CS 556 – Computer Security Spring 2018

Total Page:16

File Type:pdf, Size:1020Kb

CS 556 – Computer Security Spring 2018 CS 556 – Computer Security Spring 2018 Dr. Indrajit Ray Email: [email protected] Department of Computer Science Colorado State University Fort Collins, CO 80523, USA Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 1 / 64 SECRET KEY CRYPTOSYSTEMS SIMPLE CIPHERS STRONGER CIPHERS DATA ENCRYPTION STANDARD DES DESIGN BREAKING DES DES TRIPLE SECRET KEY CRYPTOSYSTEMS ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 2 / 64 Secret Key Cryptosystem SECRET KEY Insecure Communications CRYPTOSYSTEMS Channel SIMPLE CIPHERS Encrypt M with Decrypt C with Message M C M Message key K1 key K2 STRONGER CIPHERS Source Destination C = E[M, K1] M = D[C, K2] DATA ENCRYPTION C STANDARD Cryptanalyst DES DESIGN K1 K2 BREAKING DES DES TRIPLE Key Source K1 Key Source ENCRYPTION Generates Provides Or Random Key Secure Key Produces Key BEYOND DES Channel USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 3 / 64 Block Ciphers vs. Stream Ciphers (1) SECRET KEY CRYPTOSYSTEMS Plaintext SIMPLE CIPHERS 64 / 128 bits 64 / 128 bits block block STRONGER CIPHERS DATA ENCRYPTION P1 P2 Pn-1 Pn STANDARD DES DESIGN P1 Pi Pn BREAKING DES Key Encrypt Key Encrypt Key Encrypt DES TRIPLE ENCRYPTION C1 Ci Cn BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Ciphertext C1 Ci Cn Key Decrypt Key Decrypt Key Decrypt P1 Pi Pn Plaintext Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 4 / 64 Block Cipher vs. Stream Ciphers (2) SECRET KEY CRYPTOSYSTEMS Plaintext SIMPLE CIPHERS STRONGER CIPHERS Plaintext byte stream DATA ENCRYPTION STANDARD DES DESIGN Pseudorandom BREAKING DES Key byte generator (key stream + DES TRIPLE generator) Ciphertext ENCRYPTION byte stream BEYOND DES Ciphertext USING SYMMETRIC byte stream KEY CRYPTOSYSTEM Pseudorandom Key byte generator (key stream + generator) Plaintext byte stream Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 5 / 64 Basic Secret-Key Techniques SECRET KEY ● Substitution CRYPTOSYSTEMS ● SIMPLE CIPHERS Permutation or transposition STRONGER CIPHERS ✦ Reverse Cipher DATA ENCRYPTION STANDARD ✦ Column Transposition DES DESIGN ✦ Rail Fence BREAKING DES ✦ Scytale Cipher DES TRIPLE ✦ ENCRYPTION Nihilist Cipher BEYOND DES ● Combination and iterations of these - Product ciphers USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 6 / 64 SECRET KEY CRYPTOSYSTEMS SIMPLE CIPHERS STRONGER CIPHERS DATA ENCRYPTION STANDARD DES DESIGN BREAKING DES DES TRIPLE SIMPLE CIPHERS ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 7 / 64 Simple Alphabetic Substitution SECRET KEY CRYPTOSYSTEMS Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ SIMPLE CIPHERS Ciphertext PZQSGIMBWXDFKJVCHAOLUTERYN STRONGER CIPHERS DATA ENCRYPTION STANDARD ● Also called Caesar cipher DES DESIGN 26 ● Huge key space: 26! ≫ 10 BREAKING DES ● DES TRIPLE Trivially broken for known plaintext attacks ENCRYPTION ● Easily broken for ciphertext only attacks (for natural language BEYOND DES plaintext) USING SYMMETRIC KEY CRYPTOSYSTEM ● Multiple encipherment does not help (no point in doing two substitutions in sequence) Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 8 / 64 Simple Permutation SECRET KEY CRYPTOSYSTEMS Plaintext 1 2 3 4 5 SIMPLE CIPHERS STRONGER CIPHERS DATA ENCRYPTION Ciphertext5 13 2 4 STANDARD DES DESIGN BREAKING DES ● Key space N! for block size N DES TRIPLE ENCRYPTION ● Trivially broken for known plaintext attack BEYOND DES ● Easily broken for ciphertext only attack (for natural language USING SYMMETRIC KEY CRYPTOSYSTEM plaintext) ● Multiple encipherment does not help Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 9 / 64 Reverse Cipher SECRET KEY ● Reverse the order of the letters