Simple Codes MTH 440

Similar documents
Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Chapter 2 Classical Cryptosystems

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2

Introduction to Cryptography

Cook-Levin Theorem. SAT is NP-complete

Lecture Notes. Advanced Discrete Structures COT S

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Public Key Cryptography

Lecture Notes. Advanced Discrete Structures COT S

} has dimension = k rank A > 0 over F. For any vector b!

CPSC 467b: Cryptography and Computer Security

An Introduction to Cryptography

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

26 HIDDEN MARKOV MODELS

University of Regina Department of Mathematics & Statistics Final Examination (April 21, 2009)

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

About Vigenere cipher modifications

Data and information security: 2. Classical cryptography

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc.

Grade 7 and 8 Math Circles March 19th/20th/21st. Crytography

Lecture 12: Block ciphers

Introduction to Cryptology. Lecture 2

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.

CHAPTER 5 A BLOCK CIPHER INVOLVING A KEY APPLIED ON BOTH THE SIDES OF THE PLAINTEXT

Jay Daigle Occidental College Math 401: Cryptology

Video intypedia001en EXERCISES

MATH3302 Cryptography Problem Set 2

Math 1350 (FALL 2008) Prelim 1 (10/6/2008) 1. Solution. For the Atbash cipher for the Roman alphabet we have

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.

Lecture 8 - Cryptography and Information Theory

Weaknesses in Hadamard Based Symmetric Key Encryption Schemes

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY

Chapter 3 Cryptography

5199/IOC5063 Theory of Cryptology, 2014 Fall

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Chapter 3 Cryptography

Grade 6 Math Circles. History of Cryptography - Solutions

Cryptanalysis. A walk through time. Arka Rai Choudhuri

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

Lecture (04) Classical Encryption Techniques (III)

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

A block cipher enciphers each block with the same key.

2.4 The Autokey cipher and cribs

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Number Theory in Cryptography

5. Classical Cryptographic Techniques from modular arithmetic perspective

MODULAR ARITHMETIC. Suppose I told you it was 10:00 a.m. What time is it 6 hours from now?

Algebra for Cryptology

Lecture 9 - Symmetric Encryption

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

( c ) E p s t e i n, C a r t e r a n d B o l l i n g e r C h a p t e r 1 7 : I n f o r m a t i o n S c i e n c e P a g e 1

Chapter 2 : Perfectly-Secret Encryption

Notes on Alekhnovich s cryptosystems

Topics. Probability Theory. Perfect Secrecy. Information Theory

Security of Networks (12) Exercises

Number theory (Chapter 4)

Mono alphabetic substitution cipher

Great Theoretical Ideas in Computer Science

Ma/CS 6a Class 1. Course Details

Using Matrices for Cryptography

Introduction to Cryptography

History of Maths andx

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Chapter 2. A Look Back. 2.1 Substitution ciphers

Classical Cryptography

Akelarre. Akelarre 1

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

Polyalphabetic Ciphers

CHAPTER 10 A GENERALIZED PLAYFAIR CIPHER INVOLVING INTERTWINING, INTERWEAVING AND ITERATION

Introduction to Cryptology. Lecture 3

Implementation Tutorial on RSA

Math 223, Spring 2009 Final Exam Solutions

CRYPTOGRAPHY AND NUMBER THEORY

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

3F1: Signals and Systems INFORMATION THEORY Examples Paper Solutions

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Computer Security. 07. Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Homework 4 for Modular Arithmetic: The RSA Cipher

NET 311D INFORMATION SECURITY

Quick 'n' Easy. Then under it, using the same spacing, write the rest of alphabet in order, In this case, it would produce:-

Solutions to the Midterm Test (March 5, 2011)

Outline. Computer Science 418. Number of Keys in the Sum. More on Perfect Secrecy, One-Time Pad, Entropy. Mike Jacobson. Week 3

Cryptography and Number Theory

and its Extension to Authenticity

Homework Problems, Math 134, Spring 2007 (Robert Boltje)

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 5

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrosky. Lecture 4

Outline. CPSC 418/MATH 318 Introduction to Cryptography. Information Theory. Partial Information. Perfect Secrecy, One-Time Pad

ECE 646 Lecture 5. Motivation: Mathematical Background: Modular Arithmetic. Public-key ciphers. RSA keys. RSA as a trap-door one-way function

Efficient Cryptanalysis of Homophonic Substitution Ciphers

Latin Squares and Their Applications

Journal of Babylon University/Pure and Applied Sciences/ No.(3)/ Vol.(22): 2014

Modern symmetric encryption

Hidden Markov Models for Vigenère Cryptanalysis

Transcription:

Simple Codes MTH 440

Not all codes are for the purpose of secrecy Morse Code ASCII Zip codes Area codes Library book codes Credit Cards

ASCII Code

Steganography: Hidden in plain sight (example from http://www.bbc.co.uk/news/10 480477) Logos 2

Permutation Ciphers The plaintext is all there, it is just mixed up in some way. Scytale Block and Rotate Transposition Ciphers: Columnar Transposition

