Xerox University Microfilms GUDES, Ehud, 1945- the APPLICATION of CRYPTOGRAPHY to DATA BASE SECURITY

Total Page:16

File Type:pdf, Size:1020Kb

Xerox University Microfilms GUDES, Ehud, 1945- the APPLICATION of CRYPTOGRAPHY to DATA BASE SECURITY INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1. The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at the upper left hand corner of a large sheet and to continue photoing from left to right in equal sections with a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation. Silver prints of "photographs" may be ordered at additional charge by writing the Order Department, giving the catalog number, title, author and specific pages you wish reproduced. 5. PLEASE NOTE: Some pages may have indistinct print. Filmed as received. Xerox University Microfilms GUDES, Ehud, 1945- THE APPLICATION OF CRYPTOGRAPHY TO DATA BASE SECURITY. The Ohio State University, Ph.D., 1976 Computer Science Xerox University Microfilms, Ann Arbor, Michigan 48106 (c) Copyright by Ehud Gudes 1976 TEE APPLICATION OF CRYPTOGRAPHY TO DATA BASE SECURITY DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Ehud Gudes The Ohio State University 1 9 7 6 Reading Committee : Approved By Prof. Jerome Rothstein Prof. Harvey S . Koch Prof. Stuart H. Zweben Prof. Douglas S . Kerr Adviser Department of Computer and Information Science ACKNOWLEDGMENTS I would like to express my gratitude to my major adviser. Professor Jerome Rothstein for accepting me as his advisee in the middle of this research, and for many contributions to this work especially in its later parts. The most important ones were first, his observation that Shannon's unicity distance is inappropriate for data base cryptography and that the work factor approach was needed, and second, his idea of using the "random key generation" method as an easy way to achieve a high work factor. Professor Rothstein’s constructive criticism and his tire­ less efforts to improve the presentation of this work are greatly appreciated. I would like to thank my former major adviser. Professor Fred Stahl of Columbia University, for introducing me to the subject of cryptography, for his help in formulating the basic problems and for directing the first half of this research. I would like to thank Professor Harvey Koch for his help and encouragement throughout this research and for his contributions to the data base model. Professor Koch's advice in difficult moments was instrumental for the com­ pletion of this work. I want to thank Professors S. Zweben and D. Kerr for serving on my reading committee and for their helpful comments and suggestions which improved the presentation of the results significantly. Thanks also go to Mark Ebersole from IRCC for providing the file used in the experiment, and to Steve Miller for his help in implementing the NBS block cipher. I also would like to thank Professor M. Yovits and the Department of Computer and Information Science for their financial sup­ port in the last three and a half years. This work is dedicated to Amiella, my wife, for her help, encouragement, understanding and endurance through­ out this long and demanding road. August 2, 1945 . Born - Haifa, Israel 1967 .......... B.Sc., Technion - IIT, Haifa, Israel 1970-1972 . System Programmer, Technion Computer Center, Haifa, Israel 1973 .......... M.Sc., Technion - IIT, Haifa, Israel 1973-1976 . Research and Teaching Associate, The Ohio State University, Columbus, Ohio PUBLICATIONS With A. Reiter, "On Evaluating Boolean Expressions", Soft­ ware Practices and Experience, December, 1973. With F. Stahl and H. Koch, "The Application of Cryptographic Transformations to Data Base Security", NCC Proceedings, 1976. FIELDS OF STUDY Major Field; Computer and Information Science Studies in System Programming. Professors J. Rothstein, S. Zweben and D. Kerr Studies in Information Storage and Retrieval. Professor H. Koch Studies in Automata Theory. Professors J. Rothstein and H. W. Buttelmann TABLE OF CONTENTS Page ACKNOWLEDGMENTS ...................................... Ü VITA.................................................... iii LIST OF TABLES........................................ vii LIST OF FIGURES...................................... viii Chapter I. INTRODUCTION AND MOTIVATION . 1 1.1 Computer Data Security .................. 1 1.2 Data Security Risks and Their Countermeasures........................ 3 1.3 The Role of Cryptography in Data Security ................ 7 1.4 The Objectives and the Organization of this Dissertation.................. 9 II. REVIEW OF CRYPTOGRAPHY 13 2.1 Traditional Cryptography ................ 13 2.2 Measures for Cryptographic Security. 17 2.3 Applying Cryptography to a Computer System........................ 19 2.4 Cryptography and Data Bases.............. 26 2.5 Summary. ............. 27 III. REVIEW OF DATA BASE SECURITY................. 