CHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM

Size: px
Start display at page:

Download "CHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM"

Transcription

1 64 CHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM 4.1 INTRODUCTION Any Cryptanalyst should focus on the two basic needs of cryptanalysis such as 1. To identify the encryption method employed. 2. To find the key/plaintext. In chapter 3, identification of encryption method employed was implemented using Neural Network. So the next task is cryptanalysis of a given cipher. Here, automatic cryptanalysis of Vigenere cipher was implemented. Hence with the available Vigenere cipher text, an attempt has been made to find the key employed without human intervention. The efficiency of a cryptanalyst depends upon two factors. 1. He/She should be able to find the Key/Plaintext with the least amount of Cipher text. 2. He/She should be able to find the key/plaintext with the least possible time.

2 65 Though, Vigenere encryption has already been crypt analyzed using various techniques by Sivagurunathan (2014), it is desired to crypt analyze using Meta heuristic algorithm and within the least possible time. Vigenere cipher text of 1 KB is taken into account and it was crypt analyzed to find out key employed. It was also tested to recover different keyword sizes from the available 1 KB Vigenere cipher text. Verma et al (2007) used GA and Tabu Search attacks on Mono- Alphabetic Substitution Cipher in Adhoc Networks. Horng Ming-Huwi (2012) implemented digital image compression using FA in least computation time. Banati & Bajaj (2011) used FA for feature selection and it was found better performance than other algorithms in time and optimality. Gandomi et al (2011) and Azad & Azad (2011) solved highly nonlinear and multimodal design problems using Firefly algorithm. Antenna design problems were also solved by Basu & Mahanti (2011). 4.2 THE VIGENERE CIPHER The main drawback of simple substitution cipher is that they are easily breakable using frequency analysis of each alphabet in the cipher text. Hence a technique was developed by Blaise de Vigenere in the year 1553 and so it was named as the Vigenere cipher. The Vigenere cipher is a basic form of substitution cipher and the type of substitution is polyalphabetic. In Vigenere cipher tabula recta is used for both encryption and decryption. This table consists of 26 alphabets written in 26 different rows, in which each and every alphabet is left shifted with reference to the last alphabet. 4.3 FIREFLY ALGORITHM Metaheuristic algorithm forms an essential element of modern global optimisation algorithms, computational intelligence and soft

3 66 computing. Generally these algorithms are nature-inspired with numerous interacting agents. A nature-inspired metaheuristic algorithm was widely used for more than a decade. A subset of metaheuristic are often referred to as swarm intelligence based algorithms which works on swarm intelligence characteristics of biological agents such as birds, fish, human and others. Hence for example, Swarm Optimisation was based on the swarming behaviour of birds and fish whereas the firefly algorithm was based on the flashing characteristics of Fireflies derived by Yang (2008). This algorithm deals with the blinking characteristics of the fireflies in nature. The blinking light from a firefly is considered as a signal system, in which each firefly is attracted by the neighbouring fireflies. According to the Firefly algorithm, initially each firefly is given a random position in the search space. All the fireflies have their own flashing light property and the attracting capability of each firefly depends upon its brightness. This will fix the present position in the search space depends upon the computed fitness value. The attractiveness of a firefly depends upon its brightness. Each firefly will be attracted by a nearby firefly which is having more brightness in the search space. Thus each firefly moves towards the brighter firefly and then its fitness function changes accordingly based on its current position. Thus the moving of fireflies towards brighter firefly results in a better position in the search space.the light intensity from a source at a distance r is based on the inverse square law. This law states that the intensity of the light I reduce as the distance r increases in terms of I 1 r 2 (4.1) In addition to this, air in the atmosphere absorbs the light and so the brightness of the light decreases as the distances increases. Hence it is observed that for the above reasons many of the fireflies visible only to a short distance.

4 67 The flashing characteristics of this firefly algorithm are clearly stated by Yang (2010) as three rules. 1. Irrespective of the sex of the fireflies each firefly is attracted by another one because they are all are unisex. 2. Due to the blinking nature of the fireflies, those fireflies which are having less brightness will be attracted by the fireflies which are having more brightness and so the Attractiveness is directly proportional to their brightness, and they both decreases as their distance increases. A firefly can move randomly, if no one is brighter than a particular firefly. 3. The brightness of a firefly is calculated by the visual features of the fitness function to be optimized. As a firefly's attractiveness is proportional to the light intensity seen by adjacent fireflies, the variation of attractiveness β with the distance r defined by Shadi et al (2011) is given in Equation (4.2). β = β 0 e γr 2 (4.2) where β 0 attractiveness at r = 0. r fixed light absorption coefficient The movement of a firefly i, attracted to another brighter firefly j, is determined by Equation (4.3), x i t+1 = x i t + β 0 e γr ij 2 x j x i + αε i (4.3)

5 68 where the second term is due to the attraction. The third term is a randomization with α being the randomization parameter, and ε i is a vector of random numbers drawn from a Gaussian distribution or uniform distribution at a time t.if β 0 =0, it becomes a simple random walk. The pseudo code can be briefly stated by Yang et al ( 2009). Begin The fitness function f (X), X = (x 1,.,x n ) T Population of fireflies are initialized as x i (i = 1,2,,m). Compute intensity of light I i at X i associated with f(x). Consider Light absorption coefficient While (t < Max Generation) For i =1:m (all n fireflies) For j=1:i (all n fireflies) if (I j > I i ),move firefly i towards j; end if Vary attractiveness with distance r via exp [- r]; Compute new solutions and the light intensity is updated ; end for j end for i Rank fireflies and find the current best; end while Post-processing the results and visualization; End

