The Web Cryptology Game CODEBREAKERS.EU edition 2015
|
|
- Sandra Morton
- 5 years ago
- Views:
Transcription
1 Lecture 5 in which we return to the dream about le chiffre indechiffrable. We will see this dream come true and next we will try, step by step, to break this unbreakable cipher. As you might remember, the method of breaking monoalphabetic ciphers was developed before IX century BC. Since that time cryptologists have been aware that vulnerability to character frequency analysis has been a weak point of this type of ciphers. We can only assume that to find a way of eliminating that vulnerability has been the objective of quite a number of cryptologists. Preserving the structure of the letter frequency has been the Achilles heel of the monoalphabetic cipher, so it seemed natural to ask - how could we mask the natural frequencies of characters? Finding the right answer to that question has taken a few centuries. EVERYTHING IS A CODE In 1586 a book, titled Traicté des Chiffres, by Blaise de Vigenère was published. The work contained, among others, the sentence everything in this world is a code, which is music to the ears of every cryptographer. In his book, Vigenère described the systems of encrypting information available and known in his times, and presented a few interesting new ideas. Quite paradoxically, nowadays cryptographers use the term Vigenère tableau (also called Vigenère table or Vigenère square ) in reference to something representing a simplification of his actual ideas. Since the Vigenère table is currently a standard example of using polyalphabetic ciphers, we need to familiarize ourselves with it. Let us construct a cipher alphabet table in which every successive line is shifted by one position in relation to the preceding line, as presented below. Traicté des Chiffres Blaise de Vigenère
2 Of course, the lines of Vigenère table might also be constructed by means of cipher alphabets in which particular characters are not arranged in alphabetical order. In particular, it is possible to construct a cipher alphabet table based on a keyword. It is important to shift the lines of the table by one position and as a result of the operation a different cipher alphabet is obtained. It is relatively easy to use the table. Let us assume that we are using the keyword VIGENR (formed out of the Renaissance cryptographer s surname) and the plaintext BLAISE (equivalent of the cryptographer s first name). Let us take the first character of the plaintext and the first character of the key: B and V. We choose the line starting with the letter V and find the cipher text counterpart of the letter B, its counterpart is the letter W. Then, we take the next character of the plaintext, the letter L, and another character of the key, the letter I. We find the counterpart of the letter L in the line of the table starting with the letter I, that is the letter T. We proceed in this manner until we run out of the keyword letters. Then, we return to the letter V and continue encrypting. As a result, we obtain the cryptogram WTGMFV. Blaise de Vigenère Traicté des Chiffres Blaise de Vigenère Using various cipher alphabets during the encryption process of the same plaintext must lead to obscuring the statistical properties of the plaintext and the code message and, among others, to making the structure of the frequency analysis diagram more even than in the monoalphabetic cipher. Let us check how these assumptions work in practice by encoding the following plaintext by means of the VIGENR keyword:
3 SAMPLE PLAINTEXT IN ENGLISH USED TO DEMONSTRATE THE CHARACTERISTIC FEATURES OF THE POLYALPHABETIC CIPHER ACCORDING TO THE VIGENER SYSTEM THE EXPECTED OUTCOME OF USING THE VIGENER CIPHER IS DISTORTING CHARACTER FREQUENCY IN RELATION TO THE MONOALPHABETIC SUBSTITUTION CIPHER We obtain the following ciphertext: NISTYVKTGMAKZFZMAVIORMFYPAKHGFYMSSAJOZGXRKCMILNIVKZIEZNBOGSVVBAVRJJNZ LRGJTEEYGCIHIGZXKOTUVMIIGBIYQTKGFOPKZVXZVKVFPNBKQGYZMDTRTOMJSHKXWSIBW PAORTKCMBMTVIMXGVGCMXMFUDAXYCKDVMGURMIIXRIAZKUHVIKEMAIZTGXVFIBUXUVHWT SNCKPGFRKDKYYOJOQZYGZJVIMCYZZ COULD IT BE INDECHIFFERREABLE? The statistical structure of the ciphertext has been considerably deformed in comparison to that of a monoalphabetic cipher. The frequency structure is more even and does not permit an easy identification of the characteristic peaks and valleys in the frequency chart. If we use a longer keyword, the frequency structure would be even more discouraging, reaching in the extreme cases almost uniform frequency distribution. The Vigenère cipher quite understandably gained the laurel of being dubbed le chiffre indechiffrable. His formula obviously resisted the attack based on the frequency analysis, and it was the only method of attack known at the time.and a following frequency diagram of the ciphertext. EARLY ATTACKS The Vigenère cipher remained secure for almost 300 years. The first scratch on its surface was made by a retired German officer, Friedrich Kasiski, born in Człuchów (nowadays located in Poland). Kasiski discovered the method of determining the key length. Knowing the key length the codebreaker could divide the cryptogram into groups of letters enciphered with the same cipher alphabet. Assuming, for instance, that the key was 5 letters long, the codebreaker took the first,