Columnar Transposition The secret key is the width of a rectangle The message is written across the rectangle and the ciphertext is read down the columns:

Plaintext: The answers to the test are abcbbadeac Rectangle width: 7 1 2 3 4 5 6 7 T H E A N S W E R S T O T H E T E S T A R E A B C B B A D E A C X X X Ciphertext: TEEEDHRTAEESEBAATSCCNOTBXSTABXWHRAX

Plaintext: The answers to the test are abcbbadeac Rectangle width: 7 T H E A N S W E R S T O T H E T E S T A R E A B C B B A D E A C X X X Ciphertext: TEEEDHRTAEESEBAATSCCNOTBXSTABXWHRAX

Plaintext: The answers to the test are abcbbadeac Rectangle width: 7 T H E A N S W E R S T O T H E T E S T A R E A B C B B A D E A C Ciphertext: TEEEDHRTAEESEBAATSCCNOTBSTABWHRA

Your turn decipher the following (width = 11; no padding) keonamoklwsilbseutdtegwneissspd

Width unknown DECRYPT: (Assume rows were not permuted.) TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHSAEE HNUEEEILSOYUMSSSSTQFPS Guess the number of rows/columns & check (there are online applets for this) OR Look: TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHSAEE HNUEEEILSOYUMSSSSTQFPS TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHSAEE HNUEEEILSOYUMSSSSTQFPS

COLUMNAR transposition TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHSAEEHNUEEE ILSOYUMSSSSTQFPS T O Q O I E O U We either have 5 full rows or 4 full rows and one partial row. There are 61 letters. Since 61 is not divisible by 5 we have 4 full rows and a partial. 61 = 4 x 15 + 1. So we have 4 rows of 15 columns and the last row just has one column

COLUMNAR transposition TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHS AEEHNUEEEILSOYUMSSSSTQFPS 1 2 3 4 5 6 7 8 9 1 0 T E O U T E E E R E U I Y S Q O O E F A T U E H E E L U S F Q U H D H A H S S H E S M S P O T F Q T T R H A N E O S T S I This doesn t look promising 1 1 1 2 1 3 1 4 1 5

COLUMNAR transposition TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHS AEEHNUEEEILSOYUMSSSSTQFPS T O Q O I E O U T O E H F U So we have 11 full rows or 10 full rows and one partial row. Since 61 is not divisible by 11 we have 10 full rows and one partial: 61 = 10x6 + 1 So if this is correct, we have 6 columns.

COLUMNAR transposition TOQOIEOUTOEHFUFDQTAHTETATEUHREESHRHS AEEHNUEEEILSOYUMSSSSTQFPS 1 2 3 4 5 6 T H E S U M O F T H E S Q U A R E S O F T H E S I D E S I S E Q U A L T O T H E S Q U A R E O F T H E H Y P O T E N U S E

To easy? Add a codeword and alphabetize the columns P Y T H A G T H E S U M O F T H E S Q U A R E S O F T H E S I D E S I S E Q U A L T O T H E S Q U A R E O F T H E H Y P O T E N U S E A G H P T Y U M S T E H E S H O T F E S R Q A U E S H O T F I S S I E D L T A E U Q S Q E O H T O F E U R A Y P H T E H U S N O E T E Ciphertext: ueeeilsoyumsssstqfpsshrhsaeehntoqoieoutoeetateuhreehfufdqtaht

Simple Substitution Ciphers Substitute each letter by another letter or symbol

PigPen cipher

Back Jacket Cover of Dan Brown s The Lost Symbol

Too easy? Add a codeword Codeword Davinci (don t use repeated letters, followed by unused letters alphabetically) D A V G H J I N C K L M B E F O P Q R S U T

Decrypt (homework) what is the codeword and plaintext?

Breaking simple substitution ciphers Frequency analysis: Most common English letters: E T A O I N S H R D L U Most common double letters: SS, EE, TT, FF, LL, MM, OO Most common digraphs: th er on an re he in ed nd ha at en es of or nt ea ti to it st io le is ou ar as de rt ve Single letter words: A, I http://www.wiley.com/college/mat/gilbert139343/java /java11_s.html

Polybuis Checkerboard 1 2 3 4 5 1 A B C D E 2 F G H I/J K 3 L M N O P 4 Q R S T U 5 V W X Y Z Decipher: 23 15 31 31 34

Polybuis Checkerboard with codeword 1 2 3 4 5 1 M A T H E 2 I/J C S B D 3 F G K L N 4 O P Q R U 5 V W X Y Z Homework: Encipher Mathematics is fun using the codeword Cryptology

Playfair Cipher pairs of letter are enciphered together A B C D E F G H I/J K L M N O P Q R S T U V W X Y Z Encipher: I am brilliant Decipher: zdtxptbqcz

Playfair Cipher mix up the letters (code word or pattern) A Q P O N B R Y X M C S Z W L D T U V K E F G H I/J Write the grid for the playfair cipher using the codeword Wendesday then encrypt Tuesday