About Vigenere cipher modifications

Similar documents
Classical Cryptography

All-Or-Nothing Transforms Using Quasigroups

The Vigenère cipher is a stronger version of the Caesar cipher The encryption key is a word/sentence/random text ( and )

CPSC 467b: Cryptography and Computer Security

Chapter 2 Classical Cryptosystems

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

Cryptography CS 555. Topic 2: Evolution of Classical Cryptography CS555. Topic 2 1

Security of Networks (12) Exercises

NET 311D INFORMATION SECURITY

Cryptography. P. Danziger. Transmit...Bob...

Simple Codes MTH 440

Introduction to Cryptology. Lecture 2

Lecture (04) Classical Encryption Techniques (III)

one approach to improve security was to encrypt multiple letters invented by Charles Wheatstone in 1854, but named after his

Shift Cipher. For 0 i 25, the ith plaintext character is. E.g. k = 3

Data and information security: 2. Classical cryptography

Hans Delfs & Helmut Knebl: Kryptographie und Informationssicherheit WS 2008/2009. References. References

Written examination. Tuesday, August 18, 2015, 08:30 a.m.

... Assignment 3 - Cryptography. Information & Communication Security (WS 2018/19) Abtin Shahkarami, M.Sc.

Real scripts backgrounder 3 - Polyalphabetic encipherment - XOR as a cipher - RSA algorithm. David Morgan

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Cryptanalysis on An ElGamal-Like Cryptosystem for Encrypting Large Messages

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Lecture Notes. Advanced Discrete Structures COT S

Ciphers: Making and Breaking

monoalphabetic cryptanalysis Character Frequencies (English) Security in Computing Common English Digrams and Trigrams Chapter 2

Sol: First, calculate the number of integers which are relative prime with = (1 1 7 ) (1 1 3 ) = = 2268

Cook-Levin Theorem. SAT is NP-complete

An information encryption system based on Boolean functions

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

CSCI3381-Cryptography

10 Modular Arithmetic and Cryptography

Introduction to Cryptography

AN ENHANCED CRYPTOGRAPHIC SUBSTITUTION METHOD FOR INFORMATION SECURITY

17.1 Binary Codes Normal numbers we use are in base 10, which are called decimal numbers. Each digit can be 10 possible numbers: 0, 1, 2, 9.

1/16 2/17 3/17 4/7 5/10 6/14 7/19 % Please do not write in the spaces above.

Public Key Cryptography

Number theory (Chapter 4)

Efficient Cryptanalysis of Homophonic Substitution Ciphers

2.1 Plaintext, encryption algorithm, secret key, ciphertext, decryption algorithm.

} has dimension = k rank A > 0 over F. For any vector b!

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 7

My brief introduction to cryptography

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

ECE 646 Lecture 9. RSA: Genesis, operation & security

Lecture Notes. Advanced Discrete Structures COT S

The Hill Cipher A Linear Algebra Perspective

Classical Cryptography

AES side channel attacks protection using random isomorphisms

Polyalphabetic Ciphers

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION

The Web Cryptology Game CODEBREAKERS.EU edition 2015

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

A block cipher enciphers each block with the same key.

Implementation Tutorial on RSA

Chaos and Cryptography

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University, NBER and Investment Strategy Advisor, Man Group, plc.

Gurgen Khachatrian Martun Karapetyan

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

SCHOOL OF MATHEMATICS AND STATISTICS

Notes 10: Public-key cryptography

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 9: Encryption modes. AES

Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation

Powers in Modular Arithmetic, and RSA Public Key Cryptography

The Two Time Pad Encryption System

Points of High Order on Elliptic Curves ECDSA

Lecture 4: DES and block ciphers

Jay Daigle Occidental College Math 401: Cryptology

Computers and Mathematics with Applications

Quasigroups and stream cipher Edon80

MATH3302 Cryptography Problem Set 2

Solutions to the Midterm Test (March 5, 2011)

1/18 2/16 3/20 4/17 5/6 6/9 7/14 % Please do not write in the spaces above.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 4: Enigma.

Elliptic Curve Cryptography

Notes 4: Stream ciphers, continued. Recall from the last part the definition of a stream cipher:

Number Theory in Cryptography

Mathematical Foundations of Public-Key Cryptography

MONOALPHABETIC CIPHERS AND THEIR MATHEMATICS. CIS 400/628 Spring 2005 Introduction to Cryptography

Lecture 8 - Cryptography and Information Theory

Latin Squares and Their Applications

A Block Cipher using an Iterative Method involving a Permutation

Weaknesses in Hadamard Based Symmetric Key Encryption Schemes

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael

Cryptography Based on the Matrices. Key Words: Matrices, Conjugate Problem, Exchange of Keys, Cryptosystem. Contents.