in a message CRYPTOSYSTEMS SIMPLE CIPHERS ✦ Plaintext – ICAMEISAWICONQUERED STRONGER CIPHERS ✦ Ciphertext – DERDUQNOCIWASIEMACI DATA ENCRYPTION STANDARD DES DESIGN BREAKING DES DES TRIPLE ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 10 / 64 Column Transposition SECRET KEY CRYPTOSYSTEMS 1 2 3 4 5 6 7 SIMPLE CIPHERS Key; 4523617 STRONGER CIPHERS l a s e f b e DATA ENCRYPTION a m s c a n b STANDARD e m o d u l a Ciphertext: DES DESIGN t e d t o c a BREAKING DES ecdtm ecaef auool edsam DES TRIPLE r r y m o r e ENCRYPTION i n t e l l i merne nasso dytnr vbnlc BEYOND DES g e n c e t h rltiq laetr igawe baaei USING SYMMETRIC hox KEY CRYPTOSYSTEM a n r a d i o w a v e s q x Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 11 / 64 Rail Fence Cipher SECRET KEY ● Write the message alternating letters in two rows CRYPTOSYSTEMS ● SIMPLE CIPHERS Write the ciphertext from the rows STRONGER CIPHERS DATA ENCRYPTION STANDARD NTMFRGNWS H LOM Plaintext O I T E I E O A L O D E DES DESIGN BREAKING DES DES TRIPLE ENCRYPTION BEYOND DES Ciphertext NWSHTMFRLGOMNOITEIEOALODE USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 12 / 64 Scytale Cipher SECRET KEY ● A strip of paper was wound round a staff; message written along CRYPTOSYSTEMS SIMPLE CIPHERS staff in rows; then paper removed leaving a strip of seemingly STRONGER CIPHERS random letters DATA ENCRYPTION STANDARD DES DESIGN N O W I S T H BREAKING DES DES TRIPLE ENCRYPTION E T I M E F BEYOND DES USING SYMMETRIC O R A L L G KEY CRYPTOSYSTEM O O D M E N Ciphertext: NEOOOTROWIADIMLMSELETFGNH Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 13 / 64 Nihilist Cipher SECRET KEY ● Combines row and column transposition CRYPTOSYSTEMS ● SIMPLE CIPHERS Write message in rows in order controlled by key, read off by STRONGER CIPHERS rows DATA ENCRYPTION STANDARD Plaintext: NOWISTHETIMEFORALLGOODMEN DES DESIGN Key 2 1 3 5 4 BREAKING DES DES TRIPLE 2 1 3 5 4 ENCRYPTION BEYOND DES 2 HETT I USING SYMMETRIC 1 OWIN S KEY CRYPTOSYSTEM 3 EFOM R 5 DMEO N 4 LLGA O Ciphertext: HTEIT ONWSI EMFRO DOMNE LALOG Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 14 / 64 SECRET KEY CRYPTOSYSTEMS SIMPLE CIPHERS STRONGER CIPHERS DATA ENCRYPTION STANDARD DES DESIGN BREAKING DES DES TRIPLE STRONGER CIPHERS ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 15 / 64 Product Ciphers SECRET KEY ● Substitution followed by permutation followed by substitution CRYPTOSYSTEMS ... SIMPLE CIPHERS followed by permutation ● STRONGER CIPHERS Best known example is DES (Data Encryption Standard) DATA ENCRYPTION ● Mathematics to design strong product cipher is classified STANDARD DES DESIGN BREAKING DES DES TRIPLE ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 16 / 64 Product Ciphers - (cont’d) SECRET KEY ● For known plaintext/ chosen plaintext/ chosen ciphertext, CRYPTOSYSTEMS SIMPLE CIPHERS breakable by exhaustive search of key space ● STRONGER CIPHERS Therefore security is based on - computational complexity of DATA ENCRYPTION computing the key under these scenarios STANDARD DES DESIGN ✦ size of the key BREAKING DES DES TRIPLE ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 17 / 64 Vernam One-time Pad SECRET KEY CRYPTOSYSTEMS Perfect Secrecy SIMPLE CIPHERS AB A + B STRONGER CIPHERS Plaintext Ciphertext Plaintext DATA ENCRYPTION STANDARD + + 0 0 0 DES DESIGN 0 1 1 BREAKING DES DES TRIPLE ENCRYPTION 1 0 1 BEYOND DES Secret KeyKK Secret Key USING SYMMETRIC 1 1 0 KEY CRYPTOSYSTEM Secure Channel Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 18 / 64 Perfect Secrecy SECRET KEY ● The Vernam one-time pad is the ultimate cipher, but impractical CRYPTOSYSTEMS SIMPLE CIPHERS for most situations ● STRONGER CIPHERS Requires a random key longer than the message DATA ENCRYPTION ● The key