Cryptology: an Historical Introduction DRAFT

Total Page:16

File Type:pdf, Size:1020Kb

Cryptology: an Historical Introduction DRAFT Cryptology: An Historical Introduction DRAFT Jim Sauerberg February 5, 2013 2 Copyright 2013 All rights reserved Jim Sauerberg Saint Mary's College Contents List of Figures 8 1 Caesar Ciphers 9 1.1 Saint Cyr Slide . 12 1.2 Running Down the Alphabet . 14 1.3 Frequency Analysis . 15 1.4 Linquist's Method . 20 1.5 Summary . 22 1.6 Topics and Techniques . 22 1.7 Exercises . 23 2 Cryptologic Terms 29 3 The Introduction of Numbers 31 3.1 The Remainder Operator . 33 3.2 Modular Arithmetic . 38 3.3 Decimation Ciphers . 40 3.4 Deciphering Decimation Ciphers . 42 3.5 Multiplication vs. Addition . 44 3.6 Koblitz's Kid-RSA and Public Key Codes . 44 3.7 Summary . 48 3.8 Topics and Techniques . 48 3.9 Exercises . 49 4 The Euclidean Algorithm 55 4.1 Linear Ciphers . 55 4.2 GCD's and the Euclidean Algorithm . 56 4.3 Multiplicative Inverses . 59 4.4 Deciphering Decimation and Linear Ciphers . 63 4.5 Breaking Decimation and Linear Ciphers . 65 4.6 Summary . 67 4.7 Topics and Techniques . 67 4.8 Exercises . 68 3 4 CONTENTS 5 Monoalphabetic Ciphers 71 5.1 Keyword Ciphers . 72 5.2 Keyword Mixed Ciphers . 73 5.3 Keyword Transposed Ciphers . 74 5.4 Interrupted Keyword Ciphers . 75 5.5 Frequency Counts and Exhaustion . 76 5.6 Basic Letter Characteristics . 77 5.7 Aristocrats . 78 5.8 Summary . 80 5.9 Topics and Techniques . 81 5.10 Exercises . 81 6 Decrypting Monoalphabetic Ciphers 89 6.1 Letter Interactions . 90 6.2 Decrypting Monoalphabetic Ciphers . 91 6.3 Sukhotin's Method for Finding Vowels . 97 6.4 Final Monoalphabetic Tricks . 99 6.5 Summary . 101 6.6 Topics and Techniques . 102 6.7 Exercises . 102 7 Vigen`ereCiphers 109 7.1 Alberti, the Father of Western Cryptology . 110 7.2 Trithemius, the Father of Bibliography . 111 7.3 Belaso, the Unknown and Porta, the Great . 113 7.4 Vigen`ereCiphers . 114 7.5 Variants and Beaufort . 116 7.6 How to Break Vigen`ereCiphers . 117 7.7 The Kasiski Test . 120 7.8 Summary . 123 7.9 Topics and Techniques . 124 7.10 Exercises . 124 8 Polyalphabetic Ciphers 135 8.1 Coincidences . 135 8.2 The Measure of Roughness . 138 8.3 The Friedman Test . 142 8.4 Multiple Encipherings . 145 8.5 Vigen`ere'sAuto Key Cipher . 149 8.6 Perfect Secrecy . 152 8.7 Summary . 154 8.8 Terms and Topics . 155 8.9 Exercises . 156 CONTENTS 5 9 Digraphic Ciphers 167 9.1 Polygraphic Ciphers . 167 9.2 Hill Ciphers . 170 9.3 Recognizing and Breaking Polygraphic Ciphers . 174 9.4 Playfair . 176 9.5 Summary . 179 9.6 Topics and Techniques . 179 9.7 Exercises . 180 10 Transposition Ciphers 189 10.1 Route Ciphers . 189 10.2 Geometrical Ciphers . 190 10.3 Turning Grilles . 190 10.4 Columnar Transposition . 192 10.5 Transposition vs. Substitution . 195 10.6 Letter Connections . 196 10.7 Breaking the Columnar Transposition Cipher . 198 10.8 Double Transposition . 201 10.9 Transposition during the Civil War . 