4 sixth, eleventh letter and so on to form the first group; then the second, seventh, twelveth letter and so on to form the second group, until he grouped all of the letters of the ciphertext into as many groups as the number of the letters in the keyword. Each group was transformed using a different cipher alphabet, but each and every character within the group was ciphered with exactly the same unknown cipher alphabet, which in turn allowed the codebreaker to apply the classic character frequency attack to each group individually. Kasiski s method was efficient only under specific circumstances, however, we will not discuss his method in detail here. In 1883, one of the most important works in the history of cryptology,a book written by a French scientist of Flemish origin, Auguste Kerckhoffs, titled La Criptographie Militaire, was published. In the book, Kerckhoffs Auguste Kerckhoffs presented two techniques of attacks on ciphers: the method of position symmetry and the method of superimposition. In this lecture we shall apply the position symmetry attack, accompanied by one of the most commonly used methods of attacking ciphers, the attack with a known or probable plaintext. BREAKING INTO THE POLYALPHABETIC CIPHER Before we start, it is worth recalling the initial fragment of the Vigenère table: The cipher alphabets in the successive lines of the table are created by shifting the characters by one position in relation to the previous line. Naturally, not all polyalphabetic systems were based on the Vigenère table consisting of regular alphabets. Alphabets with the distorted structure, e.g. generated on the basis of a keyword, were employed equally often. An example of such an alphabet has been provided below: A B C D E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D Vigenère tableau The cipher alphabets in the successive lines of the table are created by shifting the characters by one position in relation to the previous line. Naturally, not all polyalphabetic systems were based on the Vigenère table consisting of regular alphabets. Alphabets with the distorted structure, e.g.
5 generated on the basis of a keyword, were employed equally often. An example of such an alphabet has been provided below: K E Y W O R D K E Y W O R D A B C F G H I J L M N P Q S T U V X Z E Y W O R D A B C F G H I J L M N P Q S T U V X Z K Y W O R D A B C F G H I J L M N P Q S T U V X Z K E W O R D A B C F G H I J L M N P Q S T U V X Z K E Y O R D A B C F G H I J L M N P Q S T U V X Z K E Y W R D A B C F G H I J L M N P Q S T U V X Z K E Y W O D A B C F G H I J L M N P Q S T U V X Z K E Y W O R Vigenère tableau Irrespective of whether the ciphering alphabets have regular or distorted structures, one can note a particular feature of the table created by shifting the ciphering alphabets: each diagonal from the top right to the bottom left corner is composed of the same letters. Kerckhoffs s position symmetry attack is based right on that observation. To illustrate principle of that attack let us look at the example Kerckhoffs provided in his book. Please ignore the fact that the plaintext of the analyzed message is in French - this is of no importance to the method itself. Kerckhoffs analysed the following cryptogram: RBNBJ JHGTS PTABG JXZBG JICEM QAMUW IVGAG NEIMW REZKZ SUABR RBPBJ CGYBG JJMHE NPMUZ CHGWO UDCKO JKKBC PVPMJ NPGKW PWADW CPBVM RBZBH JWZDN MEUAO JFBMN KEXHZ AWMWK AQMTG LVGHC QBMWE The ciphertext is divided into groups of 5 words. This allows us to conclude that Kerckhoffs either assumed or knew the length of the keyword: five characters (had he not known the length of the keyword, he could have determined it using Kasiski's method). Knowing the events that the ciphertext referred to Kerckhoffs assumed that the text of the initial phrase of the ciphertext was as follows: le general wolseley telegraphie (General Wolseley telegraphs). Let us enter the probable phrase under the corresponding letters of the ciphertext: RBNBJ JHGTS PTABG JXZBG JICEM QAM legen eralw olsel eytel egrap hie