What is Cryptography? by Amit Konar, Dept. of Math and CS, UMSL

Security Implications of Quantum Technologies

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Using Matrices for Cryptography

Notes on Alekhnovich s cryptosystems

Lecture 12: Block ciphers

Cryptography and Number Theory

A UNIVERSAL ALGORITHM FOR HOMOPHONIC CODING

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Chapter 4 Mathematics of Cryptography

RSA ENCRYPTION USING THREE MERSENNE PRIMES

A Large Block Cipher using an Iterative Method and the Modular Arithmetic Inverse of a key Matrix

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan

Transcription:

Proceedings of the Workshop on Foundations of Informatics FOI-2015, August 24-29, 2015, Chisinau, Republic of Moldova About Vigenere cipher modifications Eugene Kuznetsov Abstract TheaimofthisworkisamodificationoftheclassicalVigenere cipher, in order to improve the statistical properties of the ciphertext obtained after operation. The work deals with the (third) modification of the classic Vigenere cipher. Classic code is modified to a state in which it can already be implemented and analyzed. The necessary information from the theory of algebraic systems (fields, near-fields, groups, quasigroups, Latin squares, orthogonal tables etc.) is provided. Using the properties of these algebraic systems the modification of the cipher is constructed and studied. Keywords: Vigenere cipher, quasigroup, orthogonal tables. 1 Introduction This work is dedicated to oneof themost important aspects of information security software encryption methods. There are many reliable encryption algorithms now, but most of them have a significant drawback low speed of work. In this paper the famous Vigenere cipher will be discussed. The mere cipher is not of interest today, because there are simple hacking methods. But the principles laid down in it, potentially allow us to create quick and at the same time robust ciphers. The aim of this work is a modification of the classical Vigenere cipher, in order to improve the statistical properties of the cipher-text obtained after operation. The basis of modification of the classic cipher is an encryption methodby bigrams. Its essence lies in thefact that the original message is divided into pairs and each pair of symbols according c 2015 by E. Kuznetsov 312

About Vigenere cipher modifications to a certain law (special sequence table or tables) is encrypted in some other pair of symbols. The work deals with the (third) modification of the classic Vigenere cipher. Classic code is modified to a state in which it can already be implemented and analyzed. The necessary information from the theory of algebraic systems (fields, near-fields, groups, quasigroups, Latin squares, orthogonal tables etc.) is provided below. Using the properties of these algebraic systems the modification of the cipher is constructed and studied. Actually, these tables are a chip method, so they are paid a lot of attention. 2 Modified Vigenere cipher. 2.1 Polyalphabetic ciphers, Vigenere cipher. Vigenere cipher is a multi-alphabet advanced encryption system. The ideaofthecipheristouseasthekeythetextofanunencryptedmessage or an encrypted text. This cipher Vigenere described in his book A Treatise of ciphers. In its simplest form the basis of the table was taken Trithemius table which subsequently dubbed as the Vigenere s table. Vigenere s table consists of the alphabet shifted cyclically to the left by one character, but other permutations are available too. Additionally, the first line may be a randomly mixed alphabet. The encryption process is as follows: plain text (which must be encrypted) is written in a line with no spaces. Next, you must determine the key. Vigenere proposed to use as a key the plain text itself, adding to the top of the key a random selected symbol. But as a key it is possible to use any other sequence of characters equal in length to the plaintext. To produce the cipher-text we take the first letter of the plaintext as an index row in a table Vigenere and standing beneath the letter as a column. At the intersection of the pair of tables write out the character of the cipher-text. Then repeat these steps for each of the remaining characters. 313

E. Kuznetsov In order to decrypt the plaintext, you must know the cipher-text and the key. Take the first letter of the key, define the corresponding column in the Vigenere s table and run through it from top to bottom, until you meet the first character of the cipher-text. Once the desired character is met, we write a letter indicating this line, so we get the first character of the plaintext. We do the same steps for the remaining characters of the key and the cipher-text. In practice, in the programming of the encryption algorithm it is not necessary to have the Vigenere s table in memory, since the encryption algorithm can be represented by some algebraic formula based on such specific algebraic structures, as a field, near-field, orthogonal pair etc. 2.2 Algebraic concepts. Hacking classic Vigenere s cipher strongly relies on the presence of a codeword and its length. Therefore, if we save (slightly modified) an encryption method by bigrams, but to refuse from the code word, then the usual method of hacking will not act. Definition 1. Latin square of order n is a square table n n, where each row and each column contains numbers from 1 to n, and each number is found exactly once. Definition 2. The system G, is called a quasigroup if the following properties hold: 1. is a binary operation defined on the set G; 2. Each of the equations x a = b and a x = b has exactly one solution in G for any a,b G. From the algebraic viewpoint Latin square is a multiplication table of a quasigroup. Definition 3. A table of order n is called a selector if it satisfies one of the following conditions: x y = x or x y = y. In the first case the selector is called a right selector, in the second case the left selector. 314