6 FINDING THE LENGTH OF THE KEY The first step in breaking Vigenere ciphers is to find the key length. Once the key length is known, the cryptanalysis is reduced to analyzing a number of Caesar ciphers, one for each character of a key. Vigenere masks the frequency with which a character appears in a language. One letter in the cipher text corresponds to multiple letters in the plaintext and thus it makes the use of frequency analysis more difficult. It can also be seen that any message encrypted by a Vigenere cipher is a collection of as many Caesar shift ciphers as there are letters in the key. There are different approaches to find the key length. One such method is devised by Kasiski Friedrich (1863) a retired Prussian Army Officer Kasiski Test In the field of Cryptanalysis, Kasiski Test is a technique of attacking the polyalphabetic substitution ciphers. In these substitution ciphers each cipher text was generated with the help of a keyword. Any cryptanalyst can find the length of the keyword using Kasiski Test and this test has the following main steps to find the length of the keyword. 1. Examine the plaintext with the keyword for repeated alignment of group of alphabets. 2. Locate the groups of same alphabets of minimum size 3 or more. 3. Compute the distance between the groups.

7 70 4. The GCD of those distances between the groups will results in the length of the keyword. For example, Plaintext = THEYWONTHEMATCH. Keyword = CRICKET. Table 4.1 Vigenere Encryption Plain text T H E Y W O N T H E M A T C H Keyword C R I C K E T C R I C K E T C Cipher Text V Y M X G S G V Y M O K X V J It can be seen from Table 4.1, the obtained Cipher text is VYMXGSGVYMOKXVJ. The distance between the repeated characters VYM is 7. Hence, the probable size of keyword is 7. If the distance between the repeated trigrams is say 16, the probable size of the keyword will then be 2, 4, 8 and 16. This is because in this combination both the keyword and the plaintext characters are same. Since the keyword is repeated throughout the message, the same plaintext characters with the same keyword characters will give the same cipher text characters. Hence, the distances between trigrams (if no trigram gets repeated, then the distance between dig rams can be used) will be an integral multiple of the keyword size.

8 Coincidence Test The Coincidence test provides a measure of how likely it would be to draw two matching letters if two letters are randomly selected from a given text. The ratio of probability of coincidences for a text to the probability of random coincidences in the English language, gives the index of coincidence. Since there are 26 letters in English alphabet, the probability of randomly having any given alphabet is 1/26 for all 26 alphabets. Similarly, the probability of having the same alphabet twice is 1/26 * 1/26 if one is using replacement and assuming independence. If P(x) is the probability of x occurring in any given plain text and from Kahn (1996) the probability of occurrence of English alphabets are, P(a) = 0 32/400; P(b) = 0 6/400; P(c) = 0 12/400; and P(z) =0 1/400 with respect to the English language. Thus, the probability of a followed immediately by a is, P(aa) =0.32/400 *0.32/400, P(cc) = 0.12/400 * 0.12/400 and P(zz) = 0.1/400 * 0.1/400. It has been shown by Dawson (1996) that the chance of drawing any identical pair of letters is the sum of the square of their probabilities.this

9 72 is equal to and it shows that, there will be 3 or 4 coincidences for every 100 pairs of letters in a random text given by the Equation (4.4). (1/26)(1/26) + (1/26)(1/26) + (1/26)(1/26) (1/26)(1/26) = for a for b for c for z (4.4) Similarly considering the plaintext, the sum of the squares will be (32/400)(32/400) + (6/400)(6/400) + (12/400)(12/400) (1/400)(1/400) = for a for b for c for z (4.5) Hence, the sum of the square of the probabilities of each alphabet gives the value of for plaintexts and for random texts and is denoted by K r and K p (for random and plaintext). This gives the coincidence count and these values can be used effectively to identify when two texts are likely to contain meaningful information in the same language using the same alphabet, to discover periods for repeating keys and to uncover many other kinds of non-random phenomena within or among cipher texts. The purpose of Kappa test is to determine whether two or more cipher texts have been identically encrypted. If in fact they have been encrypted in the same fashion, their index of coincidence will then be approximately equal to 6.83 whereas if not, it should more closely be equal to 3.85.The same idea can be applied to a single text, where the sample is in effect compared with itself. In this case that a single polyalphabetic cipher like Vigenere was used to encipher a sequence of plaintexts, and it was pointed by Kahn (1996) that it is often the case of finding the offset needed to correctly align the texts. By doing a Kappa test at each offset, the key length can be easily found as described below. The given cipher text is split into

10 73 several texts based on the keyword size. If the keyword size is five, then five cipher texts are formed, in which 1,6,11.. will form one cipher text and 2,7,12. will form another cipher text. The IC for a given letter-frequency distribution is given mathematically by Equation (4.6). IC = c i=1 n i n i 1 N N 1 /C (4.6) where, N n 1 through n c n(n-1) N (N-1) is the length of the text frequencies (as integers) of the c letters (26) of the alphabets count the number of combinations of n elements taken two at a time total letter pairs in the entire text 1 / c probability of a match for each pair, assuming a uniform random distribution of the characters. Each of the n i occurrences of the i th letter matches each of the remaining n i -1 occurrences of the same letter. Thus, this formula gives the ratio of the total number of coincidences observed to the total number of coincidences that one would expect. The expected average value for the IC can be computed from the relative letter frequencies f i of the source language and is given by the Equation (4.7). IC expected = c f i i c i=1 (4.7)

