Can You Keep a Secret?

Total Page:16

File Type:pdf, Size:1020Kb

Can You Keep a Secret? Codes and Ciphers 20 Can You Keep a Secret? Codes and ciphers have been around just about as long as there has been written language. The ability to communicate in secret – as well as the ability to peer into the secret communications of others – has been central to a surprising number of major world events throughout history, often with nations as well as lives hanging in the balance. A word first about the difference between a code and a cipher: • A code is a secret language used to disguise the meaning of a message. The simplest form is a “jargon code,” where a particular phrase corresponds to a previously defined message. “The milkman comes in the morning,” for example, could mean “the invasion begins at dawn.” • A cipher conceals what is referred to as a “plaintext” message by substituting (a “substitu- tion cipher”) and/or scrambling (a “transposition cipher”) the letters. As we shall see later, a simple substitution cipher may encrypt the message “Call me tomorrow morning” as “FDO OPH WRP RUU RZP RUQ LQJ.” For our purposes, we will use such general terms as “code,” Cryptography, sometimes called “cryptology,” is “code breaker,” “encryp- tion” and “decryption” to from the Greek, meaning “hidden writing,” and its refer both to codes and ci- use has been documented for over 2,000 years. phers, rather than repeatedly drawing the distinction between the two. Hidden Writing Cryptography, sometimes called “cryptology,” is from the Greek, meaning “hidden writing” and its use has been documented for over 2,000 years. From the beginning, codes have always been of greatest use in matters of war and diplomacy. The reasons for this are pretty obvious: no general would want his strengths, weaknesses or plans revealed to his enemy, as no ambassador would want his goals or strategies available to his competitor sitting across the negotiat- ing table. At first, written messages were simply hidden to keep their meaning secret, in a practice called steganography. In his chronicle of the wars between Greece and Persia, the Greek historian Herodotus described how an act of cryptography had saved Greece from con- quest by Xerxes, left, the king of Persia and pharaoh of Egypt who ruled from 485 to 465 B.C. Codes and Ciphers 21 In an effort to expand his rule, Xerxes secretly began amassing a great army and navy several years before launching a surprise attack on Athens. The build-up was witnessed, however, by Demaratus, a Greek exile living in the Persia at the time. Demaratus, determined to alert his homeland, scraped the dark wax off a pair of wooden folding tablets, wrote the news onto them, then covered the message over with wax again. When the tablets reached their destination, the wax was removed and the message read. On receiving the news, the Greeks, who at that time had no navy, commissioned the construction of 200 warships. When the Persian fleet finally arrived in 480 B.C., without the element of surprise, Xerxes found himself lured into a trap, and his forces were defeated in a day. Around this same time, Spartan military leaders used a scytale, at right, (rhymes with Italy), which was simply a wooden staff, to encode their communications. A strip of parchment or leather was wrapped around it, and the writer would write his message along the length of the scytale. When finished, the strip would be unwound and seem to contain only a series of meaningless letters. In order to read the message, the receiver would wind the leather around another scytale of the same diameter as the one used by the sender. Herodotus also documented the tale of Histaiaeus, who was anxious to encourage Aristagoras of Miletus to revolt against the Persian king. To keep his message hidden, he shaved the head of his messenger, wrote the message on his scalp, then waited for the hair to grow back before sending him off. The weakness of this second method should be pretty obvious. If the message remains hidden until its intended recipient receives it, then all is well and good, but if it is found, it is plain for all to see. As the demand for secrecy increased, a more foolproof solution was needed. The Caesar Cipher In his historic quest to expand the Roman Republic into a vast empire a little more than 2,000 years ago, Julius Caesar, commemorized in a bust at right, by all accounts a man of exceptional brilliance, energy and vision, embarked on a series of military campaigns in such countries as Gaul (modern-day France), Hispania (Spain), Egypt, Britannia (Eng- land) and Germania (Germany). Communications on the battlefield in Caesar’s time consisted only of written messages delivered on foot by runners, whose ability to accomplish their mission (and live to report back to their commander) depended entirely on their ingenuity, bravery and speed. Most often, several runners were dispatched to deliver the same message to one of Caesar’s of- ficers in the hopes that one would complete the mission. Since the enemy’s officers, at least, were usually literate, there was always the danger that Caesar’s orders would fall into enemy hands. To prevent the enemy from learning his plans, Caesar devised one of the earli- est known encryption techniques, which is today known as the “Caesar Cipher.” The Roman historian Suetonius, best known for his The Lives of the First Twelve Caesars, refers to Julius Caesar’s use of the Caesar Cipher in this excerpt: Codes and Ciphers 22 “If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the let- ters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.” As described by Suetonius, the Caesar Cipher is a simple shift of the alphabet by a specified number of characters to the right. The number of character shifts is referred to as the key. By replacing each character in a message with the character that corresponds to the key number of charac- ters further down the alphabet – in this case, three – anyone can create a Caesar-Ciphered message. Codes and Ciphers Lessons In Unit 2, Codes & Ciphers, you will create a software program capable of encoding a plaintext message and decoding an encrypted message, using the Caesar Cipher described in the previous narrative. After modeling the Caesar Cipher on a simple message using a pencil and paper in order to get a basic idea of how it works, you will: 1. Create the Cryptography Project 2. Ask the User to Choose Encipher, Decipher or Exit 3. Ask the User to Choose Caesar Cipher, Vigenere Cipher or Exit 4. Implement the Caesar Cipher method to Encode a plaintext message For an explanation of the Vigenere Cipher, read on. Codes and Ciphers 23 Encoded Court Intrigue During the Middle Ages, thick with intrigue and secret plots, the royal courts of Europe always sought to employ the finest code makers and breakers in order to help rulers guard against as well as uncover the plots of their enemies. When Mary Queen of Scots, right, was tried for plotting the assassination of Queen Elizabeth in 1586 in a failed attempt to seize the British throne, for ex- ample, Sir Francis Walsingham, Elizabeth’s ruthless spymaster, knew that he would have to prove beyond a doubt that she was behind the infamous plot before Eliza- beth would agree to her cousin’s execution. Fortunately, Thomas Phelippes, the court’s resident expert on code breaking, was up to the task and cracked the code Mary had used to communicate with her co- conspirators. In the end, Mary was condemned and Elizabeth herself signed the death warrant. As Mary learned the hard way, just as important as the ability to create a cipher that will keep your communications safe from the prying eyes of your enemies is the ability to crack your enemies’ ciphers and reveal the thoughts and plans of those who wish you or your allies harm. As long as there have been ciphers, there have been cryptanalysts. Cryptanalysis is the science of deci- phering a message without knowledge of the key. The science of crypt- analysis was invented Frequency analysis is the study of the frequency of let- by an Arab in the ninth century, during the ters or groups of letters in an encoded message and has Golden Age of Islamic come to be the first step in breaking classical codes. Civilization. One of the many schol- ars who worked in Baghdad’s House of Wisdom at that time was the noted philosopher and mathematician Yaqub ibn Ishaq al-Kindi, pictured below in a Syrian postage stamp. During his career, Al-Kindi wrote nearly 300 books on a wide range of subjects, and his On Deciphering Cryptographic Messages was the first treatise to describe the science of letter frequency analysis. Frequency analysis is the study of the frequency of letters or groups of letters in an encoded message and has come to be the first step in breaking classical codes. Meanwhile, the West was still mired in the Dark Ages and the only places where the study of secret writing was encouraged were the monasteries, where monks strug- gled in search of hidden meanings in the Bible. Monks noticed deliberate instances of cryptography in the Old Testament. There are, for example, sections of text encrypted with atbash, a traditional form of Hebrew substitution cipher.
