A Novelty Methods of Cryptography Algorithms Into Layered Cipher Encryption and Decryption

Total Page:16

File Type:pdf, Size:1020Kb

A Novelty Methods of Cryptography Algorithms Into Layered Cipher Encryption and Decryption A NOVELTY METHODS OF CRYPTOGRAPHY ALGORITHMS INTO LAYERED CIPHER ENCRYPTION AND DECRYPTION Antoni Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Solly Aryza Faculty Of Science & Technology, Universitas Panca Budi [email protected] Bonar Harahap Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Mahrani Arfah Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] Azmi Rizki Lubis Faculty Of Engineering, Universitas Islam Sumatera Utara [email protected] ABSTRACT Encryption is one method used to protect or maintain the data. Data that has encrypted will be kept confidential where the contents of the data are altered, so it does not correspond to the actual data. To be able to read data that has been encrypted earlier required a process called decryption. In the science of cryptography, the data will be safeguarded consists of three main components, that is the message that will be read (plaintext), the keys to perform cryptographic techniques (Key), and a random signal that is unreadable (ciphertext). Testing is done by sending the data in the form of words or sentences by using a secret key. Results of analysis of data from tests performed show that with the incorporation of some algorithm plated confidentiality of information can be safer because it takes several different stages to solve. KeywordS : Algorithm,Cryptography,Decryption, Encryption 1. Overview Cryptography is a science which studies how to keep data or messages remain By rapid growth of communication world, secure when transmitted from the transmitter especially in the field of information such as to the receiver without interference from third data, images, audio or video, we need a parties. According to Bruce Scheiner in his system that can maintain the confidentiality book "Applied Cryptography," cryptography is of such information. Security is a standard the science and art of keeping distributing requirement and becomes essential, the messages to stay safe or secure. secrecy of data requires a security Besides these terms, there is also another mechanism that can deal with the meaning that cryptography is the study of confidentiality of such information ( Solly mathematical techniques that relate to Aryza et al., 2018). aspects of information security such as data Encryption is the process of scrambling confidentiality, data validity, data integrity, method or means of securing the information and authentication of data. (Ikhwan & Rahim, to make such information can not be read 2016) The beginning of cryptography is without any specialized knowledge. understood as the science of hiding Encryption can be used for security purposes, but other techniques are still messages (Aspan & Aryza, 2018), but over needed to make communications secure, the times until today, the notion of mainly to ensure the integrity and cryptography evolved into a science of authentication of a message. This study was mathematical techniques used to solve conducted to analyze a method of security issues such as privacy and encryption-decryption so that it becomes a authentication (Indar Sugiarto, Thiang multi-layered password that aims to improve Thiang, & Timothy Joy Siswanto, 2008). the security of information (Aryza et al., There is four fundamental purpose of the 2018) . science of cryptography is that also the security aspect of information, namely: 2. Cryptography • Confidentiality is a service which is used to keep the contents of the data of anyone 3. Introduction to Cryptography Type but who has the authority or the secret key to 3.1 Types of Cryptography According to its unlock the information that has been Development encoded. Cryptographic algorithms can be classified into two types based on its development, namely the classical • Data integrity is associated with cryptography and modern cryptography. preservation of unauthorized data changes. To maintain data integrity system should Classical Cryptographic Algorithm have the ability to detect data manipulation This algorithm is used since before the era of by those who are not entitled to insertion, computerization and mostly uses a symmetric key deletion, and other data entry into the actual technique. The method to hide the message is to use data. the technique of substitution or transposition or both [4]. Substitution technique is to replace the • Authentication is associated with the characters in plaintext into other characters that the identification or recognition, either as a whole result is ciphertext. While transposition is the of systems or the information itself. Two technique of changing plaintext into ciphertext by parties communicating must be introduced means of permutations of character. It is a complex themselves. Information sent through the combination of both is underlying the formation of a canal must be authenticated authenticity of wide range of modern cryptographic the contents of the data, delivery time, and algorithms(Hesari & Sistani, 2017). others. Modern Cryptographic Algorithms • Non-repudiation or non-denial is an This algorithm has a more complex difficulty level attempt to prevent the denial of the delivery [2], and the strength is in key [5]. This algorithm or the creation of information by the parties uses a binary symbol because it follows the digital that send or make such information. computer processing operations. Thus requiring a basic form of knowledge of mathematics to master it [4]. 