6 Let us create a table in which the columns correspond to the successive characters of the plaintext, and whose lines contain the five ciphering alphabets corresponding to the five characters of the keyword. We will enter the ciphertext characters into the lines corresponding to the position where they occurred and into columns corresponding to their equivalents in the probable text. For example, the third character of the ciphertext is N, which corresponds to the letter g of the plaintext. Therefore, we enter the character N into the third line of the table, into the column marked with the letter g. Having analyzed the first five characters of the ciphertext, we then return to the first alphabet, and enter the letter J (of the ciphertext) into the first line under the letter e of the plaintext. We repeat the described process for all the characters of the probable plaintext. We need to remember that the ciphertext counterparts should be entered into the appropriate lines of the table (i.e. lines with numbers corresponding to the numbers of the characters of the currently analyzed five-letter word). 1 J Q R P 2 B I A T H X 3 G M N C A Z 4 E B T 5 Z G J M S Just one look at the obtained table allows us to conclude that its second and fourth line is identical (this means that the second and fourth letter in the keyword are the same). Let us also note that (this is exactly where the position symmetry principle comes into play) the letter J can be found both in the first and fifth line, shifted by nine positions this means that the whole fifth line was shifted by 9 positions in relation to the first line. In order to ensure that the line of reasoning is clear, let us, for now, complete the table only with the conclusions resulting from the observations above: 1 G J M Q R S P Z 2 E B I A T H X 3 G M N C A Z 4 E B I A T H X 5 Z G J M Q R S P
7 However, also the third and fifth line are connected (by the letter M, with a shift by 11 positions), similarly as the second and third line (by the letter A, also with a shift by 11 positions). By completing the table with the conclusions from the successive relations between the lines, we get the following results: 1 G H J M Q N X R E S P B I C A Z T 2 E S P B I C A Z T G H J M Q N X R 3 G H J M Q N X R E S P B I C A Z T 4 E S P B I C A Z T G H J M Q N X R 5 I C A Z T G H J M Q N X R E S P B Auguste Kerckhoffs, La Criptographie Militaire We have 17 out of 26 ciphering alphabet characters at our disposal, and we can partially decode the cipher text. As a result, we obtain the following text (the unknown letters have been marked with asterisks): legen eralw olsel eytel egrap hie** s*ail iaqu* latte n*seu lemen tq*el eserv ice*e tra** **r** e**ec ommun From here, we can go in one of the two directions. We recommend the first method to those who know French: try and complete the missing fragments of the plaintext. Even the elementary knowledge of French allows us to recognize the phrase attend seulement que (is only waiting for) in the second line. Having obtained new characters of the probable text, we then return to completing the table of the ciphering alphabets, and apply the position symmetry method again. If the result is not sufficient to enable us to read the whole ciphertext, we keep repeating both stages of the process until we succeed.
8 The other of the two possible directions is based on analysis of the table itself. Let us look at the fragments we have underlined once again. 1 G H J M Q N X R E S P B I C A Z T 2 E S P B I C A Z T G H J M Q N X R 3 G H J M Q N X R E S P B I C A Z T 4 E S P B I C A Z T G H J M Q N X R 5 I C A Z T G H J M Q N X R E S P B It seems obvious that the basic ciphering alphabet has been generated by the keyword RESPUBLICA. After making this observation, completing the table of the ciphering alphabets and the final decoding of the intercepted message seem trivial. BUT HOW TO GUESS THE PROBABLE TEXT? The position symmetry proves to be a highly efficient attack method provided that we know or can easily guess a substantial part of the plaintext. Normally the codebreaker starts with a less ambitious assumption than the one demonstrated by Kerckhoffs. In the example presented below he assumed initially that the probable phrase is Le general. The application of the position symmetry method revealed next two letters e : Being familiar with the surnames of the enemy s generals allowed Kerckhoffs to make an assumption that the name in question was Wolseley, and this (again through applying the position symmetry method) led to revealing further letters e, l, e and e:
9 The word telegraphie may not be as straightforward as the surname of one of the general, but the fact that we know we are dealing with transferring of secret information makes the word easy to decipher. The example above demonstrates how a cryptologist, with the help of his intuition, can break into a cipher of which he has little data. LENGTH OF THE KEYWORD Kerckhoffs could have determined the length of the keyword by means of Kasiski's method. Had he lived a couple of years longer, he could have used the so-called index of coincidence, which was invented in about 1920 by an American cryptologist, William Friedman. Attention! The calculator of this index can be found in the team panel, in the tools section, the highest calculation results indicate a probable number of keyword letters. GOOD LUCK! The Codebreakers.eu Team
Introduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements 2 nd vs. 1 st edition of textbook HW1 due Tuesday 2/9 Readings/quizzes (on Canvas) due Friday 2/12 Agenda Last time Historical ciphers and their cryptanalysis
More informationPolyalphabetic Substitutions