Recommended publications
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Vigenere Cryptography
    Fall 2006 Chris Christensen MAT/CSC 483 Cryptography of the Vigenère Cipher Cryptanalysis is based upon finding the ghosts of patterns of the plaintext. We have seen that an important technique of doing this is frequency analysis. So, cryptographers try to develop ciphers that are not easily attacked by frequency analysis. There are two basic ways to do this: use more than one ciphertext alphabet or encrypt more than one letter in a block. First, we will consider using more than one cipher text alphabet. Simple substitution ciphers, Caesar ciphers, multiplicative ciphers, and affine ciphers are all examples of monoalphabetic ciphers – only one ciphertext alphabet is used. Even if the original word lengths are concealed and the substitution alphabet is random, it is possible to find a solution by using frequency data, repetition patterns and information about the way letters combine with one another. What makes the solution possible is the fact that a given plain language letter is always represented by the same cipher letter. As a consequence, all the properties of plain language such as frequencies and combinations are carried over into the cipher and may be utilized for solution. In effect we could say that all such properties are invariant except that the names of the letters have been changed. It would seem then that one way to obtain greater security would be to use more than one alphabet in enciphering a message. The general system could be one that uses a number of different alphabets for encipherment, with an understanding between correspondents of the order in which the alphabets are to be used.
    [Show full text]
  • Midterm Project - the Alberti Cipher Wheel Spring 2017
    Midterm Project - The Alberti Cipher Wheel Spring 2017 This project should consist of a short written report (about 5 pages) which includes your responses for (1)-(4), (6), (7) plus the physical Alberti wheel and video/photos illustrating its use as described in (6). Include a bibliography of sources you used. The Alberti wheel you will use is illustrated in the figure below and was used with Latin so certain letters are missing. 1. Who was Leon Battista Alberti and when did he live? Why was it so important at the time? Was it used as a monoalphabetic or polyalphabetic cipher? Why? Could it be used as the other type of cipher? (i.e., if you answer monoalphabetic, then could it be used as a polyalphabetic cipher or vis versa) 2. Describe how the Alberti cipher was used. Describe how a pointer character was used, how a key word was used and how the numbers were used to encrypt a shift.. Explain what constitutes a key for the Alberti cipher. How many different starting positions are there? 3. The Alberti cipher disk was made to be used in Latin so certain letters (like \H") are missing. In this case you have to make a decision on how these are going to be encrypted. For example, \H" is often encrypted as \FF". I believe there are six of these letters missing on the outer disk. State how you are going to encrypt them. 4. The Alberti cipher contains four numbers (1,2,3,4) on the outer wheel. If you use the \O" to encrypt zero, then we could encrypt a number using base 5 (recall that for binary numbers we used base 2, i.e., 0 and 1.) What is the number 15 (in our decimal system) in base 5 and how would you encrypt it assuming the wheel is set as in the figure.
    [Show full text]
  • Plaintext, Encryption, Ciphertext: a History of Cryptography and Its Influence on Contemporary Society
    TOC PLAINTEXT, ENCRYPTION, CIPHERTEXT: A HISTORY OF CRYPTOGRAPHY AND ITS INFLUENCE ON CONTEMPORARY SOCIETY QUINN DUPONT PHD DISSERTATION UNIVERSITY OF TORONTO, FACULTY OF INFORMATION CHAPTER 1 “REPRESENTATION” – SUBMISSION TO SIGCIS 2015 DRAFT (PLEASE DO NOT DISTRIBUTE) 1 TOC TABLE OF CONTENTS 1.! Introduction i.! Philological complexity ii.! What do we know of cryptography? iii.! Rewriting three schemata iv.! Chapter summaries Part One: Plaintext 2.! Representation i.! Alberti’s notation ii.! Mimesis and media iii.! Ancient theories of mimesis i.! Plato’s theory of mimesis ii.! Aristotle’s theory of mimesis iv.! Late medieval and renaissance web of resemblances v.! Conventia in memory techniques from Lull to Alberti’s cipher wheel vi.! Aemulatio, analogy, and sympathy in Trithemius’ magical cryptography 3.! Media and notation i.! Francis Bacon’s artifcial languages (1605-1623) i.! Francis Bacon’s bi-literal cipher ii.! Te development of notational schemes (1605-1686) iii.! Notational discourse networks i.! Identity and the alphabet ii.! A theory of notation 4.! Codes and codeworks i.! Agrippa (a book of the dead) i.! Forensic description of Agrippa ii.! Te compiled binary iii.! Te cryptographic algorithm 1.! Encryption efect 2.! Te “self-destruct” mechanism ii.! Bitcoin iii.! Executable software Part Two: Encryption 5.! Media of perception 6.! Communication and transmission 7.! Translation and Transcription 2 TOC Part Tree: Ciphertext 8.! Otherness and order, revealed 9.! Silence 10.! Epilogue i.! Politics: Homogeneity and visibility ii.! Rise of mnenotechnologies iii.! Ubiquitous cryptography 3 PART 1 – PLAINTEXT CHAPTER 2 – REPRESENTATION PLAINTEXT In his seminal work on cryptography De componendis cifris,1 Leon Battista Alberti (1404-1472) diverts from his task of exploring and inventing cryptography systems to recall a time strolling through a garden with his friend Dati.