2.1 Main process in Cryptography 3.2 Types of Cryptography According to The Key Encryption is the process by which Cryptographic algorithms can be classified into two information or data before it is transmitted, it types based on the key, the symmetric algorithms is converted into a form that can hardly be and asymmetric algorithms [2]. recognizable as information initially using a specific algorithm. 3.2.1 Symmetric Algorithms A description is the opposite of encryption These algorithms are called symmetric because it that reshapes disguised as the initial has the same key in the encryption and decryption information.. process so this algorithm also often called single-key algorithm or one-key algorithms. Key in this algorithm is confidential or private so that the algorithm is also called the secret key algorithm [2]. Picture 2.Symmetric Algorithms Illustration Picture 1.Basic Cryptography Illustration Excess Symmetric Algorithms 2.2 The Term in Cryptography Here are the terms used in cryptography: Speed of operation is higher when compared to the asymmetric algorithm, because the speed is high Plaintext (M) is a message to be sent enough, it can be used in real-time systems. (containing the original data). Ciphertext (C) is an encrypted message Symmetric Algorithms Weakness (encrypted) which is the result of the encryption. For each delivery of messages with different user Encryption (Function E) is the process of needs different keys as well, so there will be converting plaintext into ciphertext. difficulties in the key management, commonly called Decryption (Function D) is the process of key distribution problem. conversion of ciphertext into plaintext, so that it becomes the initial data or original data. 3.2.2 Asymmetric Algorithms Key is a secret number, which is used in the This algorithm is called asymmetric because the key encryption and Decryption process. used for encryption is different from the key used for decryption. The key used for encryption is public key so that the algorithm is also called a public key algorithm. Whereas the key for decryption using a secret key or private key [2]. Picture 3.Asymmetric Algorithm Illustration Pictur Asymmetric Algorithm advantages: e.5 Alphabetical Order Index Security issues at key distribution can be better. Key management problems better because fewer Alphabet used to build the message (plaintext) was number of keys. given an index number as shown above. The characters are used as keys were also taken from the Weakness Asymmetric Algorithm: alphabet. The key will be "added" or create a "shift" The speed is lower when compared to a character of the original message to establish a symmetric algorithm. password. If when added or shifted generate an For the same level of security, the key used is index of more than 25, the order of the index will longer than the symmetric algorithm. return to 0, From Z back to A. 4. Testing Methods 4.1.2 Atbash Cipher At the beginning the data security with cryptography Another classic example is the Atbash Cipher. This that uses the classic cryptographic algorithms are still Atbash Cipher permute letters from front to back so character-based, using a pen and paper only, no back to front as shown below: computer. Classical cryptographic algorithm belongs to the symmetric key cryptography. Classic cryptographic algorithms : Pesan: ABCDEFGHIJKLMNOPQRSTUVWXYZ Substitution Ciphers Sandi: ZYXWVUTSRQPONMLKJIHGFEDCBA Transposition Ciphers In this study the author will only discuss about Substitution Ciphers. By using a password Atbash, ZENIUS message will 4.1 Substitution Ciphers be AVMRFH password. The recipient only needs to Substitution cipher change one letter or character in swap the order of the letter behind it. Atbash name is the message (plaintext), according to the rules of the derived from its first use in Hebrew letters, the Aleph- key (key), it becomes another character in the secret Tav-Shin-Beth, the first, last, second and penultimate password (ciphertext). Here is part of
Recommended publications
  • FROM JULIUS CAESAR to the BLOCKCHAIN: a BRIEF HISTORY of CRYPTOGRAPHY by Côme JEAN JARRY & Romain ROUPHAEL, Cofounders of BELEM