28 3.1 General Data Security Mo d e l s ............ 28 3.2 Data Base Security vs. Operating System Security........................ 31 3.3 Basic Concepts in Data Base Security . 33 3.4 Analysis of Data Base M o d e l s........... 35 3.5 Cryptography and Data Bases............. 39 3.6 Summary.................................. 41 IV. A MULTI-LEVEL STRUCTURED MODEL OF DATA BASE . 42 4.1 Introduction........................... 42 Page 4.2 Four Levels Model..................... 43 4.3 Notation and Definitions............. 51 4.4 Examples of Standard Structures in the Level Notation............... 56 4.5 Discussion........................... 62 4.6 Summary. ........................ 62 V. CRYPTOGRAPHIC TRANSFORMATIONS IN THE MULTI-LEVEL MODEL ............................ 64 5.1 Basic Definitions..................... 64 5.2 Transformations Between Physical Levels .......................... 65 5.3 Using Cryptographic Transformations. 74 5.4 Summary ............................. 80 VI. DESIGN OF A SECURE FILE SYSTEM BASED ON USER CONTROLLED CRYPTOGRAPHIC TRANSFORMATIONS . 81 6.1 General System Structure............. 81 6.2 Compartmentalized, Data Independent Protection Specifications........... 88 6.3 Hierarchial Protection Specifications. 102 6.4 Data Dependent Protection Specifications . Ill 6.5 Summary................................ 116 VII. EVALUATING THE SECURITY OF FILE ENCIPHERING . 118 7.1 Introduction.......................... 118 7.2 Review of Shannon's Measures ............ 119 7.3 The File as a Message S o urce.......... 122 7.4 Combinatorial Approach to the Work Factor Measure ........................ 128 7.5 Definition of the Work Factor. ...... 146 7.6 Other Factors............... 148 7.7 Summary................................ 150 VIII. EXPERIMENTS WITH FILE ENCIPHERING.............. 152 8.1 Introduction.......................... 152 8.2 General Description of the Experiment. 153 8.3 Detailed Description of the Experiment . 158 8.4 The Results.. 16 4 8.5 Analysis of the Results................176 8.6 Summary................................ 182 Page IX. SUMMARY AND SUGGESTIONS FOR FUTURE RESEARCH.................................... 183 9.1 Summary and Main Contributions........... 183 9.2 Points for Future Research........ 185 BIBLIOGRAPHY......................................... 187 APPENDIX A .......................................... 194 LIST OF TABLES Page Table 1 CLEAR......................................... 165 2 C A E S A R....................................... 166 3 V E R N A M ...................................... 167 4 NBS....... ................................... 168 5 PRVERNAM.................................... 169 6 FHOMOPHON.1.................................. 170 7 FHOMOPHON.2.................................. 171 LIST OF FIGURES Page Figure 1 Technical Safeguard and Data Security Risks............................ 1 2 A Portion of an Access Ma t r i x............... 30 3 The Levels Approach.................. 32 4 Multiple Physical Levels..................... 44 5 Spreading Protection Specifications and Mechanisms............................ 49 6 The Connection Between the Logical Data Base Level/ the Physical Data Base Level/ the Logical Records and the Physical Records.......................... 55 7 A "Set" Structure.................. .. 57 8 Access Paths.................... 59 9 Record Splitting............................. 61 10 Types of Cryptographic Transformations. 73 11
Recommended publications
  • 1. History of Cryptography Cryptography (From Greek , Hidden
    1. History of cryptography Cryptography (from Greek , hidden, and , writing), is the practice and study of secret writing(or hidden information). Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). History is filled with examples where people tried to keep information secret from adversaries. Kings and generals communicated with their troops using basic cryptographic methods to prevent the enemy from learning sensitive military information. In fact, Julius Caesar reportedly used a simple cipher, which has been named after him. As society has evolved, the need for more sophisticated methods of protecting data has increased. As the word becomes more connected, the demand for information and electronic services is growing, and with the increased demand comes increased dependency on electronic systems. Already the exchange of sensitive information, such as credit card numbers, over the internet is common practice. Protecting data and electronic system is crucial to our way of living. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. It is necessary to distinct cryptography, crypto analysis and cryptology. Cryptography is a branch of cryptology dealing with the design of system for encryption and decryption intended to ensure confidentiality, integrity and authenticity of message.