    [Show full text]
  • Nomenclators Nomenclator Example Alberti's Cipher Disk
    Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution cipher with homophones Nomenclator Example Nomenclator used by Mary, Queen of Scots . in 1586 in the plot against Elizabeth I Taken from Simon Singh. The Code Book. Alberti’s Cipher Disk Invented by Leon Battista Alberti in 1460s. outer disk (fixed) plaintext inner disk (moving) ciphertext Agree on index letter on inner disk. Key: letter corresponding to index letter on outer disk. Key can change during encryption 1 Cipher Disk Examples Let’s choose “K” as index letter. Examples: rRVTZOK aKVtTRCK HKmZMEP Since the key can change, this cipher is no longer monoalphabetic, but polyalphabetic. Are there other ways to use the cipher disk? Johannes Trithemius 1462-1516, Germany Polygraphiae, 1518 First printed book on cryptography. • Ave Maria Cipher • Polyalphabetic substitution • Progressive key Steganographia, 1606 • hidden writing http://diglib.hab.de/drucke/12-3-rhet-2f/start.htm Polygraphiae I The Polygraphiae contains many pages of code. 2 Polygraphiae II: Ave Maria 1st and 2nd page Steganographia http://books.google.com/books?id=bQdC AAAAcAAJ&dq=Trithemius%20Stegano graphia&pg=PR6#v=onepage&q&f=false Polygraphiae III Tabula recta, from the 6th book of the Polygraphiae. • Polyalphabetic substitution • Progressive key The history of information security: a comprehensive handbook, de Leeuw, Bergstra 3 Polygraphiae IV Examples (starting with first alphabet) • Johannes • SUGKESUOWSUN The history of information security: a comprehensive handbook, de Leeuw, Bergstra Modern Tabula Recta More Examples (not from beginning) • XNNN • NUGUV http://commons.wikimedia.org/wiki/File:Vigenere-square.png Giovan Batista Belaso La cifra del.
    [Show full text]
  • Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford ([email protected])
    Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford ([email protected]) Smithsonian Institute October 31, 2009 © 2009 Ralph Morelli You are free to reuse and remix this presentation under a creative commons license provided you give credit to the author. http://creativecommons.org/licenses/by/3.0/us/ This presentation was created using Open Office 3.0, free and open source software. http://www.openoffice.org/ Part II: Cryptology in Transition Outline Polyalphabetic Substitution Alberti Cipher Vigenère Cipher – Le Chiffre Indéchiffrable Kasiski Decipherment Mechanical Ciphers The Enigma Machine WWII Leon Battista Alberti (1404-1472) Leon Battista Alberti (1404-1472) Renaissance man. Architect, author, artist, poet, philosopher. Father of Modern Cryptography – First western exposition of frequency analysis. – Invention of polyalphabetic cipher. Courtyard of the Uffizi Palace Alberti the Architect Santa Maria Novella – Florence De Cifris First comprehensive account of cryptanalysis in the West. Invention of the polyalphabetic cipher. Alberti Cipher Disk Outer disk stationary with regular alphabet. Inner disk moveable with permuted alphabet. An inner disk letter (k) is picked as index, and aligned with some letter on outer disk (B). The index is changed every 3 or 4 words and inserted into the message. “Ciao amici” might be encrypted as “BlvgyCeztkt”. Compare Letter Frequencies Plain Caesar Simple Polyalphabetic Polyalphabetic Development Alberti (~ 1472): devised genuine polyalphabetic cipher with mixed alphabet plus a practical cipher disk device. Abbot Trithemius (~ 1508): used tables of regular alphabets to be used in fixed order. Giovanni Battista Belaso (~ 1550 ): invented principle of a key or keyword to select alphabets. Giovanni Battista Porta (~ 1563): “invented” using mixed alphabets.