    Corporate identity in the digital era #9 JANUARY 2017 FROM JULIUS CAESAR TO THE BLOCKCHAIN: A BRIEF HISTORY OF CRYPTOGRAPHY By Côme JEAN JARRY & Romain ROUPHAEL, cofounders of BELEM 22 The world’s most important asset is information. Now message was inscribed lengthwise. Once the parchment more than ever. With computer theft and hacking was unrolled, the letters of the message were mixed becoming a common threat, protecting information up and the message meaningless. The receiver would is crucial to ensure a trusted global economy. need an identical stick to decipher the text. The E-commerce, online banking, social networking or scytale transposition cipher relied on changing the emailing, online medical results checking, all our order of the letters, rather than the letters themselves. transactions made across digital networks and This cryptographic technique still prevails today. insecure channels of communication, such as the Internet, mobile phones or ATMs, are subjected to vulnerabilities. Our best answer is cryptography. And THE ART OF SUBSTITUTION it has always been. As a science and as an art, it is Julius Caesar was also known to use encryption to an essential way to protect communication. convey messages to his army generals posted in the Cryptography goes back to older times, as far back as war front. The Caesar cipher is a simple substitution the Ancient World. cipher in which each letter of the plaintext is rotated left or right by some number of positions down the alphabet. The receiver of the message would then Early cryptography was solely concerned with shift the letters back by the same number of positions concealing and protecting messages.
    [Show full text]
  • Slippery Hill-Climbing Technique for Ciphertext-Only Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers
    Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding [email protected] 2019-06-17 to appear in Cryptologia We present a stochastic method for breaking general periodic polyalphabetic substitution ciphers using only the ciphertext and without using any additional constraints that might come from the cipher’s structure. The method employs a hill-climbing algorithm for individual key alphabets, with occasional slipping down the hill. We implement the method with a computer and achieve reliable results for a sufficiently long ciphertext (150 characters per key alphabet). Because no constraints among the key alphabets are used, this method applies to any periodic polyalphabetic substitution cipher. Keywords: periodic polyalphabetic substitution cipher, hill-climbing, slippery hill-climbing, cryptanalysis, Vigenère, Quagmire In a monoalphabetic substitution cipher, each character of the plaintext is encrypted by the same bijective mapping between the standard alphabet (A...Z) and the key alphabet. The key alphabet is simply a permutation of the standard one. A stochastic ciphertext-only attack on the monoalphabetic substitution cipher (Jakobsen 1995) generates a “child” key from a “parent” key by swapping randomly chosen elements. The child replaces the parent if the fitness of the decrypted text improves over its predecessor, where fitness is a measure of how close a text resembles a particular language. This continues until no improvement is seen for a large number of child candidates. The periodic polyalphabetic substitution cipher is a generalization of the monoalphabetic cipher in which there are several key alphabets. During encryption, the choice of key alphabet cycles through them, where the choice of key is given by the position in the text modulo the number of keys.
    [Show full text]
  • Substitution Ciphers
    Foundations of Computer Security Lecture 40: Substitution Ciphers Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 40: 1 Substitution Ciphers Substitution Ciphers A substitution cipher is one in which each symbol of the plaintext is exchanged for another symbol. If this is done uniformly this is called a monoalphabetic cipher or simple substitution cipher. If different substitutions are made depending on where in the plaintext the symbol occurs, this is called a polyalphabetic substitution. Lecture 40: 2 Substitution Ciphers Simple Substitution A simple substitution cipher is an injection (1-1 mapping) of the alphabet into itself or another alphabet. What is the key? A simple substitution is breakable; we could try all k! mappings from the plaintext to ciphertext alphabets. That’s usually not necessary. Redundancies in the plaintext (letter frequencies, digrams, etc.) are reflected in the ciphertext. Not all substitution ciphers are simple substitution ciphers. Lecture 40: 3 Substitution Ciphers Caesar Cipher The Caesar Cipher is a monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed “distance” away in the alphabet. For example, A is replaced by C, B by D, ..., Y by A, Z by B, etc. What is the key? What is the size of the keyspace? Is the algorithm strong? Lecture 40: 4 Substitution Ciphers Vigen`ere Cipher The Vigen`ere Cipher is an example of a polyalphabetic cipher, sometimes called a running key cipher because the key is another text. Start with a key string: “monitors to go to the bathroom” and a plaintext to encrypt: “four score and seven years ago.” Align the two texts, possibly removing spaces: plaintext: fours corea ndsev enyea rsago key: monit orsto gotot hebat hroom ciphertext: rcizl qfkxo trlso lrzet yjoua Then use the letter pairs to look up an encryption in a table (called a Vigen`ere Tableau or tabula recta).