    [Show full text]
  • Evolution of Encryption Techniques and Data Security Mechanisms
    World Applied Sciences Journal 33 (10): 1597-1613, 2015 ISSN 1818-4952 © IDOSI Publications, 2015 DOI: 10.5829/idosi.wasj.2015.33.10.286 Evolution of Encryption Techniques and Data Security Mechanisms 12K. John Singh and R. Manimegalai 1School of Information Technology and Engineering, VIT University Vellore, Tamil Nadu, India 2Department of Computer Science and Engineering, Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India Abstract: Rapid advancements in information technology world resulted in the drastic growth in the amount of data transferred through the network. Networks used for multimedia communication do not provide much security for data transfer as well as digital communication. Billions of people use internet options for essential communication and as a tool for commercial interests. Therefore, security is an enormously important issue to deal with. As web services also have data storage and data communication, we need to protect and provide confidentiality. There is a need to recognize the different aspects of security and their applications. This paper provides a comprehensive overview of evolution of encryption algorithms right from ancient cryptography techniques to modern encryption algorithms. Key words: Confidentiality Authentication Substitution Cipher Enigma Rotor Hash Function INTRODUCTION security. More generally, cryptography is the science of privacy and is an ancient art. It is about constructing Before taking a deep dive into the ocean of and analysing the protocols that overcomes the authority cryptography. The cryptosystem or a cipher system of adversary and which are correlated with various conceals information from unintentional user [1]. aspects of information security such as data integrity, Cryptography is the science of creating that kind of non-repudiation and confidentiality and authentication cryptosystem where as cryptanalysis is the scientific art [2].
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • History of Cryptography and Cryptanalysis
    History Of Cryptography And Cryptanalysis Aleksandar Nikoli´c University of Novi Sad Faculty of Technical Sciences Chair of Informatics [email protected] April 11, 2013 Aleksandar Nikoli´c (FTN) History Of Cryptography April 11, 2013 1 / 32 Overview 1 Introduction 2 History 3 Cryptool 4 Ciphers - making and breaking Caesar’s cipher Simple substitution Vigen`ere Cipher One time pad Enigma machine 5 Conclusion Aleksandar Nikoli´c (FTN) History Of Cryptography April 11, 2013 2 / 32 Introduction What is cryptography? Cryptography is the (very) delicate science of keeping secrets secret. In the old days, cryptography’s sole purpose was to ensure secret communication between two parties. This was achieved by enciphering the message thus rendering it unintelligible to anyone but those who know the secret code. Today, cryptography is used virtually everywhere for all sorts of different purposes: authentication, digital signatures, digital currency, secure computation. Few historical ciphers shall be reviewed and their flaws exposed. Aleksandar Nikoli´c (FTN) History Of Cryptography April 11, 2013 3 / 32 Introduction Terminology Cryptography The science of keeping secrets secret. Cryptanalysis The art and science of breaking and deciphering secret codes. Cryptology Science, branch of mathematics, that includes both of the above. Aleksandar Nikoli´c (FTN) History Of Cryptography April 11, 2013 4 / 32 Introduction Terminology Plaintext Non-enciphered, readable message. Ciphertext Enciphered message, appears to be nonsensical. Encryption Process of turning plaintext into ciphertext. Decryption Reverse. Turning ciphertext into plaintext. Aleksandar Nikoli´c (FTN) History Of Cryptography April 11, 2013 5 / 32 Introduction Usual characters Explaining cryptographic schemes and protocols can sometimes be tricky.
    [Show full text]
  • A Brief History of Cryptography
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Supervised Undergraduate Student Research Chancellor’s Honors Program Projects and Creative Work Spring 5-2000 A Brief History of Cryptography William August Kotas University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_chanhonoproj Recommended Citation Kotas, William August, "A Brief History of Cryptography" (2000). Chancellor’s Honors Program Projects. https://trace.tennessee.edu/utk_chanhonoproj/398 This is brought to you for free and open access by the Supervised Undergraduate Student Research and Creative Work at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Chancellor’s Honors Program Projects by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. Appendix D- UNIVERSITY HONORS PROGRAM SENIOR PROJECT - APPROVAL Name: __ l1~Ui~-~-- A~5-~~± ---l(cl~-~ ---------------------- ColI e g e: _l~.:i~_~__ ~.:--...!j:.~~~ __ 0 epa r t men t: _ {~~.f_':.~::__ ~,:::..!._~_~_s,_ Fa c u 1ty Me n tor: ____Q-' _·__ ~~~~s..0_~_L __ D_~_ ~_o_~t _______________ _ PRO JE CT TITL E: ____~ __ ~c ~ :.f __ l1L~_ ~_I_x __ 9_( __( ~~- ~.t~~-.r--~~ - I have reviewed this completed senior honors thesis "\lith this student and certifv that it is a project commensurate with honors level undergraduate research in this field. Signed ~u:t2~--------------- , Facultv .'vfentor Date: --d~I-~--Q-------- Comments (Optional): A BRIEF HISTORY OF CRYPTOGRAPHY Prepared by William A. Kotas For Honors Students at the University of Tennessee May 5, 2000 ABSTRACT This paper presents an abbreviated history of cryptography.