About Vigenere cipher modifications If we take an arbitrary Latin square and a selector of corresponding dimension, the resulting pair of tables will have the property of orthogonality. That is, upon imposition of one of them to another, we obtain a table of pairs of symbols in which each pair of symbols appears exactly once. Algebraically this orthogonal property is described by the following definition. Definition 4. Two operations Q, and Q, on the same set Q are called orthogonal (or forming an orthogonal pair) if the following system { x y = a, x y = b, has exactly one solution in Q for any a,b Q. Definition 5. A near-field is a set Q with two binary operations + (addition) and (multiplication) defined on it, satisfying the following axioms: 1. Q, + is a commutative group; 2. (a b) c = a (b c) for all elements a,b,c Q; 3. (a+b) c = a c+b c for all elements a,b,c Q; 4. The set Q contains an element 1 such that 1 a = a 1 = a for every element a Q; 5. For each non-zero element a Q there exists an element a 1 such that a a 1 = 1 = a 1 a. Definition 6. If in the near-field Q the multiplication operation is commutative (a b = b a), then the resulting near-field is called a field. From the history of orthogonal Latin squares the following method of constructing a sufficiently large set of mutually orthogonal squares of order n is known (but only when n = p k, where p is a prime number, and k is a positive integer). 315

E. Kuznetsov Let Q,+,,0,1 be a near-field of order n. For any a Q we define a new operation x a y by the formula: x a y = a x+(1 a) y. This operation has the following properties: 1. x a y is a quasigroup, if a 0,1; 2. Operations x a y and x b y are orthogonal for any a b. Let the operations + and are set; then for the generation of orthogonal (n n)-tables we can use the formula x ij = a i+(1 a) j, where i,j {0,1,...,n 1}, and a {2,...,n 1}. 2.3 Procedures for encryption and decryption. The encryption procedure by bigrams is similar to the encryption process of the classical Vigenere s cipher, only the first bigram symbol is taken from the first table and the second bigram symbol is taken from the second table (instead of a key sequence, as it was done in the classic Vigenere s cipher). In other words, if we take the table of pairs resulting in the superposition of two orthogonal tables mentioned above, then the plaintext bigram (x, y) corresponds to the encryption bigram (a,b), which is located at the intersection of the x-th row and y-th column. This procedure is repeated sequentially for all bigrams of the encrypted text. Latin square in the algorithm described above can be changed to another Latin square. Orthogonality with the selector remains, and the encryption procedure does not change. The sequence of these squares (or its generation by any algebraic method) is defined by the secret key (or by periodic key sequence). It is easy to see that the statistical hacking algorithms stop working when the number of squares becomes substantially greater than 2. 316

About Vigenere cipher modifications It is easy to notice that the second character of bigram always remains the same after the procedure encryption. This may facilitate the probable hacking of this cipher. To avoid this we must use another Latin square (or (n n)-table) instead of the selector. It is important only that these two (n n)-tables will be orthogonal. To eliminate hack statistical methods it can be used several different tables instead of a single one. Then it is obvious that if more different tables to be used, then statistics of a source text will be violated stronger. The effect will be exactly the same as the increase in the length of a code phrase in the classic Vigenere s cipher. References [1] D. Kahn. The First 3,000 Years // The Codebreakers The Story of Secret Writing. New York: Charles Scribner s Sons, 1967, 473 p. [2] S. Singh. The Evolution of Secret Writing // The Code Book The Secret History of Codes & Code-breaking. London: Forth Estate, 2000, pp. 3 14. [3] A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. Handbook of Applied Cryptography, 2002. [4] E. Kuznetsov, S. Novoseltsev. A modification of Vijener s cipher by the methods of non-associativity algebra. ASADE-2007, Abstracts, Chisinau, August 21-23, 2007, 86. Eugene Kuznetsov Received July 12, 2015 Eugene Kuznetsov Institution: Institute of Mathematics and Computer Science, Academy of Sciences, MOLDOVA Address: MD-2028, Academiei str., 5, Chisinau, MOLDOVA Phone: (373) 022 738029 E mail: kuznet1964@mail.ru 317