Polyalphabetic Substitutions Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universität Saarstraße 21 D-55099 Mainz October 25, 1999 English version October 13, 2013
More informationThe Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )
A Better Cipher The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and ) To the first letter, add 1 To the second letter, add 14 To the third
More informationLecture (04) Classical Encryption Techniques (III)
Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ Playfair Cipher one approach to improve security was to encrypt multiple letters the Playfair Cipher is an example invented by
More informationone approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his
Lecture (04) Classical Encryption Techniques (III) Dr. Ahmed M. ElShafee ١ The rules for filling in this 5x5 matrix are: L to R, top to bottom, first with keyword after duplicate letters have been removed,
More informationCryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1
Cryptography CS 555 Topic 2: Evolution of Classical Cryptography Topic 2 1 Lecture Outline Basics of probability Vigenere cipher. Attacks on Vigenere: Kasisky Test and Index of Coincidence Cipher machines:
More informationChapter 2 Classical Cryptosystems
Chapter 2 Classical Cryptosystems Note We will use the convention that plaintext will be lowercase and ciphertext will be in all capitals. 2.1 Shift Ciphers The idea of the Caesar cipher: To encrypt, shift
More informationCSCI3381-Cryptography
CSCI3381-Cryptography Lecture 2: Classical Cryptosystems September 3, 2014 This describes some cryptographic systems in use before the advent of computers. All of these methods are quite insecure, from
More informationFinal Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.
Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show
More informationShift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3
Shift Cipher For 0 i 25, the ith plaintext character is shifted by some value 0 k 25 (mod 26). E.g. k = 3 a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y
More informationClassical Cryptography
Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice
More informationPolyalphabetic Ciphers
Polyalphabetic Ciphers 1 Basic Idea: The substitution alphabet used for enciphering successive letters of plaintext changes. The selection of alphabets may depend on a keyword, a key stream, or electromechanical
More informationIntroduction to Cryptography
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions:
More informationCiphers: Making and Breaking
Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation
More informationHistory of Maths andx
History of Maths andx where x Cryptography Substitution ciphers: Ancient - Renaissance A talk at the University of Nottingham by Peter Rowlett "The history of codes and ciphers is the story of the centuries-old
More informationHistorical cryptography
Historical cryptography Alice Bob Eve CSCI 470: Web Science Keith Vertanen Overview Historical cryptography Monoalphabetic substitution ciphers Breaking them Some improvements The cipher of Mary Queen
More informationJay Daigle Occidental College Math 401: Cryptology
3 Block Ciphers Every encryption method we ve studied so far has been a substitution cipher: that is, each letter is replaced by exactly one other letter. In fact, we ve studied stream ciphers, which produce
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 22, 2013 CPSC 467b, Lecture 3 1/35 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine
More informationAbout Vigenere cipher modifications
Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere
More informationSol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268
ò{çd@àt ø 2005.0.3. Suppose the plaintext alphabets include a z, A Z, 0 9, and the space character, therefore, we work on 63 instead of 26 for an affine cipher. How many keys are possible? What if we add
More information1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.
1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above. Directions: You have 75 minutes in which to complete this exam. Please make sure that you read through this entire exam before
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-22 Recap Two methods for attacking the Vigenère cipher Frequency analysis Dot Product Playfair Cipher Classical Cryptosystems - Section
More informationCristina Nita-Rotaru. CS355: Cryptography. Lecture 4: Enigma.
CS355: Cryptography Lecture 4: Enigma. Towards cryptographic engines } How to move from pencil and paper to more automatic ways of encrypting and decrypting? } How to design more secure ciphers } Alberti
More informationData and information security: 2. Classical cryptography
ICS 423: s Data and information security: 2. Classical cryptography UHM ICS 423 Fall 2014 Outline ICS 423: s s and crypto systems ciphers ciphers Breaking ciphers What did we learn? Outline ICS 423: s
More information... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.
