Overview Menu Jefferson Wheel Cipher What Is Cryptology?

Total Page:16

File Type:pdf, Size:1020Kb

Overview Menu Jefferson Wheel Cipher What Is Cryptology? Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Overview Class 1: 1. Introduction, Pre-WWII cryptology 2. Lorenz Cipher (Fish) Introduction – Used by Nazis for high command messages and – First programmable electronic computer built Cryptography to break it 3. Enigma Cipher before – Used by German Navy, Army, Air Force World War II – Broken by team including Alan Turing 4. Post-WWII – Modern symmetric ciphers – Public-Key Cryptography Bletchley Park, Summer 2004 http://www.cs.virginia.edu/jillcrypto JILL WWII Crypto Spring 2006 - Class 1: Introduction 2 Menu Jefferson Wheel Cipher • Introduction to Cryptology – Terminology – Principles – Brief history of 4000 years of Cryptology • Cryptology before World War II – A simple substitution cipher – [Break] – Breaking substitution cipher – Vigenère Cipher JILL WWII Crypto Spring 2006 - Class 1: Introduction 3 JILL WWII Crypto Spring 2006 - Class 1: Introduction 4 What is cryptology? Cryptology and Security • Greek: “krypto” = hide Cryptology is a branch of • Cryptology – science of hiding – Cryptography, Cryptanalysis – hide meaning of a mathematics . message – Steganography, Steganalysis – hide existence of a message Security is about people . • Cryptography – secret writing • Cryptanalysis – analyzing (breaking) secrets Cryptanalysis is what attacker does Attackers try find the weakest link. In Decipher or Decryption is what legitimate receiver most cases, this is not the mathematics. does JILL WWII Crypto Spring 2006 - Class 1: Introduction 5 JILL WWII Crypto Spring 2006 - Class 1: Introduction 6 1 Introductions Introductions Insecure Channel Insecure Channel Ciphertext Ciphertext Plaintext Encrypt Decrypt Plaintext Plaintext Encrypt Decrypt Plaintext Eve Alice Alice (passive attacker) Bob Malice Bob (active attacker) JILL WWII Crypto Spring 2006 - Class 1: Introduction 7 JILL WWII Crypto Spring 2006 - Class 1: Introduction 8 Cryptosystem Ciphertext = E(Plaintext) “The enemy knows the Required property: E must be invertible system being used.” Plaintext = D(Ciphertext) Desired properties: Claude Shannon Without knowing D must be “hard” to invert E and D should be easy to compute Possible to have lots of different E and D JILL WWII Crypto Spring 2006 - Class 1: Introduction 9 JILL WWII Crypto Spring 2006 - Class 1: Introduction 10 Kerckhoff’s Principle http://monticello.org/jefferson/wheel • French handbook of military cryptography, 1883 • Cryptography always involves: – Transformation cipher/ – Secret • Security should depend only on the key • Don’t assume enemy won’t know algorithm – Can capture machines, find patents, etc. – Too expensive to invent new algorithm if it might have been compromised Axis powers often forgot this JILL WWII Crypto Spring 2006 - Class 1: Introduction 11 JILL WWII Crypto Spring 2006 - Class 1: Introduction 12 2 Really Brief History Symmetric Cryptosystem First 4000 years Ciphertext = E (K, Message ) Message = D (K, Ciphertext ) Vigenère Desired properties: Babbage breaks Vigenère; 1.Kerckhoff’s: secrecy depends only on K Kasiski (1863) publishes Cryptographers 2.Without knowing K must be “hard” to invert Alberti – first polyalphabetic cipher 3.Easy to compute E and D monoalphabetics Cryptanalysts All cryptosystems until 1970s were like this. al-Kindi - frequency analysis Asymmetric cryptosystems allow encryption and 3000BC decryption keys to be different. 