202 10.10 The Battle of the Civil War Ciphers . 207 10.11 Summary . 207 10.12 Topics and Techniques . 208 10.13 Exercises . 209 11 Knapsack Ciphers 219 11.1 The Knapsack Problem . 219 11.2 A Related Knapsack Problem . 220 11.3 An Easy Knapsack Problem . 221 11.4 The Knapsack Cipher System . 223 11.5 Public Key Cipher . 227 11.6 Summary . 228 11.7 Topics and Techniques . 228 11.8 Exercises . 228 12 RSA 231 12.1 Fermat's Theorem . 232 12.2 Complication I: a small one . 234 12.3 Complication II: a substantial one . 235 12.4 Complication III: a mini one . 238 12.5 Complication IV: the last one . 239 12.6 Putting It All Together . 241 12.7 Exponential Problems (and answers) . 241 12.8 RSA . 242 12.9 RSA and Public Keys . 245 12.10 How to break RSA . 245 12.11 Authenticity { Proof of Authorship . 248 6 CONTENTS 12.12 Summary . 249 12.13 Topics and Techniques . 250 12.14 Exercises . 251 Bibliography 253 Index 257 List of Figures 1.1 Saint Cyr Slide . 12 1.2 Decrypting a Caesar cipher by running down the alphabet . 15 1.3 Letter Frequency, in percent. From Sinkov. 16 1.4 English Letter Frequency Chart . 16 1.5 Letter Frequency Charts for Several Languages . 18 2.1 Alice, Bob and Eve: the three names of Cryptography . 30 3.1 The Standard Translation of Letters into Numbers . 31 3.2 Enciphering/Deciphering pairs modulo 26. 43 5.1 Letter Frequencies { Anywhere. 77 5.2 Letter Frequencies { Initial Letters. 77 5.3 Letter Frequencies { Final Letters. 78 5.4 Characteristics of etaoinshr..................... 78 5.5 Most Common Short Words . 78 5.6 The 100 Most Common Words in English . 79 6.1 Some Basic Letter Behaviors . 91 6.2 Digraph Table . 93 6.3 Digraph Table . 96 6.4 Letter Behaviors . 97 7.1 Trithemius' tabula recta . 112 7.2 Beaufort's Tableaux . 116 7.3 A Kasiski Table . 123 8.1 Frequency Counts: Same quote, different keylengths. 138 8.2 Larrabee's Cipher Code . 163 9.1 A Simple Digraphic Substitution Chart . 169 9.2 A More Complicated.
Recommended publications
  • Algebraic Cryptanalysis.Pdf
    EEAlgebraic E Cryptanalysis Gregory V. Bard Algebraic Cryptanalysis Gregory V. Bard Department of Mathematics Fordham University Bronx, NY 10458 USA [email protected] ISBN 978-0-387-88756-2 e-ISBN 978-0-387-88757-9 DOI 10.1007/978-0-387-88757-9 Springer Dordrecht Heidelberg London New York Library of Congress Control Number: 2009929845 © Springer Science+ Business Media, LLC 2009 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Preface Algebraic Cryptanalysis is the process of breaking codes by solving polynomial systems of equations. In some ways this book began when the author began to ex- plore cryptanalysis as a beginning graduate student, and realized with frustration that no book whatsoever existed on the topic. Since that time, some books have been written about Linear Cryptanalysis or Differential Cryptanalysis (e.g. [211] and [214] cover both), but none on Algebraic Cryptanalysis, which is a rich and growing field.