Assignment 3 - Cryptography Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc. Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M.
More informationSecurity of Networks (12) Exercises
(12) Exercises 1.1 Below are given four examples of ciphertext, one obtained from a Substitution Cipher, one from a Vigenere Cipher, one from an Affine Cipher, and one unspecified. In each case, the task
More informationUniversity of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)
Make sure that this examination has 10 numbered pages University of Regina Department of Mathematics & Statistics Final Examination 200910 (April 21, 2009) Mathematics 124 The Art and Science of Secret
More informationAN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY
! """#$# AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY *Kallam Ravindra Babu 1, Dr. S. Udaya Kumar 2, Dr. A. Vinaya Babu 3 and Dr. M. Thirupathi Reddy 4 1 Research Scholar (JNTUH),
More informationCryptography. P. Danziger. Transmit...Bob...
10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of
More informationCryptography. The Making and Breaking of Secret Codes. 5/29/2009 John C. Polking, Rice University 1
Cryptography The Making and Breaking of Secret Codes. 5/29/2009 John C. Polking, Rice University 1 Need for Cryptography Many areas of human endeavor require secret communication. Modern methods of communication
More informationTHE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018
THE UNIVERSITY OF CALGARY FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE DEPARTMENT OF MATHEMATICS & STATISTICS MIDTERM EXAMINATION 1 FALL 2018 CPSC 418/MATH 318 L01 October 17, 2018 Time: 50 minutes
More information1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.
1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above. Directions: You have 50 minutes in which to complete this exam. Please make sure that you read through this entire exam before
More informationEfficient Cryptanalysis of Homophonic Substitution Ciphers
Efficient Cryptanalysis of Homophonic Substitution Ciphers Amrapali Dhavare Richard M. Low Mark Stamp Abstract Substitution ciphers are among the earliest methods of encryption. Examples of classic substitution
More informationThe Evolution of Cryptology
California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of Graduate Studies 6-2016 The Evolution of Cryptology Gwendolyn Rae Souza California
More informationCODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.
CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1
More informationCHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM
64 CHAPTER 4 REDUCTION OF VARIABLE LENGTH KEY SEARCH TIME OF VIGENERE CIPHER USING FIREFLY ALGORITHM 4.1 INTRODUCTION Any Cryptanalyst should focus on the two basic needs of cryptanalysis such as 1. To
More informationmonoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2
Common English Digrams and Trigrams Digrams EN RE ER NT TH ON IN TF AN OR Trigrams ENT ION AND ING IVE TIO FOR OUR THI ONE monoalphabetic cryptanalysis See class example Pfleeger, Security in Computing,
More informationClassical Cryptography
JASS 05 Seminar: Algorithms for IT Security Classical Cryptography Ilya Saverchenko June 6, 2005 Abstract Cryptography is a study of secret writing. It allows two people, usually referred to as Alice and
More informationThe Hill Cipher A Linear Algebra Perspective
The Hill Cipher A Linear Algebra Perspective Contents 1 Introduction to Classical Cryptography 3 1.1 Alice, Bob & Eve................................. 3 1.2 Types of Attacks.................................
More information2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.
CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES ANSWERS TO QUESTIONS 2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm. 2.2 Permutation and substitution. 2.3 One key for symmetric
More information5. Classical Cryptographic Techniques from modular arithmetic perspective
. Classical Cryptographic Techniques from modular arithmetic perspective By classical cryptography we mean methods of encipherment that have been used from antiquity through the middle of the twentieth
More informationsecretsaremadetobefoundoutwithtime UGETGVUCTGOCFGVQDGHQWPFQWVYKVJVKOG Breaking the Code
Breaking the Code To keep your secret is wisdom; but to expect others to keep it is folly. Samuel Johnson Secrets are made to be found out with time Charles Sanford Codes have been used by the military
More informationA block cipher enciphers each block with the same key.
Ciphers are classified as block or stream ciphers. All ciphers split long messages into blocks and encipher each block separately. Block sizes range from one bit to thousands of bits per block. A block
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple
More informationJournal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(22): 2014
Journal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(): 014 A Study of Different Complexity Evaluation Approaches for Some Cryptosystems Sabiha F. Jawad Al-Mustansyria University Iraq-
More informationCOS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017
COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Pre- modern Cryptography 1900 B.C. mid 1900 s A.D With few exceptions, synonymous with encryption c = Enc(k,m)
More informationFriedman s Index of Coincidence and. Estimation of Keyword Length
Friedman s Index of Coincidence and Estimation of Keyword Length 1 William Friedman, 1891-1969 Photo: NSA 2 A sample of ordinary English contains the following distribution of letters letter count letter
More informationMODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now?
MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now? The time you use everyday is a cycle of 12 hours, divided up into a cycle of 60 minutes. For every time you pass
More informationWritten examination. Tuesday, August 18, 2015, 08:30 a.m.
Advanced Methods of Cryptography Univ.-Prof. Dr. rer. nat. Rudolf Mathar 1 2 3 4 19 20 11 20 70 Written examination Tuesday, August 18, 2015, 08:30 a.m. Name: Matr.-No.: Field of study: Please pay attention
More informationInnovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc.
Innovation and Cryptoventures Cryptology Campbell R. Harvey Duke University, NBER and Investment Strategy Advisor, Man Group, plc January 20, 2017 Overview Cryptology Cryptography Cryptanalysis Symmetric
More information2.4 The Autokey cipher and cribs
2.4 The Autokey cipher and cribs 2.4.1 Using a crib One common tool in cryptanalysis is a crib, which is a known or guessed bit of plaintext corresponding to a ciphertext. (The term comes from the phrase
More informationOn adaptive of classical and public key cryptography by using E- and - laws
On adaptive of classical and public key cryptography by using E- and - laws AMEER A.J. AL-SWIDI University of Babylon,Collage of Education for pure sciences, Math. Department. Waleedabd73@yahoo.com Abstract:
More informationCryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev
Cryptography Lecture 2: Perfect Secrecy and its Limitations Gil Segev Last Week Symmetric-key encryption (KeyGen, Enc, Dec) Historical ciphers that are completely broken The basic principles of modern
More informationIntroduction to Cryptographic Engineering. Steven M. Bellovin
Introduction to Cryptographic Engineering Steven M. Bellovin https://www.cs.columbia.edu/~smb 1 Cryptographic Engineering? There are lots of introductions to encryption But using encryption in the real
More informationI.T.I.S. E. DIVINI SAN SEVERINO MARCHE. CRIPTOGRAPHY Monday 9th January 2006
I.T.I.S. E. DIVINI SAN SEVERINO MARCHE CRIPTOGRAPHY Monday 9th January 2006 History of cryptography The history of cryptography dates back thousands of years. Until recent decades, it has been a history
More informationRectangular Systems and Echelon Forms
CHAPTER 2 Rectangular Systems and Echelon Forms 2.1 ROW ECHELON FORM AND RANK We are now ready to analyze more general linear systems consisting of m linear equations involving n unknowns a 11 x 1 + a
More informationCMSC 389T MIDTERM SOLUTION
CMSC 389T MIDTERM SOLUTION Phong Dinh and William Gasarch Jan 12, 2017 Problem 1 Plutonians use alphabet with 512 = 2 9 symbols. Part a: How many affine ciphers are there? Part b: Alice and Bob want to
More informationCryptanalysis. A walk through time. Arka Rai Choudhuri
Cryptanalysis A walk through time Arka Rai Choudhuri arkarai.choudhuri@gmail.com How many can you identify? History (or how I will give you hope of becoming world famous and earning $70 million along
More informationMath 223, Spring 2009 Final Exam Solutions
Math 223, Spring 2009 Final Exam Solutions Name: Student ID: Directions: Check that your test has 16 pages, including this one and the blank one on the bottom (which you can use as scratch paper or to
More informationCS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4
CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky Lecture 4 Lecture date: January 26, 2005 Scribe: Paul Ray, Mike Welch, Fernando Pereira 1 Private Key Encryption Consider a game between
More informationSound approaches to cryptography
CHAPTER 4: CLASSICAL (SECRET-KEY) CRYPTOSYSTEMS Part IV Secret-key cryptosystems In this chapter we deal with some of the very old, or quite old, classical (secret-key or symmetric) cryptosystems that
More informationUsing Matrices for Cryptography
Using Matrices for Cryptography In the newspaper, usually on the comics page, there will be a puzzle that looks similar to this: BRJDJ WT X BWUJ AHD PJYXDBODJ JQJV ZRJV GRJDJ T VH EJDBXWV YSXEJ BH FH 1
More information17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.