900 1460 1854 JILL WWII Crypto Spring 2006 - Class 1: Introduction 13 JILL WWII Crypto Spring 2006 - Class 1: Introduction 14 Really Brief History - last 100+ years Themes Mauborgne – one-time pad Quantum Crypto • Arms race: cryptographers vs. cryptanalysts ? – Often disconnect between two (e.g., Mary Queen of Linear, Differential Cryptanalysis Scots uses monoalphabetic cipher long after known Feistel block cipher, DES Enigma adds rotors, stops repeated key breakable) Turing’s loop attacks, Public-Key Colossus 1978 • Motivated by war (more recently: commerce) Rejewski repeated • Driven by advances in technology, message-key attack Cryptanalysts mathematics Mechanical ciphers - Enigma – Linguists, classicists, mathematicians, computer Cryptographers scientists, physicists • Secrecy often means advances rediscovered 1854 1918 1939 1945 1973 and mis-credited 1895 – Invention of Radio JILL WWII Crypto Spring 2006 - Class 1: Introduction 15 JILL WWII Crypto Spring 2006 - Class 1: Introduction 16 Types of Attacks Security vs. Pragmatics • Ciphertext-only - How much Ciphertext? • Trade-off between security and effort • Known Plaintext - often “Guessed Plaintext” – Time to encrypt, cost and size of equipment, key sizes, change frequency • Chosen Plaintext (get ciphertext) – One-time pad (1918) offers theoretically – Not as uncommon as it sounds! “perfect” security, but unacceptable cost • Chosen Ciphertext (get plaintext) • Compromises lead to insecurity (class 2) • Dumpster Diving • Commerce • Social Engineering – Don’t spend $10M to protect $1M – Don’t protect $1B with encryption that can be • “Rubber-hose cryptanalysis” broken for $1M – Cryptanalyst uses threats, blackmail, torture, • Military bribery to get the key – Values (and attacker resources) much harder to measure JILL WWII Crypto Spring 2006 - Class 1: Introduction 17 JILL WWII Crypto Spring 2006 - Class 1: Introduction 18 3 Simple Substitution Cipher Key Space • Substitute each letter based on • Number of possible keys mapping 26 (ways to choose what a maps to) • Key is alphabet mapping: * 25 (b can map to anything else) a → J, b → L, c → B, d → R, ..., z → F * 24 (c can map to anything else) … * 1 (only one choice left for z) • How secure is this cipher? = 26! = 403291461126605635584000000 If every person on earth tried one per second, it would take 5B years to try them all. JILL WWII Crypto Spring 2006 - Class 1: Introduction 19 JILL WWII Crypto Spring 2006 - Class 1: Introduction 20 Really Secure? Monoalphabetic Cipher • Key space gives the upper bound – Worst possible approach for the “XBW HGQW XS ACFPSUWG FWPGWXF cryptanalyst is to try all possible keys CF AWWKZV CDQGJCDWA CD BHYJD DJXHGW; WUWD XBW ZWJFX • Clever attacker may find better PHGCSHF YCDA CF GSHFWA LV XBW approach: KGSYCFW SI FBJGCDQ RDSOZWAQW – Eliminate lots of possible keys quickly OCXBBWZA IGSY SXBWGF.” – Find patters in ciphertext – Find way to test keys incrementally JILL WWII Crypto Spring 2006 - Class 1: Introduction 21 JILL WWII Crypto Spring 2006 - Class 1: Introduction 22 Frequency Analysis Pattern Analysis “XBW HGQW XS ACFPSUWG FWPGWXF CF “XBe HGQe XS ACFPSUeG FePGeXF CF AWWKZV CDQGJCDWA CD BHYJD DJXHGW; AeeKZV CDQGJCDeA CD BHYJD DJXHGe; WUWD XBW ZWJFX PHGCSHF YCDA CF eUeD XBe ZeJFX PHGCSHF YCDA CF GSHFWA LV XBW KGSYCFW SI FBJGCDQ GSHFeA LV XBe KGSYCFe SI FBJGCDQ RDSOZWAQW OCXBBWZA IGSY SXBWGF.” RDSOZeAQe OCXBBeZA IGSY SXBeGF.” W: 20 “Normal” English: XBe = “the” C: 11 e 12% Most common trigrams in English: F: 11 t 9% the = 6.4% G: 11 a 8% and = 3.4% JILL WWII Crypto Spring 2006 - Class 1: Introduction 23 JILL WWII Crypto Spring 2006 - Class 1: Introduction 24 4 Guessing Guessing “the HGQe tS ACFPSUeG FePGetF CF “the HGQe to ACFPoUeG FePGetF CF AeeKZV CDQGJCDeA CD hHYJD DJtHGe; AeeKZV CDQGJCDeA CD hHYJD DJtHGe; eUeD the ZeJFt PHGCSHF YCDA CF eUeD the ZeJFt PHGCoHF YCDA CF GSHFeA LV the KGSYCFe SI FhJGCDQ GoHFeA LV the KGoYCFe oI FhJGCDQ RDSOZeAQe OCthheZA IGSY StheGF.” RDoOZeAQe OCthheZA