11 74 If all c letters of an alphabet were equally distributed, the expected index would be for plaintext. Hence, this value can be calculated for every keyword length. The keyword length to which the given cipher text gives a coincidence value around 0.06 corresponds to the original keyword length. For example, if the keyword length is 8, then keyword lengths of 8,16,24,..will have IC count of 0.06 and the maximum length can be safely assumed to be the keyword length. The screenshot of finding index of coincidence for a keyword of eight is given in Figure 4.1. Figure 4.1 Output Showing Coincidence Values for a Keyword of Size Eight The keyword employed was GODBLESS. It can be seen that for keyword size of 8, 16, 24 and 32 the index of coincidence is higher. Assuming that the user might not have given a keyword of size 30, it can be assumed that the keyword size to be 24. With the available ciphertext of 1KB, it is possible to find the keyword of size 24. The screenshot showing the keyword found with 1KB of ciphertext is given in Figure 4.2.

12 75 Figure 4.2 Keyword of Size Sixteen It can be seen that the keyword GODBLESS occurs two times and hence the keyword employed is GODBLESS. This is the effect of assuming a larger keyword size and is shown in Figure 4.3. Sometimes, the keyword may be repeated, but few characters in any one of keyword may not be correct. However, most of the repeated keywords were found to be correct.

13 76 Figure 4.3 Effect of assuming a larger keyword size 4.5 METHODOLOGY EMPLOYED Plaintexts of various sizes up to 1KB were taken for this experiment and these texts were taken from different textbooks. Keywords of varying lengths up to twenty were used and the plain texts were converted into cipher texts using Vigenere Encryption Method. To crypt analyze these cipher texts the keyword length is to be found first and is done using Coincidence test defined by Friedman (1992). Ganesan & Sherman ( 1994) utilized the Coincidence test to find the keyword length. Once the keyword length is known, then the next step is to find each character in the keyword.

14 77 Frequency analysis Friedman (1980) is a useful tool which gives the average number of each alphabet usually present in an English text. Fitness function based on the frequency of the occurrence of each alphabet was designed by using monogram and bigram statistics of English alphabets. Code was written using MATLAB V 12 and was run on dual core personal computer. 4.6 FITNESS FUNCTION The fitness function based on monogram and bigram is given by Equation (4.13).Here,the letters A Z are referenced by the indices 1 26.The objective is to minimize the error in the objective function which is the difference of the expected frequency count with the observed frequency count of the decrypted cipher text. Hence the Error function is cost = i=1 a sf i df i + i=1 j =1 b sdf i, j ddf(i, j) (4.8) sf(i) standard frequency of character i in English df(i) measured frequency of the character i in English. sdf(i) standard bigram frequency ddf(i) decoded bigram frequency a weightage for monogram frequency difference b weightage for bigram frequency difference To implement this fitness function, the frequency of each character in the decrypted text is calculated. This frequency is normalized by dividing it by the total number of characters in the file. This normalized frequency is

15 78 then subtracted from the expected frequency of the character in normal English text and the absolute value of this difference is taken. The differences for all the characters are added together. The normalization takes care that this value always lies between 0 and 1. Table 4.2 Monogram Values of English Alphabets for Plaintext Size of 100 Sno Character Monogram value 1 E T A O I N S H R D L C U M W F G Y P B V K X J Q Z 0.07 The Table 4.2 gives monogram value of all the alphabets when the size of the plaintext is 100.

16 79 The bigram is an expansion of unigram to two characters. Now, rather than manipulating the frequency of the individual character, the frequency of pairs of letters is calculated. For example, a pair an will always appear more frequently than pair bt. Again statistics for the frequencies of these pairs are also available. These statistics are compared with the statistics obtained from the decrypted text. To execute this fitness function, the frequency of each pair of letters in the decrypted text is calculated. This frequency is normalized by dividing it by the total number of pairs in the file. This normalized frequency is then subtracted from the expected frequency of the pair in normal English text. The absolute value of this difference is taken. The differences for all the pairs are added together. The bigram statistics of the alphabets in English is given in Table 4.3. Table 4.3 Bigram Statistics of English Alphabets A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

17 80 If the experimental key is closer to the key employed, this difference will then be less. If this difference is large, the experimental key is then not closer to the key employed. Now this problem has been reduced to an optimization problem where it is required to reduce the error or the difference in the fitness function to yield a minimum value. 4.7 APPLICATION OF FIREFLY ALGORITHM The objective is to minimize the error in the objective function which is the difference of the expected frequency count with the observed frequency count of the decrypted cipher text. Since statistical values are dealt with, it is possible to get the exact keyword only if the cipher texts are large enough (say > 50 KB). With cipher texts which are less than 1KB it is difficult to get the exact keyword or to put in other words, there may be multiple candidates satisfying the minimum fitness value. Hence, it is possible to have several alternate solutions. Mathematically, there is a multimodal function which has several valleys. Firefly algorithm is capable of solving multimodal functions. Swarm size is selected as 30 and the number of iterations is limited to 25.Each character in the keyword is 26 dimensional since the character may be any alphabet from A-Z and the parameters of the optimization function are given below. Number of flies = 30 α = 20 β = 10 γ =