    [Show full text]
  • A Comparative Study of Classical Substitution Ciphers
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 9, September- 2014 A Comparative Study of Classical Substitution Ciphers Anjlee Verma Navjot Kaur School of Computer Engineering Department of CSE/IT Lovely Professional University CGC Jhanjeri Phagwara, Punjab Mohali, Punjab Abstract— with the rapid development in the technology, the Cryptography (also known as cryptology) is a study and call for security has also raised its pitch and Information practice of hiding information. It is the technique in which a Security has become an important issue during last decades. piece of raw data is taken, scrambled into gibberish Cryptography; emerged as a solution; has reserved its mathematically, yet allowing for decrypting back into the unvanquishable place in the field of security. The principle original plain data. In other words, we can say that it is an art objective guiding the design of any cryptographic algorithm of manipulating messages so that they become more secure. It must be the security it provides against unauthorized attack. consists of processes of encoding and decoding. But, the performance and cost implementation of the algorithms Cryptography includes the techniques for creating various are also those factors which we cannot ignore. So, there is systems, procedures or algorithms for secret writing. Whereas always a deemed necessity to analyze, standardize and represent cryptanalysis consists of the techniques of breaking them.[2] these algorithms to the future researchers and struggling
    [Show full text]
  • Simple Ciphers
    Swenson c02.tex V3 - 01/29/2008 1:07pm Page 1 CHAPTER 1 Simple Ciphers As long as there has been communication, there has been an interest in keeping some of this information confidential. As written messages became more widespread, especially over distances, people learned how susceptible this particular medium is to being somehow compromised: The messages can be easily intercepted, read, destroyed, or modified. Some protective methods were employed, such as sealing a message with a wax seal, which serves to show the communicating parties that the message is genuine and had not been intercepted. This, however, did nothing to actually conceal the contents. This chapter explores some of the simplest methods for obfuscating the contents of communications. Any piece of written communication has some set of symbols that constitute allowed constructs, typically, words, syllables, or other meaningful ideas. Some of the simple methods first used involved simply manipulating this symbol set, which the cryptologic community often calls an alphabet regardless of the origin of the language. Other older tricks involved jumbling up the ordering of the presentation of these symbols. Many of these techniques were in regular use up until a little more than a century ago; it is interesting to note that even though these techniques aren’t sophisticated,COPYRIGHTED newspapers often publish MATERIAL puzzles called cryptograms or cryptoquips employing these cryptographic techniques for readers to solve. Many books have been published that cover the use, history, and cryptanal- ysis of simple substitution and transposition ciphers, which we discuss in this chapter. (For example, some of the resources for this chapter are References [2] and [4].) This chapter is not meant to replace a rigorous study of these techniques, such as is contained in many of these books, but merely to expose the reader to the contrast between older methods of cryptanalysis and newer methods.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Polyalphabetic Ciphers