IGoY otheGF.” otheGF = “others” S = “o” JILL WWII Crypto Spring 2006 - Class 1: Introduction 25 JILL WWII Crypto Spring 2006 - Class 1: Introduction 26 Guessing Guessing “the HrQe to ACsPoUer sePrets Cs “the HrQe to ACscoUer secrets Cs AeeKZV CDQrJCDeA CD hHYJD DJtHre; AeeKZV CDQrJCDeA CD hHYJD DJtHre; eUeD the ZeJst PHrCoHs YCDA Cs eUeD the ZeJst cHrCoHs YCDA Cs roHseA LV the KroYCse oI shJrCDQ roHseA LV the KroYCse oI shJrCDQ RDoOZeAQe OCthheZA IroY others.” RDoOZeAQe OCthheZA IroY others.” “sePrets” = “secrets” “ACscoUer” = “discover” JILL WWII Crypto Spring 2006 - Class 1: Introduction 27 JILL WWII Crypto Spring 2006 - Class 1: Introduction 28 Guessing Monoalphabetic Cipher “the HrQe to discover secrets is “The urge to discover secrets is deeply deeKZV iDQrJiDed iD hHYJD DJtHre; eveD the ZeJst cHrioHs YiDd is ingrained in human nature; even the roHsed LV the KroYise oI shJriDQ least curious mind is roused by the RDoOZedQe OithheZd IroY others.” promise of sharing knowledge withheld from others.” - John Chadwick, The Decipherment of Linear B JILL WWII Crypto Spring 2006 - Class 1: Introduction 29 JILL WWII Crypto Spring 2006 - Class 1: Introduction 30 5 Why was it so easy? How to make it harder? • Doesn’t hide statistical properties of • Cosmetic plaintext • Hide statistical properties: • Doesn’t hide relationships in plaintext – Encrypt “e” with 12 different symbols, “t” with 9 different symbols, etc. (EE cannot match dg) – Add nulls, remove spaces • English (and all natural languages) is • Polyalphbetic cipher very redundant: about 1.5 bits of information per letter (~68% f ltrs r – Use different substitutions redndnt) • Transposition – Compress English with gzip – about 1:6 – Scramble order of letters JILL WWII Crypto Spring 2006 - Class 1: Introduction 31 JILL WWII Crypto Spring 2006 - Class 1: Introduction 32 Ways to Convince Vigenère • “I tried really hard to break my cipher, but couldn’t. I’m a genius, so I’m sure no one else can break it either.” • Invented by Blaise de Vigenère, • “Lots of really smart people tried to break it, and ~1550 couldn’t.” • Considered unbreakable for 300 • Mathematical arguments – key
Recommended publications
  • Vigenère Cipher Cryptanalysis
    Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: Kasiski Test The keyword of a Vigenère cipher describes the rotation among the Caesar cipher alphabets that are used. That rotation leads to patterns that can be exploited by a cryptanalyst. If we know the length of the keyword, we can often determine the keyword and, hence, decrypt all messages encrypted with that keyword. Here is a ciphertext message that has been encrypted with a Vigenère cipher. nifon aicum niswt luvet vxshk nissx wsstb husle chsnv ytsro cdsoy nisgx lnona chvch gnonw yndlh sfrnh npblr yowgf unoca cossu ouoll iuvef issoe xgosa cpbew uormh lftaf cmwak bbbdv cqvek muvil qbgnh ntiri ljgig atwnv yuvev iorim cpbsb hxviv buvet vxshk uorim mjbdb pjrut fbueg ntgof yuwmx miodm ipdek uuswx lfjek sewfy yssnm zscmm bpgeb huvez ysaag usaew mffvb wfgim qpilw bbjeu yfbef vbfrt mtwnz uorig wpbvx hjsnm zpfag uhsnm npglb jbqrh mttrh huwek mpfak ljjen hbbnh ooqew vzdak udvum yucbx yoquf vffew vzonx hjumt lfgef vmwnz uxsiz bumag xbbtb kvotx xumpx qswtx l Assume that, somehow, we have discovered that the keyword has length five (which is conveniently the same as the size of the blocks). Then the first letter of each block is encrypted with the same row of the Vigenère square – they are encrypted with the same Caesar cipher. Similarly, the second letter of each block is encrypted with the same row – the same Caesar cipher. The third letters with the same Caesar cipher. The fourth letters with the same Caesar cipher. And, the fifth letters with the same Caesar cipher.