18 RESULTS AND DISCUSSIONS Plain texts up to 1 KB were converted to cipher text with varying keyword lengths from 5 to 20 in Vigenere cipher. These cipher texts were given to PSO and the time taken for finding the key was noted. Firefly algorithm was also applied to these cipher texts and the keyword used for encryption was found and the time taken to find the keyword was noted. It was seen that with the firefly algorithm the search time was very less when compared with PSO algorithm. Three sets of password (key) lengths from 5 to 20 were tested and the corresponding time taken to find the exact key was tabulated in Table 4.4 and Table 4.5. It is observed clearly that the time required for finding the key using FA is very less when compared with PSO. Table 4.4 Elapsed time to find the different lengths Keyword using PSO Password ( key ) Password Elapsed Time in seconds 5 SAIRA 160 MUSIC 185 RAJEN SAIRAM 183 SAVICH 200 CIPHER EDRFTGY 206 CHANNEL 257 BCDAXYZ AFEQMOST 247 STRENGTH 280 ELEPHANT RAJENDRAN 251 PRESIDENT 302 RSPOQNYCD 271 PSO Average Time in seconds

19 82 10 GODISLOVEE 278 ACDINTOPLV 323 DQMEFABNOU ACEGIKMOQSU 311 FOUNDATIONS 345 MOSHIPRSTVY INTOXICATING 334 NEUROSCIENCE 367 VSTMPBCDAHNI SURIYAPRAVINK 354 INTERNATIONAL 388 OQSRTLUVWYZEG NOTESAVINXZYPO 380 UNDERPREVILEGE 416 CRUVFQLMNACDWI BOXIAYGCFMNSHEW 404 VIRTUALINTERACT 423 ADHCOPEGHZXYUVN AISYOPQRTYZXGHMU 426 ENTREPRENEURSHIP 436 EACDHNROVUISXYLB CSKBNRDHOIYFLQTAV 454 THERMALPOWERPLANT 462 POMNSHQRSTUVACDBL ACDEMFGOSTNXUVREGY 491 AABBCCDDEEFFGGHHII 478 RDHASKOPNIQRSTUVWX SHEMALEMECALUOVPZQS 495 ASDFGHJKLOIUYTREWQZ 502 IMCBADHNGFEOSTRVUNZ IVEYQRTSMNOPCABDFEZY 520 QWERTYUIOPLKJHGFDSAZ 522 NPRSTUVWABNDHCTWYLMG

20 83 Table 4.5 Elapsed time to find the different lengths Keyword using FA Password ( key ) Password 5 SAIRA MUSIC RAJEN SAIRAM SAVICH CIPHER EDRFTGY CHANNEL BCDAXYZ AFEQMOST STRENGTH ELEPHANT RAJENDRAN PRESIDENT RSPOQNYCD GODISLOVEE ACDINTOPLV DQMEFABNOU ACEGIKMOQSU FOUNDATIONS MOSHIPRSTVY INTOXICATING NEUROSCIENCE VSTMPBCDAHNI SURIYAPRAVINK INTERNATIONAL OQSRTLUVWYZEG NOTESAVINXZYPO UNDERPREVILEGE CRUVFQLMNACDWI Firefly Algorithm(FA) Elapsed Average Time in Time in seconds seconds

21 84 15 BOXIAYGCFMNSHEW VIRTUALINTERACT ADHCOPEGHZXYUVN AISYOPQRTYZXGHMU ENTREPRENEURSHIP EACDHNROVUISXYLB CSKBNRDHOIYFLQTAV THERMALPOWERPLANT POMNSHQRSTUVACDBL ACDEMFGOSTNXUVREGY AABBCCDDEEFFGGHHII RDHASKOPNIQRSTUVWX SHEMALEMECALUOVPZQS ASDFGHJKLOIUYTREWQZ IMCBADHNGFEOSTRVUNZ IVEYQRTSMNOPCABDFEZY QWERTYUIOPLKJHGFDSAZ NPRSTUVWABNDHCTWYLMG Figure 4.4 Comparison of PSO and FA

22 85 As stated by Yang (2013), FA is swarm-intelligence based, so it has the similar advantages like other swarm-intelligence based algorithms. However, FA has two main merits over other algorithms namely 1. Automatic subdivision 2. Ability of dealing with multimodality. In automatic subdivision, FA is based only on the parameter attractiveness and this attractiveness decreases with the distance. This result in the automatic subdivision of whole population into subgroups and each group can swarm around each mode or local optimum. From the total number of modes the best global solution can be easily found. Fireflies can easily found the optimum value parallel with the help of subdivision process, if the population size is sufficiently larger than the number of modes. Therefore, a whole population can subdivide into subgroups with a given, average distance. In the severe case when r = 0, the whole population will not subdivide. So this ability of automatic subdivision makes this FA particularly suitable for highly nonlinear and any multimodal optimization problems. Hence, from Table 4.3 and Table 4.4,it is clearly observed that the key can be found in less time using FA than PSO and it is shown in Figure 4.4