    [Show full text]
  • Comparison Between the Types of Substitute Ciphers Jemima Abraham1, Siddharth Nanda2, Rajeshwari Gundla3 1U.G
    IJRECE VOL. 7 ISSUE 2 (APRIL- JUNE 2019) ISSN: 2393-9028 (PRINT) | ISSN: 2348-2281 (ONLINE) Comparison between the types of Substitute Ciphers Jemima Abraham1, Siddharth Nanda2, Rajeshwari Gundla3 1U.G. Student, 2Faculty, 3Senior Faculty SOE, ADYPU, Lohegaon, Pune, Maharashtra, India1 IT, iNurture, Bengaluru, India2,3 Abstract - Cryptography is an art of converting critical Encryption Algorithm: Process of converting from plain information into un-understandable data so that any text to cipher text. unauthenticated person may not get hold of the sensitive Decryption Algorithm: Process of converting cipher text to data [2].Substitute cipher is one such technique which plain text. replaces one symbol with another. In substitute cipher each Key: It is the algorithm used to encrypt and decrypt the letter has a corresponding fixed alphabet that is substituted data. to get the plain text [1]. There is a variety of methods used in substituting. In this paper the comparison between the different types of substitute cipher is studied. This comparison will help in understanding which cipher is highly used, secured and difficult to crack. Figure 1: Simple Cryptosystem Keywords - Cipher, cryptanalyst, plain text, encryption, decryption, techniques, keys, substitute, Monoalphabetic, Symmetric & Asymmetric Encryption Algorithm: There Polyalphabetic. are two main methods by which encryption algorithm can be classified: I. INTRODUCTION Symmetric Key Cryptography Today’s most challenging issue is data security that affects Asymmetric Key Cryptography all aspects of our day-to-day lives especially communication. However, by introducing cryptography Symmetric Key is also known as a private or secret key [7]. techniques, many problems related to integrity, In this, the same key is used for both encrypting and confidentiality, availability, authentication and authorization decrypting the message.
    [Show full text]
  • Secret Activities to Do at Home Crackers
    Secret activities to do at home Crackers Spies would use codes to pass secret messages to each other. If the enemy captured these codes they would not be able to read the 1 message, unless they deciphered the code. Number substitution codes were sometimes used by the S.O.E (Special Operations Executive) during the Second World War. The 26 letters of the alphabet would be represented by a number. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 To get you started – what code words are these? 8. 5. 12. 12. 15 23.8.1.20 9.19 25.15.21.18 14.1.13.5 Send some secret messages to your friends or family using the code! Caesar Cipher The Caesar Cipher is an alphabetic shift cipher. It was used by the Julius Caesar to communicate with his generals. The code is a shift 2 of three letters down the alphabet. To decode a message shift the letters backwards three letters. The table below shows this shift. 1 is the plaintext alphabet and 2 is the encoded alphabet. 1 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 2 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Using this table you substitute the letters of the plaintext alphabet (1) with the letter of the encoded alphabet below it (2).