    POLYALPHABETIC CIPHERS MTH 440 Monoalphabetic ciphers • Our examples of the permutation, shift, decimation, and affine ciphers were monoalphabetic ciphers, that is every letter was replaced by the same letter each time. • Hv ufe fh kar karvedrh vu pfkarpfkdlh fer fivnk erfmdkz, karz fer svk lrekfds; hv ufe fh karz fer lrekfds, karz fer svk fivnk erfmdkz. – Fmirek Rdshkrds. • In a decimation cipher A always represents itself • Even a random substitution cipher with 26! ~ 4 x 1026 different possible “keys” is easy to solve with a simple frequency analysis (given enough ciphertext) Polyalphabetic ciphers • In a polyalphabetic cipher, multiple “alphabets” are used to encipher. • If two letters are the same in the ciphertext it does not mean they must decipher to the same plaintext letter. Vigenere cipher - codeword KEY: K E Y K E Y E PLAIN: T R Y T H I S D Vigenere Cipher - codeword KEY: K E Y K E Y E PLAIN: T R Y T H I S D D V W D L G W Finish enciphering (problem 1) Vigenere - decipher KEY: K E Y Cipherext D A M T T W O Finish deciphering (problem 2) Polyalphabetic ciphers BYIRL BFMVG SXFEJ FJLXA MSVZI QHENK FIFCY JJRIF SEXRV CICDT EITHC BQVXS GWEXF PZHHT JGSPL HUHRP FDBPX NLMFV TFMIG RBZJT XIGHT JDAMW VMSFX LHFMS UXSDG EZDIE PCZLK LISCI JIWSI HTJVE VWVFM VWISO DFKIE QRQVL EPVHM YZSRW CIMZG LWVQQ RAWRT ZFKYV HOZIF JRDHG WVWKR RQSKM XOSFM VQEGS OJEXV HGBJT XXRHT JFTMQ WASJS JPOZP ZRHUS CZZVI VHTFK XLHME MFYPG RQHCE VHHTJ TEYVS EBYMG KWYUV PXKSY YFXLH GQURV EWWAS The frequency analysis of a polyalphabetic cipher looks different than plaintext or monoalphabetic analyses.
    [Show full text]
  • Cryptography
    CS 419: Computer Security Week 6: Cryptography © 2020 Paul Krzyzanowski. No part of this Paul Krzyzanowski content, may be reproduced or reposted in whole or in part in any manner without the permission of the copyright owner. cryptography κρυπός γραφία hidden writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 2 cryptanalysis κρυπός ἀνάλυσις hidden action of loosing, solution of a problem, undo The analysis and decryption of encrypted text or information without prior knowledge of the keys. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 3 cryptology κρυπός λογια hidden speaking (knowledge) 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 4 Cryptography ¹ Security Cryptography may be a component of a secure system Just adding cryptography may not make a system secure October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 5 Cryptography: what is it good for? • Confidentiality – Others cannot read contents of the message • Authentication – Determine origin of message • Integrity – Verify that message has not been modified • Nonrepudiation – Sender should not be able to falsely deny that a message was sent October 16, 2020 CS
    [Show full text]
  • Evolving Keys for Periodic Polyalphabetic Ciphers
    Evolving Keys for Periodic Polyalphabetic Ciphers Ralph Morelli and Ralph Walde Computer Science Department Trinity College Hartford, CT 06106 [email protected] Abstract recover increasingly longer portions of the key. As described more fully in the discussion, our results compare favorably A genetic algorithm is used to find the keys of Type to other approaches reported in the literature. II periodic polyalphabetic ciphers with mixed primary alphabets. Because of the difficulty of the ciphertext only cryptanalysis for Type II ciphers, a multi-phased Polyalphabetic Ciphers search strategy is used, each phase of which recovers a Following (King 1994), a polyalphabetic cipher can be de- bigger portion of the key. fined as follows. Given d cipher alphabets C1 ...Cd, let gi : A → Ci be a mapping from the plaintext alphabet A to th Introduction the i cipher alphabet Ci(1 ≤ i ≤ d). A plaintext message M = m . m m . m ... is enciphered by repeat- A periodic polyalphabetic cipher with period d encrypts a 1 d d+1 2d ing the sequence of mappings g1, . , gd every d characters, plaintext message into ciphertext by replacing each plaintext giving letter with a letter from one of d substitution alphabets. The d alphabets are typically selected from a sequence of related alphabets that is repeated as often as necessary to encrypt E(M) = g1(m1) . gd(md)g1(md+1) . gd(m2d) ... (1) the message. Although in the most general case the cipher alphabets are In polyalphabetic encryption a message is broken into d completely unrelated, in many classical polyalphabetic ci- columns, each encrypted by a different alphabet.