( c ) E p s t e i n, C a r t e r, B o l l i n g e r, A u r i s p a C h a p t e r 17: I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science 17.1 Binary Codes Normal numbers we use
More informationReal scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan
Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm David Morgan XOR as a cipher Bit element encipherment elements are 0 and 1 use modulo-2 arithmetic Example: 1
More informationClassic Cryptography Tutorial. c Eli Biham - May 3, Classic Cryptography Tutorial (3)
Classic Cryptography Tutorial c Eli Biham - May 3, 2005 68 Classic Cryptography Tutorial (3) Ciphertext-Only Attack on Substitution Cipher Monoalphabetic substitution ciphers cannot protect against known
More informationSTATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION
Bulletin of the Transilvania University of Braşov Vol 4(53) No. 2-2011 Series III: Mathematics, Informatics, Physics, 129-140 STATISTICAL TOOLS USED IN CRYPTOGRAPHIC EVALUATION Adela GEORGESCU 1 Ruxandra
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 08 Shannon s Theory (Contd.)
More informationINVERSE OF A MATRIX [2.2] 8-1
INVERSE OF A MATRIX [2.2] 8-1 The inverse of a matrix: Introduction We have a mapping from R n to R n represented by a matrix A. Can we invert this mapping? i.e. can we find a matrix (call it B for now)
More informationComputer Security. 07. Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 07. Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 20, 2018 CS 419 2018 Paul Krzyzanowski 1 cryptography κρυπός γραφία hidden writing A secret manner of writing,
More informationMath 1350 (FALL 2008) Prelim 1 (10/6/2008) 1. Solution. For the Atbash cipher for the Roman alphabet we have
Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1 1. (8 pts) Decrypt the following message, which was enciphered using the Atbash cipher. GSVYZ WMVDH RHGRN VUORV HGSVT LLWMV DHRHB LFIVG SVKRO LG Solution. For
More informationCMSC 389T MIDTERM SOLUTION
CMSC 389T MIDTERM SOLUTION Phong Dinh and William Gasarch Jan 12, 2017 Problem 1 Plutonians use alphabet with 512 = 2 9 symbols. Part a: How many affine ciphers are there? SOLUTIONTO PROBLEM 1 We need
More information19 Lorenz Cipher Machine
9 Lorenz Cipher Machine During the Second World War, the codebreakers at Bletchley Park devised a variety of techniques that enabled the Allies to break the major codes used by the Germans. Not only was
More informationTHE ZODIAC KILLER CIPHERS. 1. Background
Tatra Mt. Math. Publ. 45 (2010), 75 91 DOI: 10.2478/v10127-010-0007-8 t m Mathematical Publications THE ZODIAC KILLER CIPHERS Håvard Raddum Marek Sýs ABSTRACT. We describe the background of the Zodiac
More informationCryptography. pieces from work by Gordon Royle
Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We
More informationWhat is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL
What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL Definition: Cryptosystem Cryptography means secret writing and it is the art of concealing meaning. A Cryptosystem is a 5-tuple(E, D,M,K,C),
More informationCRYPTOGRAPHY AND NUMBER THEORY
CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from
More information1999 version 2001 simplified version
香港中文大學讀書會 1999 version 2001 simplified version Author Simon Singh http://simonsingh.net/ 1. Fermat s Last Theorem the epic quest to Solve the World's Greatest Mathematical Problem(2007) 2. The Code Book(1999)
More informationSimple Codes MTH 440
Simple Codes MTH 440 Not all codes are for the purpose of secrecy Morse Code ASCII Zip codes Area codes Library book codes Credit Cards ASCII Code Steganography: Hidden in plain sight (example from http://www.bbc.co.uk/news/10
More information15 Adjusting the Columns of a Disk Cipher
K. Pommerening, Language Statistics 69 15 Adjusting the Columns of a Disk Cipher As a last application in this chapter we look at the problem: How to adjust the alphabets in the columns of a disk cipher?