    [Show full text]
  • Vigenère Cipher Cryptanalysis
    Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: Kasiski Test The keyword of a Vigenère cipher describes the rotation among the Caesar cipher alphabets that are used. That rotation leads to patterns that can be exploited by a cryptanalyst. If we know the length of the keyword, we can often determine the keyword and, hence, decrypt all messages encrypted with that keyword. Here is a ciphertext message that has been encrypted with a Vigenère cipher. nifon aicum niswt luvet vxshk nissx wsstb husle chsnv ytsro cdsoy nisgx lnona chvch gnonw yndlh sfrnh npblr yowgf unoca cossu ouoll iuvef issoe xgosa cpbew uormh lftaf cmwak bbbdv cqvek muvil qbgnh ntiri ljgig atwnv yuvev iorim cpbsb hxviv buvet vxshk uorim mjbdb pjrut fbueg ntgof yuwmx miodm ipdek uuswx lfjek sewfy yssnm zscmm bpgeb huvez ysaag usaew mffvb wfgim qpilw bbjeu yfbef vbfrt mtwnz uorig wpbvx hjsnm zpfag uhsnm npglb jbqrh mttrh huwek mpfak ljjen hbbnh ooqew vzdak udvum yucbx yoquf vffew vzonx hjumt lfgef vmwnz uxsiz bumag xbbtb kvotx xumpx qswtx l Assume that, somehow, we have discovered that the keyword has length five (which is conveniently the same as the size of the blocks). Then the first letter of each block is encrypted with the same row of the Vigenère square – they are encrypted with the same Caesar cipher. Similarly, the second letter of each block is encrypted with the same row – the same Caesar cipher. The third letters with the same Caesar cipher. The fourth letters with the same Caesar cipher. And, the fifth letters with the same Caesar cipher.
    [Show full text]
  • Words Should Be Fun: Scrabble As a Tool for Language Preservation in Tuvan and Other Local Languages1
    Vol. 4 (2010), pp. 213-230 http://nflrc.hawaii.edu/ldc/ http://hdl.handle.net/10125/4480 Words should be fun: Scrabble as a tool for language preservation in Tuvan and other local languages1 Vitaly Voinov The University of Texas at Arlington One small but practical way of empowering speakers of an endangered language to maintain their language’s vitality amidst a climate of rapid globalization is to introduce a mother-tongue version of the popular word game Scrabble into their society. This paper examines how versions of Scrabble have been developed and used for this purpose in various endangered or non-prestige languages, with a focus on the Tuvan language of south Siberia, for which the author designed a Tuvan version of the game. Playing Scrab- ble in their mother tongue offers several benefits to speakers of an endangered language: it presents a communal approach to group literacy, promotes the use of a standardized orthography, creates new opportunities for intergenerational transmission of the language, expands its domains of usage, and may heighten the language’s external and internal prestige. Besides demonstrating the benefits of Scrabble, the paper also offers practical suggestions concerning both linguistic factors (e.g., choice of letters to be included, cal- culation of letter frequencies, dictionary availability) and non-linguistic factors (board de- sign, manufacturing, legal issues, etc.) relevant to producing Scrabble in other languages for the purpose of revitalization. 1. INTRODUCTION.2 The past several decades have seen globalization penetrating even the most remote corners of the world, bringing with them popular American exports such as Coca-Cola and Hollywood movies.