Efficient Cryptanalysis of Homophonic Substitution Ciphers

Efficient Cryptanalysis of Homophonic Substitution Ciphers Efficient Cryptanalysis of Homophonic Substitution Ciphers Amrapali Dhavare Richard M. Low Mark Stamp Abstract Substitution ciphers are among the earliest methods of encryption. Examples of classic substitution

More information

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography Topic 2 1 Lecture Outline Basics of probability Vigenere cipher. Attacks on Vigenere: Kasisky Test and Index of Coincidence Cipher machines:

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements 2 nd vs. 1 st edition of textbook HW1 due Tuesday 2/9 Readings/quizzes (on Canvas) due Friday 2/12 Agenda Last time Historical ciphers and their cryptanalysis

More information

CSCI3381-Cryptography

CSCI3381-Cryptography CSCI3381-Cryptography Lecture 2: Classical Cryptosystems September 3, 2014 This describes some cryptographic systems in use before the advent of computers. All of these methods are quite insecure, from

More information

Ciphers: Making and Breaking

Ciphers: Making and Breaking Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation

More information

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268 ò{çd@àt ø 2005.0.3. Suppose the plaintext alphabets include a z, A Z, 0 9, and the space character, therefore, we work on 63 instead of 26 for an affine cipher. How many keys are possible? What if we add

More information

Lecture (04) Classical Encryption Techniques (III)

Lecture (04) Classical Encryption Techniques (III) Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ Playfair Cipher one approach to improve security was to encrypt multiple letters the Playfair Cipher is an example invented by

More information

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ The rules for filling in this 5x5 matrix are: L to R, top to bottom, first with keyword after duplicate letters have been removed,

More information

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY ! """#$# AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY *Kallam Ravindra Babu 1, Dr. S. Udaya Kumar 2, Dr. A. Vinaya Babu 3 and Dr. M. Thirupathi Reddy 4 1 Research Scholar (JNTUH),

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3 Shift Cipher For 0 i 25, the ith plaintext character is shifted by some value 0 k 25 (mod 26). E.g. k = 3 a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y

More information

Security of Networks (12) Exercises

Security of Networks (12) Exercises (12) Exercises 1.1 Below are given four examples of ciphertext, one obtained from a Substitution Cipher, one from a Vigenere Cipher, one from an Affine Cipher, and one unspecified. In each case, the task

More information

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and ) A Better Cipher The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and ) To the first letter, add 1 To the second letter, add 14 To the third

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL Definition: Cryptosystem Cryptography means secret writing and it is the art of concealing meaning. A Cryptosystem is a 5-tuple(E, D,M,K,C),

More information

About Vigenere cipher modifications

About Vigenere cipher modifications Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 08 Shannon s Theory (Contd.)

More information

Chapter 2 Classical Cryptosystems

Chapter 2 Classical Cryptosystems Chapter 2 Classical Cryptosystems Note We will use the convention that plaintext will be lowercase and ciphertext will be in all capitals. 2.1 Shift Ciphers The idea of the Caesar cipher: To encrypt, shift

More information

Hidden Markov Models for Vigenère Cryptanalysis

Hidden Markov Models for Vigenère Cryptanalysis Hidden Markov Models for Vigenère Cryptanalysis Mark Stamp Fabio Di Troia Department of Computer Science San Jose State University San Jose, California mark.stamp@sjsu.edu fabioditroia@msn.com Miles Stamp

More information

OPTIMIZATION OF THE SUPPLIER SELECTION PROBLEM USING DISCRETE FIREFLY ALGORITHM

OPTIMIZATION OF THE SUPPLIER SELECTION PROBLEM USING DISCRETE FIREFLY ALGORITHM Advanced Logistic Systems Vol. 6. No. 1. (2012) pp. 117-126. OPTIMIZATION OF THE SUPPLIER SELECTION PROBLEM USING DISCRETE FIREFLY ALGORITHM LÁSZLÓ KOTA 1 Abstract: In this article I show a firefly optimization

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-22 Recap Two methods for attacking the Vigenère cipher Frequency analysis Dot Product Playfair Cipher Classical Cryptosystems - Section

More information

Using Matrices for Cryptography

Using Matrices for Cryptography Using Matrices for Cryptography In the newspaper, usually on the comics page, there will be a puzzle that looks similar to this: BRJDJ WT X BWUJ AHD PJYXDBODJ JQJV ZRJV GRJDJ T VH EJDBXWV YSXEJ BH FH 1

More information

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015 Lecture 5 in which we return to the dream about le chiffre indechiffrable. We will see this dream come true and next we will try, step by step, to break this unbreakable cipher. As you might remember,

More information

5. Classical Cryptographic Techniques from modular arithmetic perspective

5. Classical Cryptographic Techniques from modular arithmetic perspective . Classical Cryptographic Techniques from modular arithmetic perspective By classical cryptography we mean methods of encipherment that have been used from antiquity through the middle of the twentieth

More information

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc. Assignment 3 - Cryptography Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc. Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M.