More informationCODING, CRYPTOGRAPHY and CRYPTOGRAPHIC PROTOCOLS
CODING, CRYPTOGRAPHY and CRYPTOGRAPHIC PROTOCOLS prof. RNDr. Jozef Gruska, DrSc. Faculty of Informatics Masaryk University October 17, 2016 Part I Secret-key cryptosystems basics PROLOGUE - I. Decrypt
More informationUNIVERSITY OF CALIFORNIA Santa Barbara. Cryptanalysis of the SIGABA
UNIVERSITY OF CALIFORNIA Santa Barbara Cryptanalysis of the SIGABA A Thesis submitted in partial satisfaction of the requirements for the degree Master of Science in Computer Science by Michael Lee Committee
More informationThe Two Time Pad Encryption System
Hardware Random Number Generators This document describe the use and function of a one-time-pad style encryption system for field and educational use. You may download sheets free from www.randomserver.dyndns.org/client/random.php
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 33 The Diffie-Hellman Problem
More informationChapter 2 : Perfectly-Secret Encryption
COMP547 Claude Crépeau INTRODUCTION TO MODERN CRYPTOGRAPHY _ Second Edition _ Jonathan Katz Yehuda Lindell Chapter 2 : Perfectly-Secret Encryption 1 2.1 Definitions and Basic Properties We refer to probability
More informationMathematics: Modeling Our World Unit 2: SECRET CODES SUPPLEMENTAL ACTIVITY THE GOLD BUG S2.1
Mathematics: Modeling Our World Unit 2: SECRET CODES SUPPLEMENTAL ACTIVITY THE GOLD BUG S2.1 In The Gold Bug by Edgar Allan Poe, the character William Legrand stumbles across what appears to be a coded
More informationCryptography and Number Theory
Chapter 2 Cryptography and Number Theory 2.1 Cryptography and Modular Arithmetic 2.1.1 Introduction to Cryptography For thousands of years people have searched for ways to send messages in secret. For
More informationVideo intypedia001en EXERCISES
Video intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE EXERCISES Dr. Arturo Ribagorda Garnacho, Carlos III University of Madrid, Spain. EXERCISE 1 The discovery that in each
More informationWeek 7 An Application to Cryptography
SECTION 9. EULER S GENERALIZATION OF FERMAT S THEOREM 55 Week 7 An Application to Cryptography Cryptography the study of the design and analysis of mathematical techniques that ensure secure communications
More informationWilliam Stallings Copyright 2010
A PPENDIX F M EASURES OF S ECRECY AND S ECURITY William Stallings Copyright 2010 F.1 PERFECT SECRECY...2! F.2 INFORMATION AND ENTROPY...8! Information...8! Entropy...10! Properties of the Entropy Function...12!
More informationClock Arithmetic and Euclid s Algorithm
Clock Arithmetic and Euclid s Algorithm Lecture notes for Access 2008 by Erin Chamberlain. Earlier we discussed Caesar Shifts and other substitution ciphers, and we saw how easy it was to break these ciphers
More informationASSIGNMENT Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9.
ASSIGNMENT 1 1. Use mathematical induction to show that the sum of the cubes of three consecutive non-negative integers is divisible by 9. 2. (i) If d a and d b, prove that d (a + b). (ii) More generally,
More information( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1
( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r 2 0 1 6 C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1 CHAPTER 17: Information Science In this chapter, we learn how data can
More informationECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function
ECE Lecture 5 Mathematical Background: Modular Arithmetic Motivation: Public-key ciphers RSA as a trap-door one-way function PUBLIC KEY message ciphertext M C = f(m) = M e mod N C RSA keys PUBLIC KEY PRIVATE
More informationPaterson Public Schools
A. Concepts About Print Understand how print is organized and read. (See LAL Curriculum Framework Grade KR Page 1 of 12) Understand that all print materials in English follow similar patterns. (See LAL
More informationNotes 10: Public-key cryptography
MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such
More informationHomework 4 for Modular Arithmetic: The RSA Cipher
Homework 4 for Modular Arithmetic: The RSA Cipher Gregory V. Bard April 25, 2018 This is a practice workbook for the RSA cipher. It is not suitable for learning the RSA cipher from scratch. However, there
More informationIntroduction to Information Security
Introuction to Inforation Security Lecture : Classical Ciphers 007. 6. Prof. Byoungcheon Lee sultan (at) joongbu. ac. kr Inforation an Counications University Contents 1. History of cryptographic research.
More informationISSN: Received: Year: 2016, Number: 14, Pages: Published: Original Article **
http://www.newtheory.org ISSN: 2149-1402 Received: 14.01.2016 Year: 2016, Number: 14, Pages: 58-72 Published: 24.07.2016 Original Article ** FRAGMENTED POLYALPHABETIC CIPHER Yunus Aydoğan Naim Çağman Irfan
More information