-one and onto mapping.

The composition of a with f is denoted by:

b = a o f {(y, b(y)) : b(y) = a(f(y)), y Y} .

The combination of pointwise operations and domain transformations can produce powerful encryptions, as we shall see when we consider the DES transformation. It is interesting to note that in image processing, spatial transformations are used for image magnification, rotation, and warping.

5. Templates.

The most powerful construct in image algebra is called a template, which is defined as a mapping from a point set to a set of images. Thus, a template is an image whose pixel values are images.

Templates generalize the concepts of convolution masks, filter domains, sampling windows, etc., and thus provide a unifying construct for describing neighborhood operations on images. We rarely use templates in cryptography, but employ them extensively in cryptanalysis, particularly for pattern matching and correlation-based attack. These strategies will be discussed at length when we consider substitutional and transpositional ciphers.

6. Image-Template Operations.

Images and templates are combined using the generalized image-template left product
: FX × (FX)Y -> FY, which accepts an image and a template and returns an image.

Although we will not use the nonlinear operations or extensively in this class, such operations can be employed in cryptanalysis, especially for nonlinear analysis attack on compressed or encrypted signals. The topic of nonlinear cryptanalysis will be mentioned at the end of the semester, if time permits.


This concludes our discussion of basic notation for this class. Other notational conventions will be defined as they are introduced in theory development.