More information

Firefly algorithm in optimization of queueing systems

Firefly algorithm in optimization of queueing systems BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 60, No. 2, 2012 DOI: 10.2478/v10175-012-0049-y VARIA Firefly algorithm in optimization of queueing systems J. KWIECIEŃ and B. FILIPOWICZ

More information

Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan

Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm David Morgan XOR as a cipher Bit element encipherment elements are 0 and 1 use modulo-2 arithmetic Example: 1

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 22, 2013 CPSC 467b, Lecture 3 1/35 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine

More information

Classical Cryptography

Classical Cryptography JASS 05 Seminar: Algorithms for IT Security Classical Cryptography Ilya Saverchenko June 6, 2005 Abstract Cryptography is a study of secret writing. It allows two people, usually referred to as Alice and

More information

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2 Common English Digrams and Trigrams Digrams EN RE ER NT TH ON IN TF AN OR Trigrams ENT ION AND ING IVE TIO FOR OUR THI ONE monoalphabetic cryptanalysis See class example Pfleeger, Security in Computing,

More information

26 HIDDEN MARKOV MODELS

26 HIDDEN MARKOV MODELS 26 HIDDEN MARKOV MODELS techniques to HMMs. Consequently, a clear understanding of the material in this chapter is crucial before proceeding with the remainder of the book. The homework problem will help

More information

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment. CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1

More information

Data and information security: 2. Classical cryptography

Data and information security: 2. Classical cryptography ICS 423: s Data and information security: 2. Classical cryptography UHM ICS 423 Fall 2014 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn? Outline ICS 423: s

More information

Lecture 12: Block ciphers

Lecture 12: Block ciphers Lecture 12: Block ciphers Thomas Johansson T. Johansson (Lund University) 1 / 19 Block ciphers A block cipher encrypts a block of plaintext bits x to a block of ciphertext bits y. The transformation is

More information

Cryptanalysis. A walk through time. Arka Rai Choudhuri

Cryptanalysis. A walk through time. Arka Rai Choudhuri Cryptanalysis A walk through time Arka Rai Choudhuri arkarai.choudhuri@gmail.com How many can you identify? History (or how I will give you hope of becoming world famous and earning $70 million along

More information

Polyalphabetic Ciphers

Polyalphabetic Ciphers Polyalphabetic Ciphers 1 Basic Idea: The substitution alphabet used for enciphering successive letters of plaintext changes. The selection of alphabets may depend on a keyword, a key stream, or electromechanical

More information

Lecture 8 - Cryptography and Information Theory

Lecture 8 - Cryptography and Information Theory Lecture 8 - Cryptography and Information Theory Jan Bouda FI MU April 22, 2010 Jan Bouda (FI MU) Lecture 8 - Cryptography and Information Theory April 22, 2010 1 / 25 Part I Cryptosystem Jan Bouda (FI

More information

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5 COMM1003 Information Theory Dr. Wassim Alexan Spring 2018 Lecture 5 The Baconian Cipher A mono alphabetic cipher invented by Sir Francis Bacon In this cipher, each letter is replaced by a sequence of five

More information

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used. UNIVERSITY OF EAST ANGLIA School of Mathematics May/June UG Examination 2010 2011 CRYPTOGRAPHY Time allowed: 2 hours Attempt THREE questions. Candidates must show on each answer book the type of calculator

More information

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3 Outline Computer Science 48 More on Perfect Secrecy, One-Time Pad, Mike Jacobson Department of Computer Science University of Calgary Week 3 2 3 Mike Jacobson (University of Calgary) Computer Science 48

More information

A block cipher enciphers each block with the same key.

A block cipher enciphers each block with the same key. Ciphers are classified as block or stream ciphers. All ciphers split long messages into blocks and encipher each block separately. Block sizes range from one bit to thousands of bits per block. A block

More information

Cook-Levin Theorem. SAT is NP-complete

Cook-Levin Theorem. SAT is NP-complete Cook-Levin Theorem SAT is NP-complete In other words SAT NP A NP A P SAT 1 Consider any A NP NTM N that decides A in polytime n k For any input w Σ * valid tableau of configurations 2 Properties of an

More information

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function ECE Lecture 5 Mathematical Background: Modular Arithmetic Motivation: Public-key ciphers RSA as a trap-door one-way function PUBLIC KEY message ciphertext M C = f(m) = M e mod N C RSA keys PUBLIC KEY PRIVATE

More information

CHAPTER 10 A GENERALIZED PLAYFAIR CIPHER INVOLVING INTERTWINING, INTERWEAVING AND ITERATION

CHAPTER 10 A GENERALIZED PLAYFAIR CIPHER INVOLVING INTERTWINING, INTERWEAVING AND ITERATION 151 CHAPTE 10 A GENEALIZED PLAYFAI CIPHE INVOLVING INTETWINING, INTEWEAVING AND ITEATION 152 10.1. INTODUCTION The Playfair cipher, which enjoyed its prominence during the Second World War, encrypts data

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES ANSWERS TO QUESTIONS 2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. 2.2 Permutation and substitution. 2.3 One key for symmetric

More information

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018

THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018 THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018 CPSC 418/MATH 318 L01 October 17, 2018 Time: 50 minutes

More information

Classical Cryptography

Classical Cryptography Outline [1] Introduction: Some Simple Cryptosystems The Shift Cipher The Substitution Cipher The Affine Cipher The Vigenère Cipher The Hill Cipher The Permutation Cipher [2] Cryptanalysis

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc.