    [Show full text]
  • History of Cryptography an EASY to UNDERSTAND HISTORY of CRYPTOGRAPHY Contents
    History of Cryptography AN EASY TO UNDERSTAND HISTORY OF CRYPTOGRAPHY Contents 1. Introduction 3 2. Classical Encryptions (Ancient Times) 4 3. Classical Encryptions (Middle Ages) 6 The Cipher of Mary Queen of Scots 6 Vigenère Ciphers 6 Uesugi Cipher 7 4. Modern Ciphers: Ciphers during World War I and the Emergence of Encryption Machines 8 German Communication Cables Disconnected by the United Kingdom 8 Zimmermann Telegram 8 ADFGVX Cipher 8 The Birth of Enigma 9 5. Modern Ciphers: Encryptions in the Computer and Internet Era 10 DES Cipher 10 Public-Key Cryptosystem 10 RSA Cipher 11 Decrypting the DES Cipher 12 Responsive Action of Cipher Enhancements for SSL 12 6. The Future of Encryption 13 7. Conclusion: Enhancing the Effectiveness of Encryptions used for SSL 14 References 14 © 2013 Thawte, Inc. All rights reserved. Thawte, the thawte logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Thawte, 2 Inc. and its subsidiaries and affi liates in the United States and in foreign countries. All other trademarks are property of their respective owners. 1. Introduction ncryption and related technologies are widely and frequently Eused as a means of ensuring that information is secure, and their importance has been growing with the increasingly wide- spread utilization of the Internet. The use of encryption can be traced to as far back as about 3000 B.C., during the Babylonian Era. Encryption technologies evolved as they were used in military and political settings, but as a result of the recent widespread use of the Internet and the dramatic increase in the amount of information people come into contact in their daily lives, the settings in which encryption technologies are applied and implemented have increased, and they are now used all around us in our daily lives.
    [Show full text]
  • Securing Record Communications: the TSEC/KW-26
    MKlein Brochure.qxd 04/13/2006 1:45 PM Page 1 Securing Record Communications: The TSEC/KW-26 Melville Klein Preface One of the missions of the National Security Agency (NSA) is to protect classified information whether in storage, processing, or transit. Collectively, information system security (INFOSEC) is the development and application of hardware, software, and doctrine. The “in transit” element, called communications security (COMSEC), assures that the underlying information is protected from external exploitation, disruption, or misrepresentation and is available only to authorized recipients. This brochure tells the cradle-to-grave story of highly successful cryptographic equipment for teletypewriter (TTY) communications, the TSEC/KW-26 and the people who developed, produced, and fielded it. (The italicized words are defined in the appended glossary.) Teletypewriter COMSEC The changes in communication technology leading up to the introduction of the KW-26 date back to 1907 with the introduction of the Start/Stop method of synchronizing printing telegraph equipment by Charles L. Krumm and his son, Howard Krumm. Until that time synchronous printing telegraph systems employed constant length codes, e.g., a five-element Baudot. However, these systems required very accurate means for maintaining synchronism between electromechanical transmitting and receiving instruments. “Start/Stop” overcame this drawback by resynchronizing at the start of each character, making it no longer necessary to accurately control the speed of the instruments. 1 MKlein Brochure.qxd 04/13/2006 1:45 PM Page 2 Each character was assigned a unique five-unit combination of “marks and spaces” preceded by a start element and followed by a stop element.