    [Show full text]
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • 41760779079990.Pdf
    .CONFIS~Ti;~691 BBS'l'RIOHJB· THE DISTBIBUTION OF THIS SPECIAL TEXT WILL BE RESTRICTED TO REGULARLY ENROLLED EXTENSION COURSE STUDENTS, 'l'O MILITARY PERSONNEL, AND TO OTHER PERSONS COMING WITHIN THE MEANING OF THE PHRASE "FOR OFFICIAL USE ONLY/, ·. ARMY EXTENSION COURSES ~,· ·~~cY-l~~ I!LA)f'~'~ ~ \_ -·----------;-- --·· SPECIAL TEXT No. 166 ADVANCED MILITARY CRYPTOGRAPHY Szcoxn (19'3) EDmox PREPARED UNDER THE DIRECTION OF THE CHIEF SIGNAL OFFICER FOR USE WITH 'I1fE ARMY EXTENSION COURSES .',; ,_ • RSS'fRI<ffRB document contains information affecting the nat1 defense of the United States within the meaning of die · nage Act (U.S. C. -Y,. ~:>· 50: 31, 32). The transmission o · ocument · · or the revelation of its contents in any nl:an any unauthorized person is prohibited. + UNITED STATES GOVERNMENT PRINTING OFFICE ~ (o ~ ~ WASHINGTON : 19'3 . ,. 7.~0NFIDENTIAL Peclassified and approved for release by NSA on 01-14-2014 pursuant to E.O. 1352§ REF ID:A64691 ,·J/ 30 April 1959 Th.is document is re-graded "eEm'!BBrff " of DOD Directive 5200.l dated 8 ~ UP and by autharity of the Directar '2t1:.!i Security ~ncy. ' Paul~w~ S. Willard Colonel, AOC Adjutant Ge.nera.J. • ~· WAR DEPARTMENT, • WAsmNGTON, Februa1"JI S, 1948. Tbis revision of Special Text No. 166, Advanced Milita.ry Cryptog­ raphy (1935), for use with the Anny Extension Courses, is published for the information and guidance of all concerned. BY ORDEB OF THE SlilCBlilTAB.Y OF wAB! :,. G. o. M.ARSHAT,T., General, Ohiejoj8f4. OFFICIAL! JAMES A. ULIO, Major Gemral, 7?i.e Adjut,ant Geneml,. (XI) • SPECIAL TEXT NO.
    [Show full text]
  • Questions These Questions Are in a Specific Order. 1. What Is Scrabble
    Questions Re: The Game of Scrabble Radio Interview - 14th March 2019 - 2AIRFM These questions are in a specific order. 1. What is Scrabble? 2:30 sec. 2. Who invented it? 1:40 sec 3. Why is it called Scrabble? 30 sec 4. Why play Scrabble? 1:30 sec 5. Why should I join a Scrabble Club? 2:30 sec 6. What dictionary should I use? 3:00 mins. 7. Why are there weird words in the Scrabble Dictionary? 3:00 mins 8. What should I know? 2:30 sec 9. What is a good score in Scrabble? 1 min 10. How can I improve my Scrabble score? 1 min 11. How did you get interested in Scrabble? 1 min That’s eleven questions the volume has been turned up to 11! These are some suggestions for songs to be played between breaks:- Words of love – the Beatles G.L.O.R.I.A. - Them featuring Van Morrison Words - the Bee Gees V.A.C.A.T.I.O.N. - Connie Francis Words - Neil Young D.I.V.O.R.C.E. - Tammy Wynette https://soundcloud.com/user147680538/community-interview-14th-march-2019 1. What is Scrabble? The game of Scrabble has been around since 1933 in one form or another in Western society, so I’ve always thought that everyone would have least heard of it. It wasn’t until recently that I realised there are people out there who don’t know what it is. Oddly enough, one of my relatives who is a very worldly character having run various clubs in his day, whom you would have thought was very knowledgeable brought this fact home to me, he was unaware of what it is.
    [Show full text]
  • IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, Lumasms
    Prosiding Seminar Ilmiah Nasional Komputer dan Sistem Intelijen (KOMMIT 2014) Vol. 8 Oktober 2014 Universitas Gunadarma – Depok – 14 – 15 Oktober 2014 ISSN : 2302-3740 IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, LumaSMS Yusuf Triyuswoyo ST. 1 Ferina Ferdianti ST. 2 Donny Ajie Baskoro ST. 3 Lia Ambarwati ST. 4 Septiawan ST. 5 1,2,3,4,5Jurusan Manajemen Sistem Informasi, Universitas Gunadarma [email protected] Abstrak Short Message Service (SMS) merupakan salah satu cara berkomunikasi yang banyak digunakan oleh pengguna telepon seluler. Namun banyaknya pengguna telepon seluler yang menggunakan layanan SMS, tidak diimbangi dengan faktor keamanan yang ada pada layanan tersebut. Banyak pengguna telepon seluler yang belum menyadari bahwa SMS tidak menjamin integritas dan keamanan pesan yang disampaikan. Ada beberapa risiko yang dapat mengancam keamanan pesan pada layanan SMS, diantaranya: SMS spoofing, SMS snooping, dan SMS interception. Untuk mengurangi risiko tersebut, maka dibutuhkan sebuah sistem keamanan pada layanan