cannot be reused STANDARD ● Known plaintext reveals the portion of the key that has been DES DESIGN used, but does not reveal anything about the future bits of the BREAKING DES DES TRIPLE key ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 19 / 64 SECRET KEY CRYPTOSYSTEMS SIMPLE CIPHERS STRONGER CIPHERS DATA ENCRYPTION STANDARD DES DESIGN BREAKING DES DES TRIPLE DATA ENCRYPTION STANDARD ENCRYPTION BEYOND DES USING SYMMETRIC KEY CRYPTOSYSTEM Dr. Indrajit Ray, Computer Science Department CS 556 - Computer Security - c 2018 Colorado State University – 20 / 64 DES SECRET KEY ● DES is a product cipher with 56 bit key and 64 bit block size for CRYPTOSYSTEMS
Recommended publications
  • SOLVING CIPHER SECRETS Edited by M
    SOLVING CIPHER SECRETS Edited by M. E. Ghaver INTERESTED FANS SEND IN SOME LIVELY CHAT-AND SEVERAL NEW PUZZLERS ARE OFFERED FOR HUNGRY HEADS ID you ever have trouble in occasionally, notwithstanding our combined solving some particular efforts to the contrary. cipher? And did you ever This, by way of introduction, fans, to a feel like running the party sort of " get-together " celebration that we ragged that contrived the have planned in this article. affair? It's just this way. So much has been Well, that's how Frank Spalding, of received from cipher enthusiasts in the way Wrangell, Alaska, must have felt about the of interesting questions, general comments, cipher of Foster F. V. Staples, in the June ciphers, and methods of solving them, that 6 " Solving Cipher Secrets." the only adequate way to cope with the sit• " If I could have caught him last night— uation, and thus to discharge this duty to June 7," writes Mr. Spalding, " he would our readers, is for us all to get together in have had to do some tall explaining." an entire article devoted to that purpose. Nevertheless, Mr. Spalding succeeded in So let's pull up our chairs and talk things solving this cipher, as well as all the others over. It may be that your particular ques• in that issue, although he confesses that tion will not crop up. Btit in that event when he had finished the lot he was " not a you will find another case that covers the good Christian any more!" same ground more completely.
    [Show full text]
  • Caesar Cipher Yjggngt Kuncpf
    Caesar Cipher Yjggngt Kuncpf The Caesar cipher was one of the earliest ciphers ever invented. 25 for uppercase characters; it performs modular addition of the value, using the size of the alphabet as the modulus;. Instalação: $ npm install caesar-cipher-lib. A different version than the online version below, it is exactly like the Caesar Cipher program that comes on the diskette included with "Secret Code Breaker - A Cryptanalyst's Handbook". Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis" Watch the next lesson In this video, i have explained the concept of Caesar Cipher in Cryptography and Network Security. 1 CAESAR METHOD: There are number of methods to encrypt a plain text, the ancient one is Caesar Cipher, It is a process of. Fountas And Pinnell Sight Word List 200 Humane killing on farm is often carried out using a rifle and, depending on the species, will be done using one of the following positions: Frontal method – the firearm is directed at a point midway across the forehead where two lines from the topside of the base of the ears and top of the eyes intersect (pigs – from the bottom side of the. Download Caesar Cipher Encrypter-Decrypter for free. The method is named after Julius Caesar, who used it in his private correspondence. In this video, i have explained the concept of Caesar Cipher in Cryptography and Network. It is named for Julius Caesar, who used it to encrypt messages of military importance that he did not wish to fall into enemy hands.