    [Show full text]
  • Elementary Cryptanalysis Classification of Cryptanalytic Attacks
    12 Elementary Cryptography Elementary Cryptanalysis The most direct attack on a cryptosystem is an exhaustive key search attack. The key size therefore provides a lower bound on the security of a cryptosystem. As an example we compare the key sizes of several of the cryptosystems we have introduced so far. We assume that the alphabet for each is the 26 character alphabet. Substitution ciphers: Simple substitution ciphers: 26! Affine substitution ciphers: ϕ(26) · 26 = 12 · 26 = 312 Translation substitution ciphers: 26 Transposition ciphers: Transposition ciphers (of block length m): m! Enigma : Rotor choices (3 of 5): 60 Rotor positions: 263 = 17576 Plugboard settings: 105578918576 Total combinations: 111339304373506560 The size of the keyspace is a naive measure, but provides an upper bound on the security of a cryptosystem. This measure ignores any structure, like character frequencies, which might remain intact following encryption. Classification of Cryptanalytic Attacks We do not consider enumeration of all keys a valid cryptanalytic attack, since no well- designed cryptosystem is susceptible to such an approach. The types of legitimate attacks which we consider can be classified in three categories. 1. Ciphertext-only Attack. 2. Known Plaintext Attack. 3. Chosen Plainext Attack. Ciphertext-only Attack. The cryptanalyst intercepts one or more messages all encoded with the same encryption algorithm. Goal: Recover the original plaintext or plaintexts, to discover the deciphering key or find an algorithm for deciphering subsequent messages enciphered with the same key. Known Plaintext Attack. The cryptanalyst has access to not only the ciphertext, but also the plaintext for one or more of the messages. Goal: Recover the deciphering key or find an algorithm for deciphering subsequent mes- sages (or the remaining plaintext) enciphered which use the same key.
    [Show full text]
  • A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher
    International Journal of Advanced Technology & Engineering Research (IJATER) www.ijater.com A HYBRID CRYPTOSYSTEM BASED ON VIGENÈRE CIPHER AND COLUMNAR TRANSPOSITION CIPHER Quist-Aphetsi Kester, MIEEE, Lecturer Faculty of Informatics, Ghana Technology University College, PMB 100 Accra North, Ghana Phone Contact +233 209822141 Email: [email protected] / [email protected] graphy that use the same cryptographic keys for both en- Abstract cryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to Privacy is one of the key issues addressed by information go between the two keys. The keys, in practice, represent a Security. Through cryptographic encryption methods, one shared secret between two or more parties that can be used can prevent a third party from understanding transmitted raw to maintain a private information link [5]. This requirement data over unsecured channel during signal transmission. The that both parties have access to the secret key is one of the cryptographic methods for enhancing the security of digital main drawbacks of symmetric key encryption, in compari- contents have gained high significance in the current era. son to public-key encryption. Typical examples symmetric Breach of security and misuse of confidential information algorithms are Advanced Encryption Standard (AES), Blow- that has been intercepted by unauthorized parties are key fish, Tripple Data Encryption Standard (3DES) and Serpent problems that information security tries to solve. [6]. This paper sets out to contribute to the general body of Asymmetric or Public key encryption on the other hand is an knowledge in the area of classical cryptography by develop- encryption method where a message encrypted with a reci- ing a new hybrid way of encryption of plaintext.