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc. Innovation and Cryptoventures Cryptology Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc January 20, 2017 Overview Cryptology Cryptography Cryptanalysis Symmetric

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9. ( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use

More information

7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

7 Cryptanalysis. 7.1 Structural Attacks CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 7 Cryptanalysis Cryptanalysis Attacks such as exhaustive key-search do not exploit any properties of the encryption algorithm or implementation. Structural attacks

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

Polyalphabetic Substitutions

Polyalphabetic Substitutions Polyalphabetic Substitutions Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D-55099 Mainz October 25, 1999 English version October 13, 2013

More information

Introduction to Cryptography

Introduction to Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions:

More information

Friedman s Index of Coincidence and. Estimation of Keyword Length

Friedman s Index of Coincidence and. Estimation of Keyword Length Friedman s Index of Coincidence and Estimation of Keyword Length 1 William Friedman, 1891-1969 Photo: NSA 2 A sample of ordinary English contains the following distribution of letters letter count letter

More information

Historical cryptography

Historical cryptography Historical cryptography Alice Bob Eve CSCI 470: Web Science Keith Vertanen Overview Historical cryptography Monoalphabetic substitution ciphers Breaking them Some improvements The cipher of Mary Queen

More information

MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now?

MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now? MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now? The time you use everyday is a cycle of 12 hours, divided up into a cycle of 60 minutes. For every time you pass

More information

A Block Cipher using an Iterative Method involving a Permutation

A Block Cipher using an Iterative Method involving a Permutation Journal of Discrete Mathematical Sciences & Cryptography Vol. 18 (015), No. 3, pp. 75 9 DOI : 10.1080/097059.014.96853 A Block Cipher using an Iterative Method involving a Permutation Lakshmi Bhavani Madhuri

More information

Jay Daigle Occidental College Math 401: Cryptology

Jay Daigle Occidental College Math 401: Cryptology 3 Block Ciphers Every encryption method we ve studied so far has been a substitution cipher: that is, each letter is replaced by exactly one other letter. In fact, we ve studied stream ciphers, which produce

More information

MATH3302 Cryptography Problem Set 2

MATH3302 Cryptography Problem Set 2 MATH3302 Cryptography Problem Set 2 These questions are based on the material in Section 4: Shannon s Theory, Section 5: Modern Cryptography, Section 6: The Data Encryption Standard, Section 7: International

More information

Progress In Electromagnetics Research B, Vol. 36, , 2012

Progress In Electromagnetics Research B, Vol. 36, , 2012 Progress In Electromagnetics Research B, Vol. 36, 113 131, 2012 DESIGN OF A FULLY DIGITAL CONTROLLED RECON- FIGURABLE SWITCHED BEAM CONCENTRIC RING ARRAY ANTENNA USING FIREFLY AND PARTICLE SWARM OPTIMIZATION

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1. Solution. For the Atbash cipher for the Roman alphabet we have

Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1. Solution. For the Atbash cipher for the Roman alphabet we have Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1 1. (8 pts) Decrypt the following message, which was enciphered using the Atbash cipher. GSVYZ WMVDH RHGRN VUORV HGSVT LLWMV DHRHB LFIVG SVKRO LG Solution. For

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

The Evolution of Cryptology

The Evolution of Cryptology California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of Graduate Studies 6-2016 The Evolution of Cryptology Gwendolyn Rae Souza California

More information

Number Theory in Cryptography

Number Theory in Cryptography Number Theory in Cryptography Introduction September 20, 2006 Universidad de los Andes 1 Guessing Numbers 2 Guessing Numbers (person x) (last 6 digits of phone number of x) 3 Guessing Numbers (person x)

More information

ELECTRICITY GENERATION SCHEDULING AN IMPROVED FOR FIREFLY OPTIMIZATION ALGORITHM

ELECTRICITY GENERATION SCHEDULING AN IMPROVED FOR FIREFLY OPTIMIZATION ALGORITHM International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 June -01 www.irjet.net p-issn: -00 ELECTRICITY GENERATION SCHEDULING AN IMPROVED FOR FIREFLY OPTIMIZATION

More information

Solutions to the Midterm Test (March 5, 2011)

Solutions to the Midterm Test (March 5, 2011) MATC16 Cryptography and Coding Theory Gábor Pete University of Toronto Scarborough Solutions to the Midterm Test (March 5, 2011) YOUR NAME: DO NOT OPEN THIS BOOKLET UNTIL INSTRUCTED TO DO SO. INSTRUCTIONS:

More information

A Simple Introduction to Information, Channel Capacity and Entropy

A Simple Introduction to Information, Channel Capacity and Entropy A Simple Introduction to Information, Channel Capacity and Entropy Ulrich Hoensch Rocky Mountain College Billings, MT 59102 hoenschu@rocky.edu Friday, April 21, 2017 Introduction A frequently occurring

More information

Week 7 An Application to Cryptography

Week 7 An Application to Cryptography SECTION 9. EULER S GENERALIZATION OF FERMAT S THEOREM 55 Week 7 An Application to Cryptography Cryptography the study of the design and analysis of mathematical techniques that ensure secure communications

More information

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic

ECE 646 Lecture 5. Mathematical Background: Modular Arithmetic ECE 646 Lecture 5 Mathematical Background: Modular Arithmetic Motivation: Public-key ciphers RSA as a trap-door one-way function PUBLIC KEY message ciphertext M C = f(m) = M e mod N C M = f -1 (C) = C

More information

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. 1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. Directions: You have 75 minutes in which to complete this exam. Please make sure that you read through this entire exam before