    [Show full text]
  • Codebreakers
    1 Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • 2. Classic Cryptography Methods 2.1. Spartan Scytale. One of the Oldest Known Examples Is the Spartan Scytale (Scytale /Skɪtəl
    2. Classic Cryptography Methods 2.1. Spartan scytale. One of the oldest known examples is the Spartan scytale (scytale /skɪtəli/, rhymes with Italy, a baton). From indirect evidence, the scytale was first mentioned by the Greek poet Archilochus who lived in the 7th century B.C. (over 2500 years ago). The ancient Greeks, and the Spartans in particular, are said to have used this cipher to communicate during military campaigns.Sender and recipient each had a cylinder (called a scytale) of exactly the same radius. The sender wound a narrow ribbon of parchment around his cylinder, then wrote on it lengthwise. After the ribbon is unwound, the writing could be read only by a person who had a cylinder of exactly the same circumference. The following table illustrate the idea. Imagine that each column wraps around the dowel one time, that is that the bottom of one column is followed by the top of the next column. Original message: Kill king tomorrow midnight Wrapped message: k i l l k i n g t o m o r r o w m i d n i g h t Encoded message: ktm ioi lmd lon kri irg noh gwt The key parameter in using the scytale encryption is the number of letters that can be recorded on one wrap ribbon around the dowel. Above the maximum was 3, since there are 3 rows in the wrapped meassage. The last row was padded with blank spaces before the message was encoded. We'll call this the wrap parameter. If you don't know the wrap parameter you cannot decode a message.
    [Show full text]
  • Polybius Square in Cryptography: a Brief Review of Literature
    ISSN 2278-3091 Jan Carlo T. Arroyo et al., International Journal ofVolume Advanced 9, Trends No.3, in May Computer - June Science 2020 and Engineering, 9(3), May – June 2020, 3798 – 3808 International Journal of Advanced Trends in Computer Science and Engineering Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse198932020.pdf https://doi.org/10.30534/ijatcse/2020/198932020 Polybius Square in Cryptography: A Brief Review of Literature Jan Carlo T. Arroyo1, Cristina E. Dumdumaya2, Allemar Jhone P. Delima3 1,3College of Computing Education, University of Mindanao, Davao City, Davao del Sur, Philippines 1,2College of Information and Computing, University of Southeastern Philippines, Davao City, Davao del Sur, Philippines 3College of Engineering, Technology and Management, Cebu Technological University-Barili Campus, Cebu, Philippines [email protected], [email protected], [email protected] concerns data integrity, confidentiality, authentication to a ABSTRACT wireless communication system, and several other security services where information transfer between different users Cryptography is a method to secure sensitive data for storage takes place [10]–[12]. To protect the information, data are and communication in the presence of third parties called transformed into an unintelligible format using varied cipher adversaries. One of the first recorded incidents of technologies [15]. Maintaining data integrity and security is cryptography occurred in Ancient Rome, where the Polybius done through cipher whose bottleneck for an optimal cipher, also known as Polybius square, was developed. The implementation relies on the cipher used. A cipher is an Polybius cipher has been used as an advantage in winning algorithm responsible for both the encryption and decryption wars over enemies according to history and is also utilized as processes of a file being protected.
    [Show full text]
  • Grid Ciphers
    4.1 Playfair Cipher You create a grid similar to that described in Nihilist cipher. Consider picking a keyword (without repetition) such as "PROBLEMS": P R O B L E M S A C D F G H I/J K N Q T U V W X Y Z The only difference here is that we don't have the numerical labels for the rows and columns. In this cipher, we will encipher letters pairs at a time. Consider the following plaintext: SHE WENT TO THE STORE When we pair up the letters they get grouped as follows: SH EW EN TT OT HE ST OR E But, we are not allowed to encipher any double letters. So, in this case, we will insert an Q into the plaintext. (If Q is a double letter, then insert another infrequent letter, say X.) SH EW EN TQ TO TH ES TO RE To encipher pairs of letters, adhere to the following rules: 1) If the two letters are on the same row of the chart, like "ES", then replace each letter by the letter to the right. (If necessary, wrap around to the left end of the row. So "ES" encrypts to "MA". 2) If the two letters are on the same column of the chart, like, "TH", then replace each letter by the letter below it. (If necessary, wrap around to the top end of the column.) So "TH" encrypts to "YT". 3) If two letters are on a different row and column, like, "SH", then replace each letter by another letter on its same row, but in the column of the other letter.