    [Show full text]
  • Shift Cipher Substitution Cipher Vigenère Cipher Hill Cipher
    Lecture 2 Classical Cryptosystems Shift cipher Substitution cipher Vigenère cipher Hill cipher 1 Shift Cipher • A Substitution Cipher • The Key Space: – [0 … 25] • Encryption given a key K: – each letter in the plaintext P is replaced with the K’th letter following the corresponding number ( shift right ) • Decryption given K: – shift left • History: K = 3, Caesar’s cipher 2 Shift Cipher • Formally: • Let P=C= K=Z 26 For 0≤K≤25 ek(x) = x+K mod 26 and dk(y) = y-K mod 26 ʚͬ, ͭ ∈ ͔ͦͪ ʛ 3 Shift Cipher: An Example ABCDEFGHIJKLMNOPQRSTUVWXYZ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 • P = CRYPTOGRAPHYISFUN Note that punctuation is often • K = 11 eliminated • C = NCJAVZRCLASJTDQFY • C → 2; 2+11 mod 26 = 13 → N • R → 17; 17+11 mod 26 = 2 → C • … • N → 13; 13+11 mod 26 = 24 → Y 4 Shift Cipher: Cryptanalysis • Can an attacker find K? – YES: exhaustive search, key space is small (<= 26 possible keys). – Once K is found, very easy to decrypt Exercise 1: decrypt the following ciphertext hphtwwxppelextoytrse Exercise 2: decrypt the following ciphertext jbcrclqrwcrvnbjenbwrwn VERY useful MATLAB functions can be found here: http://www2.math.umd.edu/~lcw/MatlabCode/ 5 General Mono-alphabetical Substitution Cipher • The key space: all possible permutations of Σ = {A, B, C, …, Z} • Encryption, given a key (permutation) π: – each letter X in the plaintext P is replaced with π(X) • Decryption, given a key π: – each letter Y in the ciphertext C is replaced with π-1(Y) • Example ABCDEFGHIJKLMNOPQRSTUVWXYZ πBADCZHWYGOQXSVTRNMSKJI PEFU • BECAUSE AZDBJSZ 6 Strength of the General Substitution Cipher • Exhaustive search is now infeasible – key space size is 26! ≈ 4*10 26 • Dominates the art of secret writing throughout the first millennium A.D.
    [Show full text]
  • Introduction
    CS 127: Cryptography / Boaz Barak Lecture 1 - Introduction Optional additional reading: Chapters 1 and 2 of Katz-Lindell book.1 Ever since people started to communicate, there were some messages that they wanted kept secret. Thus cryptography has an old though arguably undistin- guished history. For a long time cryptography shared similar features with Alchemy as a domain in which many otherwise smart people would be drawn into making fatal mistakes. d The definitive text on the history of cryptography is David Kahn’s “The Codebreakers”, whose title already hints at the ultimate fate of most cryptosystems.2 (See also “The Code Book” by Simon Singh.) We now recount just a few stories to get a feel for this field. But, before we do so, we should introduce the cast of characters. The basic setting of “encryption” or “secret writing” is the following: one person, whom we will call Alice, wishes to send another person, whom we will call Bob, a secret message. Since Alice and Bob are not in the same room (perhaps because Alice is imprisoned in a castle by her cousin the queen of England), they cannot communicate directly and need to send their message in writing. Alas, there is a third person, whom we will call Eve, that can see their message. Therefore Alice needs to find a way to encode or encrypt the message so that only Bob (and not Eve) will be able to understand it. In 1587, Mary the queen of Scots, and the heir to the throne of England, wanted to arrange the assasination of her cousin, queen Elisabeth I of England, so that she could ascend to the throne and finally escape the house arrest under which she has been for the last 18 years.
    [Show full text]
  • Cryptography
    Cryptography Cryptography, or cryptology (from Ancient Greek: κρυπτός, romanized: kryptós "hidden, secret"; and γράφειν graphein, "to write", or -λογία -logia, "study", respectively[1]), is the practice and study of techniques for secure communication in the presence of third parties called adversaries.[2] More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages;[3] various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation[4] are central to modern cryptography. Modern cryptography exists at the intersection of the German Lorenz cipher machine, disciplines of mathematics, computer science, electrical engineering, used in World War II to encrypt very- communication science, and physics. Applications of cryptography high-level general staff messages include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymous with encryption, converting information from a readable state to unintelligible nonsense. The sender of an encrypted message shares the decoding technique only with intended recipients to preclude access from adversaries. The cryptography literature often uses the names Alice ("A") for the sender, Bob ("B") for the intended recipient, and Eve ("eavesdropper") for the adversary.[5] Since the development of rotor cipher machines in World War I and the advent of computers in World War II, cryptography methods have become increasingly complex and its applications more varied. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in actual practice by any adversary.