More information

STATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION

STATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION Bulletin of the Transilvania University of Braşov Vol 4(53) No. 2-2011 Series III: Mathematics, Informatics, Physics, 129-140 STATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION Adela GEORGESCU 1 Ruxandra

More information

CS Homework 2: Combinatorics & Discrete Events Due Date: September 25, 2018 at 2:20 PM

CS Homework 2: Combinatorics & Discrete Events Due Date: September 25, 2018 at 2:20 PM CS1450 - Homework 2: Combinatorics & Discrete Events Due Date: September 25, 2018 at 2:20 PM Question 1 A website allows the user to create an 8-character password that consists of lower case letters (a-z)

More information

Shannon s Theory of Secrecy Systems

Shannon s Theory of Secrecy Systems Shannon s Theory of Secrecy Systems See: C. E. Shannon, Communication Theory of Secrecy Systems, Bell Systems Technical Journal, Vol. 28, pp. 656 715, 1948. c Eli Biham - March 1, 2011 59 Shannon s Theory

More information

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1). 1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not

More information

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad Outline CPSC 418/MATH 318 Introduction to Cryptography, One-Time Pad Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in part on slides

More information

THE HAGELIN CIPHER MACHINE (M-209) Cryptanalysis from Ciphertext Alone

THE HAGELIN CIPHER MACHINE (M-209) Cryptanalysis from Ciphertext Alone \.~) THE HAGELI CIPHER MACHIE (M-209) Cryptanalysis from Ciphertext Alone James Reeds University of California Berkeley, California 94720 Dennis Ritchie Robert Morris Bell Laboratories Murray Hill, ew

More information

19 Lorenz Cipher Machine

19 Lorenz Cipher Machine 9 Lorenz Cipher Machine During the Second World War, the codebreakers at Bletchley Park devised a variety of techniques that enabled the Allies to break the major codes used by the Germans. Not only was

More information

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev Cryptography Lecture 2: Perfect Secrecy and its Limitations Gil Segev Last Week Symmetric-key encryption (KeyGen, Enc, Dec) Historical ciphers that are completely broken The basic principles of modern

More information

A Large Block Cipher using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix

A Large Block Cipher using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix A Large Block Cipher using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix S. Udaya Kumar V. U. K. Sastry A. Vinaya babu Abstract In this paper, we have developed a block cipher

More information

PARTICLE SWARM OPTIMISATION (PSO)

PARTICLE SWARM OPTIMISATION (PSO) PARTICLE SWARM OPTIMISATION (PSO) Perry Brown Alexander Mathews Image: http://www.cs264.org/2009/projects/web/ding_yiyang/ding-robb/pso.jpg Introduction Concept first introduced by Kennedy and Eberhart

More information

Chaos and Cryptography

Chaos and Cryptography Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property

More information

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT 82 CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT 83 5.1 Introduction In a pioneering paper, Hill [5] developed a block cipher by using the modular arithmetic inverse

More information

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions Engineering Tripos Part IIA THIRD YEAR 3F: Signals and Systems INFORMATION THEORY Examples Paper Solutions. Let the joint probability mass function of two binary random variables X and Y be given in the

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Appendix A: Symmetric Techniques Block Ciphers A block cipher f of block-size

More information

Journal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(22): 2014

Journal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(22): 2014 Journal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(): 014 A Study of Different Complexity Evaluation Approaches for Some Cryptosystems Sabiha F. Jawad Al-Mustansyria University Iraq-

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Pre- modern Cryptography 1900 B.C. mid 1900 s A.D With few exceptions, synonymous with encryption c = Enc(k,m)

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

Unveiling the Chaocipher. Born in Dublin, Ireland on February 11, 1880, John F. Byrne created a cipher called the

Unveiling the Chaocipher. Born in Dublin, Ireland on February 11, 1880, John F. Byrne created a cipher called the Strickland 1 Tanner Strickland Dr. Bruff Math 115F 2 November 2010 Unveiling the Chaocipher Born in Dublin, Ireland on February 11, 1880, John F. Byrne created a cipher called the Chaocipher that has long

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics Spring 2008 What is Cryptography? cryptography: study of methods for sending messages in a form that only

More information

} has dimension = k rank A > 0 over F. For any vector b!

} has dimension = k rank A > 0 over F. For any vector b! FINAL EXAM Math 115B, UCSB, Winter 2009 - SOLUTIONS Due in SH6518 or as an email attachment at 12:00pm, March 16, 2009. You are to work on your own, and may only consult your notes, text and the class

More information

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

6.080 / Great Ideas in Theoretical Computer Science Spring 2008 MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Cryptography. monoalphabetic. Ciphers. New Cipher Types. Keyword Cipher. Further subdivisions:...

Cryptography. monoalphabetic. Ciphers. New Cipher Types. Keyword Cipher. Further subdivisions:... Cryptography Monoalphabetic Ciphers 1 New Cipher Types Further subdivisions:... Classical Stream Block Transposition Substitution polyalphabetic monoalphabetic Each plaintext character is mapped to several

More information

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 4: Enigma.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 4: Enigma. CS355: Cryptography Lecture 4: Enigma. Towards cryptographic engines } How to move from pencil and paper to more automatic ways of encrypting and decrypting? } How to design more secure ciphers } Alberti

More information