    [Show full text]
  • Cryptography and Security of Digital Devices Exercise Book
    Cryptography and Security of Digital Devices Exercise book Alessandro Barenghi, Gerardo Pelosi April 6, 2017- Rev 1.4.1 Contents 1 Historical Ciphers and Basic Principles 5 1.1 Substitution Ciphers . 5 1.1.1 Distinguishing ciphers . 5 1.1.2 Breaking Vigenére . 6 1.1.3 Breaking Playfair . 8 1.1.4 Breaking Nihilist . 10 1.2 Permutation Ciphers . 11 1.2.1 A simple permutation cipher . 11 1.2.2 Matrix Based Permutation Cipher . 11 1.3 Composition of historical ciphers . 12 1.3.1 Double Substitution . 12 1.3.2 Double Vigenére . 12 1.3.3 Double Permutation . 13 1.3.4 Mixing Substitutions and Permutations . 14 1.4 Enigma . 15 1.5 Principles of Information Theory . 18 1.5.1 Computing the entropy of random variables . 18 2 Block Ciphers 21 2.1 Data Encryption Standard . 21 2.1.1 DES-V and DES-W . 21 2.1.2 DES-A . 22 2.1.3 DES Collision attacks . 23 2.1.4 DES Block Widening . 24 2.2 Modes of Operation . 25 2.2.1 Error Recovery in CBC and ECB . 25 2.2.2 CBC Malleability . 25 2.2.3 CTR With Repeated IV . 26 2.2.4 Faulty Disk Encryption . 27 2.2.5 Altering messages with CBC and CTR . 28 2.3 Block Cipher Cryptanalysis . 28 2.3.1 S-Box Design . 28 2.3.2 Linear and Differential Cryptanalysis - (I) . 29 2.3.3 Linear and Differential Cryptanalysis - (II) . 32 2.3.4 Linear and Differential Cryptanalysis - (III) . 34 3 Stream Ciphers 37 3.1 Linear Feedback Registers .
    [Show full text]
  • SOLVING CIPHER SECRETS Edited by M
    SOLVING CIPHER SECRETS Edited by M. E. Ohaver TRY YOUR WITS ON THE GREAT CODES AND CRYPTOGRAMS IN WHICH MEN HAVE MASKED THEIR MESSAGES OF LIFE AND DEATH HIS department bowls merrily along, making new friends at every turn. So great has been the response, and so urgent the demand for more and harder problems, T that we are hiding this week's cipher. You have to find it before you can solve it. And you have to work after you have found it. At the risk of disappointing some of you, FLYNN'S is obliged to postpone the publi• cation of the names of successful cryptographers. You will find the reason on the last page. So speed up with Mr. Ohaver. Dig into this article and find the cipher. Solve it if you can. And watch FLYNN'S for the correct solution to see if your own tallies. SERIES of articles on cryp• He soon saw the need of a secure and tography that does not in• easily used method of secret writing that clude the famous biliteral would be free of suspicion. And according• cipher of Sir Francis Bacon, ly it was only about two years after his English philosopher, states• arrival in Paris, when he was still but a man, and essayist, would be youth of seventeen years, that he conceived like a detective story with one of the most the idea of his biliteral cipher. important chapters missing. Presumably he reserved this remarkable Bacon's cipher is one of the most widely device for use with none but his most inti• known in all the literature of cryptography.
    [Show full text]
  • Gronsfeld Ciphers
    SOLVING CIPHER SECRETS Edited by M. E. Ohaver HERE IS THE WAY TO SOLVE THE NIHILIST CIPHER AND SOME CIPHERS TO TRY YOUR SKILL ON N our issue of March 28 we offered a sample of the famous Nihilist code which was a challenge to our readers to send us messages that Mr. Ohaver could not translate. I Many of the correspondents doubted his ability to do it without the keyword and hoped that he would reveal the secret of his method. It is no secret. Skillful cryptographers the world over know it, and as Mr. Ohaver says, this method is about as safe as a leaky rowboat in the middle of the Atlantic. It's all in knowing how. In the department this week Mr. Ohaver explains one deciphering method. He says it's easy. Maybe it is. Try it for yourselves. Incidentally he offers some more ciphers from readers and gives the key• words of a lot of Nihilist messages we have received. Your own may be among them. F the numerous correspond• Nihilist cipher in FLYNN'S for April 25. ents who submitted Nihilist But for the benefit of the many who were ciphers for solution in re• tmable to do this, we have decided in re• sponse to our invitation in sponse to insistent requests to publish here FLYNN'S for March 28, for the first time a full exposure of the some were absolutely cer• method used in deciphering this kind of tain that their messages could not possibly cipher. be read without the keyword.