    [Show full text]
  • Cryptology: an Historical Introduction DRAFT
    Cryptology: An Historical Introduction DRAFT Jim Sauerberg February 5, 2013 2 Copyright 2013 All rights reserved Jim Sauerberg Saint Mary's College Contents List of Figures 8 1 Caesar Ciphers 9 1.1 Saint Cyr Slide . 12 1.2 Running Down the Alphabet . 14 1.3 Frequency Analysis . 15 1.4 Linquist's Method . 20 1.5 Summary . 22 1.6 Topics and Techniques . 22 1.7 Exercises . 23 2 Cryptologic Terms 29 3 The Introduction of Numbers 31 3.1 The Remainder Operator . 33 3.2 Modular Arithmetic . 38 3.3 Decimation Ciphers . 40 3.4 Deciphering Decimation Ciphers . 42 3.5 Multiplication vs. Addition . 44 3.6 Koblitz's Kid-RSA and Public Key Codes . 44 3.7 Summary . 48 3.8 Topics and Techniques . 48 3.9 Exercises . 49 4 The Euclidean Algorithm 55 4.1 Linear Ciphers . 55 4.2 GCD's and the Euclidean Algorithm . 56 4.3 Multiplicative Inverses . 59 4.4 Deciphering Decimation and Linear Ciphers . 63 4.5 Breaking Decimation and Linear Ciphers . 65 4.6 Summary . 67 4.7 Topics and Techniques . 67 4.8 Exercises . 68 3 4 CONTENTS 5 Monoalphabetic Ciphers 71 5.1 Keyword Ciphers . 72 5.2 Keyword Mixed Ciphers . 73 5.3 Keyword Transposed Ciphers . 74 5.4 Interrupted Keyword Ciphers . 75 5.5 Frequency Counts and Exhaustion . 76 5.6 Basic Letter Characteristics . 77 5.7 Aristocrats . 78 5.8 Summary . 80 5.9 Topics and Techniques . 81 5.10 Exercises . 81 6 Decrypting Monoalphabetic Ciphers 89 6.1 Letter Interactions . 90 6.2 Decrypting Monoalphabetic Ciphers .
    [Show full text]
  • MAS 335 Cryptography the Vigen`Ere Cipher
    MAS 335 Cryptography Notes 3: Stream ciphers Spring 2008 Substitution ciphers have been used since time immemorial. As we have seen, they are vulnerable to frequency analysis based on the statistics of the language used. Although frequency analysis was first developed by Arab cryptographers in the tenth century, substitution ciphers continued to be used until quite recently. Simon Singh, in The Code Book, tells the dramatic story of how the breaking, by Elizabeth’s crypt- analysts, of the cipher used by Mary Queen of Scots led to her trial and execution in 1587. Apparently Mary and her conspirators thought their cipher was secure. Eventually, it was realised that better ciphers were needed. Many schemes were tried, but the essential idea was to use different substitutions for different letters of the plaintext. The general name of a cipher based on this principle is a stream cipher. In this chapter we discuss stream ciphers. We begin with a general principle, known as Kerckhoffs’ Principle: Alice and Bob must always assume that Eve knows the encryption system they are using, as well as having intercepted the ciphertext. All they can hope to keep secret is the key. For, although cryptographers continually invent new systems, knowledge of these sys- tems will soon spread in the intelligence community. The Vigenere` cipher In 1562, Blaise de Vigenere` invented a cipher in which a different Caesar shift is applied to each letter of the plaintext. Suppose that we shift the first letter by 5, the second by 14, the third by 23, the fourth by 4, and the fifth by 18.
    [Show full text]
  • Substitution Cipher in Cryptography, a Substitution Cipher Is a Method Of
    Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Substitution ciphers can be compared with transposition ciphers. In a transposition cipher, the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged. By contrast, in a substitution cipher, the units of the plaintext are retained in the same sequence in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext and vice-versa. Contents • 1 Simple substitution o 1.1 Examples o 1.2 Security for simple substitution ciphers • 2 Homophonic substitution • 3 Polyalphabetic substitution • 4 Polygraphic substitution • 5 Mechanical substitution ciphers • 6 The one-time pad • 7 Substitution in modern cryptography • 8 Substitution ciphers in popular culture Simple substitution 1 ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps.