SMS yang mampu menjaga integritas dan keamanan isi pesan. Dimana tujuannya ialah untuk menutupi celah pada tingkat keamanan SMS. Salah satu penanggulangannya ialah dengan menerapkan algoritma kriptografi, yaitu kombinasi atas algoritma Cipher Disk, Caesar, dan Scytale pada pesan yang akan dikirim. Tujuan dari penulisan ini adalah membangun aplikasi LumaSMS, dengan menggunakan kombinasi ketiga algoritma kriptografi tersebut. Dengan adanya aplikasi ini diharapkan mampu mengurangi masalah keamanan dan integritas SMS. Kata Kunci: caesar, cipher disk, kriptografi, scytale, SMS. PENDAHULUAN dibutuhkan dikarenakan SMS mudah digunakan dan biaya yang dikeluarkan Telepon seluler merupakan salah untuk mengirim SMS relatif murah. satu hasil dari perkembangan teknologi Namun banyaknya pengguna komunikasi.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers at the Beginning of 2006
    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ? [email protected] Abstract. This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. 1 Introduction ECRYPT, a consortium of European research organizations, issued a Call for Stream Cipher Primitives in November 2004. A remarkable variety of ciphers were proposed in response by a total of 97 authors spread among Australia, Belgium, Canada, China, Denmark, England, France, Germany, Greece, Israel, Japan, Korea, Macedonia, Norway, Russia, Singapore, Sweden, Switzerland, and the United States. Evaluating a huge pool of stream ciphers, to understand the merits of each cipher, is not an easy task. This paper simplifies the task by focusing on the relatively small pool of ciphers that allow 256-bit keys. Ciphers limited to 128- bit keys (or 80-bit keys) are ignored. See Section 2 to understand my interest in 256-bit keys. The ciphers allowing 256-bit keys are CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. I included 256-bit AES in counter mode as a basis for comparison. Beware that there are unresolved claims of attacks against Py (see [4] and [3]), SOSEMANUK (see [1]), and YAMB (see [5]). ECRYPT, using measurement tools written by Christophe De Canni`ere, has published timings for each cipher on several common general-purpose CPUs. The original tools and timings used reference implementations (from the cipher authors) but were subsequently updated for faster implementations (also from the cipher authors).
    [Show full text]
  • Elementary Cryptanalysis Classification of Cryptanalytic Attacks
    12 Elementary Cryptography Elementary Cryptanalysis The most direct attack on a cryptosystem is an exhaustive key search attack. The key size therefore provides a lower bound on the security of a cryptosystem. As an example we compare the key sizes of several of the cryptosystems we have introduced so far. We assume that the alphabet for each is the 26 character alphabet. Substitution ciphers: Simple substitution ciphers: 26! Affine substitution ciphers: ϕ(26) · 26 = 12 · 26 = 312 Translation substitution ciphers: 26 Transposition ciphers: Transposition ciphers (of block length m): m! Enigma : Rotor choices (3 of 5): 60 Rotor positions: 263 = 17576 Plugboard settings: 105578918576 Total combinations: 111339304373506560 The size of the keyspace is a naive measure, but provides an upper bound on the security of a cryptosystem. This measure ignores any structure, like character frequencies, which might remain intact following encryption. Classification of Cryptanalytic Attacks We do not consider enumeration of all keys a valid cryptanalytic attack, since no well- designed cryptosystem is susceptible to such an approach. The types of legitimate attacks which we consider can be classified in three categories. 1. Ciphertext-only Attack. 2. Known Plaintext Attack. 3. Chosen Plainext Attack. Ciphertext-only Attack. The cryptanalyst intercepts one or more messages all encoded with the same encryption algorithm. Goal: Recover the original plaintext or plaintexts, to discover the deciphering key or find an algorithm for deciphering subsequent messages enciphered with the same key. Known Plaintext Attack. The cryptanalyst has access to not only the ciphertext, but also the plaintext for one or more of the messages. Goal: Recover the deciphering key or find an algorithm for deciphering subsequent mes- sages (or the remaining plaintext) enciphered which use the same key.