    [Show full text]
  • Modified Alberti' Cipher Employing Special Characters
    IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 10, Issue 4, April 2020, ||Series -II|| PP 28-29 Modified Alberti’ Cipher Employing Special Characters KaminiIshwarya S, Dr. P. Thangaraju KaminiIshwarya.S, MPhil, Department of Computer Science, Bishop Heber College. Dr. P. Thangaraju, Asst.Professor, Department of MCA, Bishop Heber College. Received 21 April 2020; Accepted 06 May 2020 Abstract: Internet plays a major role in the modern world. Nearly 3.2 Billion of people are using Internet. They use internet for all minor and major purposes like mails, Confidential and privacy text documents, social media, E-commerce, Banking etc. A few security measures like authentication, authorization systems are provided to them. There are several Encryption techniques such as RSA, DES etc. Apparently, somewhere in the world, hackers are cracking the Encrypted data and apprehending the keys and stealing the information as the Encryption and Decryption are only based on the International Language English. They use some online sites and tools to steal the data with ease. To increase the level of security this Alberti’s cipher technique is proposed. It encrypts the plain text (English) to the special characters. So the hackers cannot crack it easily even with the help of online crackers or any other tools. Keywords: Encryption, Decryption, Plain Text, Cipher Text, Alberti Cipher, Special characters. I. INTRODUCTION People send information through wired and wireless connection. Sometimes in-order to transfer information we use ad hoc networks. Now a day’s data are being exposed to vulnerabilities such as weak passwords, missing data encryption, missing authorization, unrestricted upload of dangerous file type, missing authentication for critical function.
    [Show full text]
  • Chapter 2: Classical Encryption Techniques Cryptography and Information Security
    Chapter 2: Classical Encryption Techniques Presented by: Abir EL. 03/16/2021 Professor. 박종혁 Cryptography and information Security 1 Table of Content: • Introduction to encryption • Basic Terminology and key words • Symmetric Cipher Model . Caesar Cipher. Monoalphabetic Cipher. Polyalphabetic Cipher. Playfair Cipher. One-Time Pad. Hill Cipher. • Transposition Cipher . Book Cipher or Running Key Cipher • Product Cipher 2 Classical Encryption Techniques What is Encryption? Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to its original, readable form. Goals of this chapter: • Introduce basic concepts and classical terminologies and encryption technologies. • An introduction to the upcoming chapters. 3 Classical Encryption Techniques Basic Terminology and Key words: . Plaintext: Refers to the original text or message to be encrypted. Ciphertext: The encrypted message. Enciphering or Encryption: The process of converting plaintext into a ciphertext. Deciphering or Decryption: The process of decoding the ciphertext and retrieving the original plain text. Encryption algorithms: a pseudocode based on mathematical equations to perform encryption. Usually requires two inputs; the Plaintext and the Secret Key. Decryption algorithm: Used to perform the decryption. Usually requires two inputs as well; Ciphertext and Secret Key. Secret Key: A special key used for encryption and decryption, known as well as Symmetric Key. 4 Classical Encryption Techniques Basic Terminology and Key words: . Cipher or Cryptographic system: Refers to the scheme used for encryption and decryption. Cryptography: The science that studies and analyze ciphers. Cryptanalysis: Science of studying attacks against cryptographic systems.
    [Show full text]
  • Section 1: Classical Cryptography
    Jay Daigle The George Washington University Math 4981: Cryptography 1 Classical Cryptography 1.1 Introduction to Cryptography 1.1.1 Language Cryptology is the study of sending (hopefully) secure messages over non-secure channels. We sometimes use the term cryptography for the study of designing such systems; cryptanalysis is the study of breaking the security of such systems. There are three basic types of cryptography. Steganography Stegaography is the concealing of your message so that evesdroppers can't tell you're sending a message. When this works it is incredibly effective; if no one knows you're sending a message at all, then no one is even trying to read it. On the other hand, steganography doesn't work very well at all if people know what you're doing. Once they know where to look, your steganography has failed, so it is very fragile. Famously, the ancient Greek tyrant Histiaeus wanted to send secret message plotting a revolt against the Persians to his nephew Aristagoras. He shaved the head of one of his slaves, tattooed a message on his head, then waited for the hair to grow back. Aristagoras was instructed to shave the slave's head and read the message. This worked very effectively, but would not have succeeded at all if slave-head-tattooing had been a common method of sending secret messages. It also didn't have very good performance: it took months to send a short message. Modern security practice rarely involves the tattooing of slaves, but we do have more sophisticated steganographic techniques. A common one involves hiding a message in an image file by adjusting the least significant digit of the color intensity of each pixel.
    [Show full text]