    [Show full text]
  • An Enhanced Vigenere Cipher for Data Security
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 03, MARCH 2016 ISSN 2277-8616 An Enhanced Vigenere Cipher For Data Security Aized Amin Soofi, Irfan Riaz, Umair Rasheed Abstract: In today’s world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher; it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction. Index Terms: Encryption; Stream cipher; Vigenere cipher; symmetric encryption ———————————————————— 1. INTRODUCTION For example person A send message ―how are you‖ to With the rapid development of computer technology, the person B. In this case ―how are you‖ will be our plain text number of data files transmitted over internet keeps message. increasing. As a result, the secure transmission of secret Cipher text data over public channels has become a common interest In Cryptography, the transformation of original message in both academic and research fields [1]. There are many into non readable message before the transmission is aspects to security and applications, ranging from secure known as cipher text [5].
    [Show full text]
  • Cryptography
    Cryptography Prof. Dr. Carsten Damm Dr. Henrik Brosenne University of Goettingen Institut of Computer Science Winter 2013/2014 Table of Contents Elementary Cryptanalysis Classification of Cryptanalytic Attacks Stochastic structure of natural language - Part 1 Cryptanalysis by Frequency Analysis Breaking the Vigenere cipher Statistical Measures Cryptanalysis of Transposition Ciphers Starring Alice = first person in all protocols (initiator) Bob = second person in all protocols Eve = an eavesdropper, i.e., passive attacker Mallory = malicious active attacker In this chapter we study passive attacks. Eve tries to get information about the plaintext, while observing only ciphertext messages in a cryptographic protocol. All attacks rely on a fixed cryptosystem (E; D). Ciphertext-only attack The ciphertext-only attack is the type of attack we will study in this chapter. given ciphertexts C1 = EK (M1) ::: Ci = EK (Mt ) of several messages, all generated by the same cipher EK . wanted an algorithm to infer Mt+1 from Ct+1 = EK (Mt+1). weaker: recover some information about M1 ::: Mt . stronger: recover the key K (or at least information about it). Known plaintext attack additionally given M1;:::; Mt scenario: disclosure of formerly classified documents Chosen plaintext attack instead given (limited) access to the cipher EK , so that the analyst can choose M1;:::; Mt and generate the corresponding ciphertexts C1 = EK (M1);:::; Ci = EK (Mt ) scenario: a spy that is able to plant some specially prepared messages on the Enigma-operator Adaptive-chosen-plaintext
    [Show full text]
  • Polyalphabetic and Polygraphic Ciphers [0.5Ex] (Counting & Probability)
    a. 2 · 26 · 26 · 26 = 35152. b. 2 · 25 · 24 · 23 = 27600. b. 2 · 25 · 24 · 23 = 27600. Scrambling Frequences I To get around the weakness of monoalphabetic ciphers, we need to somehow scramble letter frequences. Polyalphabetic and Polygraphic Ciphers I A polyalphabetic substitution cipher is a cipher in which there is not a 1–1 (Counting & Probability) map between plaintext and ciphertext letters. Example 1. Jim Royer ® Let S = f 00, 01, 02, . , 99 g = two digit strings. ® Define a map ai 7! Si, a subset of S 3 Intro. to Cryptography I S0,..., S25 are a partition of S. I (freq. of a ) ≈ kS k/kSk. September 6, 2018 i i So `e' will have about 12 different codes, but `x' will have just one. ® When encoding ai pick a random element of Si. ® In the ciphertext, the freq. of all two digit seqs. is about the same. To analyze such schemes we need counting & probability. Counting: The Multiplication Principle Counting: The Multiplication Principle The Multiplication Principle (Andrews, x3-1) The Multiplication Principle (Andrews, x3-1) If task 1 can be done p1 ways and If task 1 can be done p1 ways and task 2 can be done p2 ways and task 2 can be done p2 ways and ... ... task k can be done pk ways, task k can be done pk ways, then the total number of ways of doing all k tasks is then the total number of ways of doing all k tasks is p1 × p2 × · · · × pk p1 × p2 × · · · × pk Sample Problems Sample Problems How many different 4-letter radio station call letters Answers How many different 4-letter radio station call letters Answers can be made when can be made when a.
    [Show full text]