    [Show full text]
  • Cryptographyorhioohulmuoft CRYPTOGRAPHY OR the HISTORY, PRINCIPLES, and PRACTICE of CIPHER-WRITING
    Digitized by the Internet Archive in 2007 with funding from IVIicrosoft Corporation http://www.archive.org/details/cryptographyorhiOOhulmuoft CRYPTOGRAPHY OR THE HISTORY, PRINCIPLES, AND PRACTICE OF CIPHER-WRITING ^ w >TOGRA OR The History, Principles, and Practice OF CIPHER-WRITING e<^ BY Fl^EDWARD HULME, F.L.S., F.S.A U\ AUTHOR OF "familiar WILD FLOWERS," " MYTHLAND," " NATURAL HISTORY LORE AND LEGEND," "the birth and development OF ORNAMENT," " WAYSIDK SKETCHES," ETC Heres noiv mystery and hieroglyphic Ben Jonson— The Alchemysi. LONDON WARWICK HOUSE, SALISBURY SQUARE, E.C NEW YORK AND MELBOURNE — CONTENTS CHAPTER I PAGE Meaning of cryptography—Objections to its study—Its legitimate use and value—Historic examples of its employment—Deliglit in the mysterious—Many other ways of conveying secret information—Symbolism of action—The spoken word imprisoned and dispatched —A matter not necessarily secret because one cannot understand it — Egyptian hieroglypliics — Chinese characters—Indian mutiny Greek—Ancient Biblical cryptogram — Sheshach of Jeremiah — Sir Henry Eawlinson thereon—Statements for and against Julius Caesar's secret code—The waxed tablet of Demaratus—Difference between hidden and secret writing—The shaven head a writing tablet—Charle- magne and Alfred the Great as cryptographic experts —Mediaeval authorities—Trithemius the Benedictine " — " Steganographia —Dabbling in the black art Dr. Dee—Batista Porta's book on "Natural Majick" —Invisible writing—Chemical methods by vitriol, alum, etc. —Writing on glass or crystal—Papal In- quisition—Disappearing writing—Messages wrapped round rollers—Two methods—A slave's back the writing surface—Chemical methods of no great value ordinarily—Disadvantages of use— Action of light and heat—Chloride of cobalt, sulphate of copper, etc.
    [Show full text]
  • Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
    KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Promotor: Proefschrift voorgedragen tot Prof. Dr. ir. Bart Preneel het behalen van het doctoraat in de ingenieurswetenschappen door Souradyuti Paul November 2006 KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Jury: Proefschrift voorgedragen tot Prof. Dr. ir. Etienne Aernoudt, voorzitter het behalen van het doctoraat Prof. Dr. ir. Bart Preneel, promotor in de ingenieurswetenschappen Prof. Dr. ir. Andr´eBarb´e door Prof. Dr. ir. Marc Van Barel Prof. Dr. ir. Joos Vandewalle Souradyuti Paul Prof. Dr. Lars Knudsen (Technical University, Denmark) U.D.C. 681.3*D46 November 2006 ⃝c Katholieke Universiteit Leuven { Faculteit Ingenieurswetenschappen Arenbergkasteel, B-3001 Heverlee (Belgium) Alle rechten voorbehouden. Niets uit deze uitgave mag vermenigvuldigd en/of openbaar gemaakt worden door middel van druk, fotocopie, microfilm, elektron- isch of op welke andere wijze ook zonder voorafgaande schriftelijke toestemming van de uitgever. All rights reserved. No part of the publication may be reproduced in any form by print, photoprint, microfilm or any other means without written permission from the publisher. D/2006/7515/88 ISBN 978-90-5682-754-0 To my parents for their unyielding ambition to see me educated and Prof. Bimal Roy for making cryptology possible in my life ... My Gratitude It feels awkward to claim the thesis to be singularly mine as a great number of people, directly or indirectly, participated in the process to make it see the light of day.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]