    [Show full text]
  • Classical Cryptography Introduction to Cryptography
    9/1/2010 Classical Cryptography Introduction to Cryptography cryptography is the study of secret (crypto-) writing (-graphy) concerned with developing algorithms which may be used to: conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or verify the correctness of a message to the recipient (authentication) form the basis of many technological solutions to computer and communications security problems for a good overview paper see: W Diffie, M E Hellman, "Privacy and Authentication: An Introduction to Cryptography", in Proc. IEEE, Vol 67(3) Mar 1979, pp 397-427 Basic Concepts cryptography the art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form plaintext the original intelligible message ciphertext the transformed message cipher an algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods key williamstallings.com/…/classical.html 1/20 9/1/2010 Classical Cryptography some critical information used by the cipher, known only to the sender & receiver encipher (encode) the process of converting plaintext to ciphertext using a cipher and a key decipher (decode) the process of converting ciphertext back into plaintext using a cipher and a key cryptanalysis the study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking cryptology both cryptography and cryptanalysis code an algorithm for transforming an intelligible message into an unintelligible one using a code- book Concepts Encryption C = E_(K)(P) Decryption P = E_(K)^(-1)(C) E_(K) is chosen from a family of transformations known as a cryptographic system.
    [Show full text]
  • Book Cipher, Running Key Cipher, Vic Cipher and Secom Cipher
    BOOK CIPHER, RUNNING KEY CIPHER, VIC CIPHER AND SECOM CIPHER A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden from attackers in practice. This is in some ways an example of security by obscurity . It is typically essential that both correspondents not only have the same book, but the same edition .[1] Traditionally book ciphers work by replacing words in the plaintext of a message with the location of words from the book being used. In this mode, book ciphers are more properly called codes. This can have problems; if a word appears in the plaintext but not in the book, it cannot be encoded. An alternative approach which gets around this problem is to replace individual letters rather than words. One such method, used in the second Beale cipher , substitutes the first letter of a word in the book with that word's position. In this case, the book cipher is properly a cipher — specifically, a homophonic substitution cipher . However, if used often, this technique has the side effect of creating a larger ciphertext (typically 4 to 6 digits being required to encipher each letter or syllable) and increases the time and effort required to decode the message. Choosing the Key [] The main strength of a book cipher is the key. The sender and receiver of encoded messages can agree to use any book or other publication available to both of them as the key to their cipher.
    [Show full text]
  • Ib Extended Essay
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by TED Ankara College IB Thesis IB EXTENDED ESSAY SUBJECT: MATHEMATICS The Use of Mathematics In the Science Of Cryptology Student: Alper Umut Uçar Supervisor: Nilay Alpar Candidate Number: 001129-0042 School: TED Ankara College Foundation Private High School September, 2013 Word Count: 3485 ABSTRACT Cryptology is a science that has been used throughout the history in order to protect the privacy of the contact between two or more people in order to prevent the other people to understand the communication by mainly using Mathematical codes. The aim of this essay is to illustrate the theoretic and applied uses of mathematics in cryptology and defining the function that has been used to identify the cryptography. In the first part of the essay, the basics and definition of cryptography have been explained. Information on how does the cryptography work and conventional cryptography has been provided. In the second part, the brief history of cryptography has been given. In this part, great minds and the politics of cryptography have been also provided. In the last part, some of the classic cryptography methods have been explained and examples have been given to understand the subject better. Word count: 149 words ‐2‐ ACKNOWLEDGMENTS While preparing this extended essay, my advisor Ms. Nilay ALPAR has been a tremendous mentor for me. I would like to convey my special thanks to her for encouraging my study. Besides, I would like to extend my special thanks to my family. They supported me while preparing the essay and they were extremely helpful and patient during the preparation process.
    [Show full text]