    [Show full text]
  • Substitution Cipher in Cryptography, a Substitution Cipher Is a Method Of
    Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Substitution ciphers can be compared with transposition ciphers. In a transposition cipher, the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged. By contrast, in a substitution cipher, the units of the plaintext are retained in the same sequence in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext and vice-versa. Contents • 1 Simple substitution o 1.1 Examples o 1.2 Security for simple substitution ciphers • 2 Homophonic substitution • 3 Polyalphabetic substitution • 4 Polygraphic substitution • 5 Mechanical substitution ciphers • 6 The one-time pad • 7 Substitution in modern cryptography • 8 Substitution ciphers in popular culture Simple substitution 1 ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps.
    [Show full text]
  • New Polyalphabetic Substitution Scheme for Secure Communication
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-3, January 2020 New Polyalphabetic Substitution Scheme for Secure Communication Ranju S. Kartha, Varghese Paul The main term Cryptology is the science and secret Abstract: The internet is a very powerful and useful tool for communications involving both Cryptography and communication, information and connectivity. So it is very Cryptanalysis. Cryptography is the technology that used for important to keep yourself safe and secure online. The best way of transmitting messages to make them secure and immune to secure information is encryption; there are many cryptographic algorithms available for encryption. These cryptographic attack. Cryptanalysis deals with study and analysis of algorithms are classified according to their encrypting process; as breaking the secrecy of the message with or without knowing substitution cipher or transposition cipher. In Polyalphabetic the key. Confidentiality, Integrity and Availability are the ciphers, the substitution rule changes continuously from main goals of cryptography. Cryptographic algorithms are to character to character according to the keyword and plaintext. be designed to achieve the above goals. Cryptographic Vigenere cipher is considered to be the most efficient algorithms rely on a secret piece of information which is Polyalphabetic substitution cipher. But it is vulnerable to attacks, due to its repeating nature of the keyword. To overcome this known as secret key. The algorithm is known to everyone that vulnerability, here we are presenting a new Polyalphabetic exists in public domain but the secret key which is only known substitution scheme which uses infinite number of 26 x 26 to the authorized persons.
    [Show full text]
  • Space of Polyalphabetic Substitution Ciphers 89
    The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008 87 Applying Genetic Algorithms for Searching Key- Space of Polyalphabetic Substitution Ciphers Ragheb Toemeh 1 and Subbanagounder Arumugam 2 1Department of Computer Science and Engineering, Government College of Technology, India 2Directorate of Technical Education, India Abstract: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption scheme is studied. In Vigenere cipher, g uessing the key size is done by applying Genetic Algorithm. The frequency analysis is used as an essential factor in objective function. Keywords: Polyalphabetic cipher, Vigenere cipher, genetic algorithm . Received May 27, 2006; Accepted August 5, 2006 1. Introduction Cryptanalysis is the process of attempting to recover the plaintext and /or key from a ciphertext. In the Brute Force attack the attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained; it has the disadvantage of high computational complexity. In order to overcome this drawback, the optimization heuristics techniques like Genetic Algorithm (GA) are used. The possibility of Figure 1. Relative Character Frequencies from Great Expectations using a random type search to break a cipher is (1860-1861). explored. The focus of this work is on the use of a GA to conduct a directed random search of a key space and 2. Genetic Algorithms to guess the key size. In 1863, a prussian major named Kasiski proposed a method for breaking a Vigenere A GA is general method of solving problems to which cipher that consisted of finding the length of the no satisfactory, obvious, solution exists.
    [Show full text]