    [Show full text]
  • Cryptography
    Bastian | Planning & Pacing Guide UNIT 5: CRYPTOGRAPHY Estimated Time in Hours: 16-17 Big Idea(s) Enduring Understandings Projects & Major Assignments 2 Establishing Trust 2.1, 4.3, 7.2, 8.1 - Scytale & Caesar Cipher 4 Data Security - Caesar Cipher Program 7 Risk - Anagrams 8 Implications - Symmetric Ciphers - Steganography - Public Key Encryption & Digital Signatures - History & Politics of Public Key Encryption - Breakout Box Guiding Questions: • What are the ways in which data can be encrypted? • What actions can be taken to validate that data has been unaltered by an unauthorized source? Learning Objectives & Materials Instructional Activities and Classroom Assessments Respective Essential Knowledge Statements 2.1.1 LO: Students will evaluate • KWL Chart (find example Introduction to Cryptology: (1-day lesson) methods of keeping information KWL chart at This lesson introduces students to cryptography and the secret from those whom the https://www.timvandevall history of cryptography. information should be kept .com/templates/kwl- • Students begin with a pre-assessment using a KWL chart secret chart-template/ ) to identify what they know about cryptography. Students EK: 2.1.1c,d • “Cryptography: Crash then watch the Cryptography Video. Students take Course Computer Science Cornell notes on the video. Once the video is over, 4.3.1 LO: Students will define #33.” YouTube, uploaded students return to the KWL chart and add to it based on cryptography and explain how it by CrashCourse, 25 Oct what they have learned and what questions they still is used in data security. 2017, have. The class discusses the purpose of encryption, and EK: 4.3.1a,b,c,d,e,f,g,h,i https://www.youtube.c how it is necessary to ensure confidentiality and integrity.
    [Show full text]
  • 2. Classic Cryptography Methods 2.1. Spartan Scytale. One of the Oldest Known Examples Is the Spartan Scytale (Scytale /Skɪtəl
    2. Classic Cryptography Methods 2.1. Spartan scytale. One of the oldest known examples is the Spartan scytale (scytale /skɪtəli/, rhymes with Italy, a baton). From indirect evidence, the scytale was first mentioned by the Greek poet Archilochus who lived in the 7th century B.C. (over 2500 years ago). The ancient Greeks, and the Spartans in particular, are said to have used this cipher to communicate during military campaigns.Sender and recipient each had a cylinder (called a scytale) of exactly the same radius. The sender wound a narrow ribbon of parchment around his cylinder, then wrote on it lengthwise. After the ribbon is unwound, the writing could be read only by a person who had a cylinder of exactly the same circumference. The following table illustrate the idea. Imagine that each column wraps around the dowel one time, that is that the bottom of one column is followed by the top of the next column. Original message: Kill king tomorrow midnight Wrapped message: k i l l k i n g t o m o r r o w m i d n i g h t Encoded message: ktm ioi lmd lon kri irg noh gwt The key parameter in using the scytale encryption is the number of letters that can be recorded on one wrap ribbon around the dowel. Above the maximum was 3, since there are 3 rows in the wrapped meassage. The last row was padded with blank spaces before the message was encoded. We'll call this the wrap parameter. If you don't know the wrap parameter you cannot decode a message.
    [Show full text]
  • Part I History and Machines of Cryptography
    Part I History and machines of cryptography CHAPTER 14: MACHINES and HISTORY of CRYPTOGRAPHY MACHINES and HISTORY of CRYPTOGRAPHY IV054 1. History and machines of cryptography 2/78 PROLOGUE PROLOGUE IV054 1. History and machines of cryptography 3/78 WHAT to VALUE MORE As information becomes an increasingly valuable commodity, the encryption is the only way to protect our privacy and guarantee the success of the e-business. Some groups, for example businessmen and civil libertarians, require strong cryptography. The forces of law and order are pressing governments to restrict the use of cryptography. What to value more? Personal freedom? or the order and law? IV054 1. History and machines of cryptography 4/78 WHO are CODEBREAKERS The vision of codebreakers has changed through the history, depending on the tools used for encryption and cryptanalysis. Before computer era views; Codebreakers or cryptanalysts are linguistic alchemists, a mystical tribe attempting to conjure sensible words out of meaningless symbols. Current view: Codebreakers and cryptanalyst's are artists that can superbly use modern mathematics, informatics and computing super-technology. Three views of the history First World War was the war of chemists (deadly gases). Second World War was the war of physicists (atomic bombs) Third World War would be the war of informaticians (cryptographers and cryptanalysts). IV054 1. History and machines of cryptography 5/78 PERIODS of the HISTORY of CRYPTOGRAPHY Prehistory - before nontrivial machines period: till about 1930 - no electrical
    [Show full text]
  • A Brief History of Cryptography
    A Brief History of Cryptography Problems from the History of Mathematics Lecture 23 | April 27, 2018 Brown University Early Substitution Ciphers The earliest known ciphers are simple cases of what are now called monoalphabetic substitution ciphers. These include 1. The Atbash Cipher, designed for use with the Hebrew alphabet but extended to other ordered alphabets. One replaces each instance of the first letter with the last, etc: A B C D E F G ··· T U V W X Y Z Z Y X W V U T ··· G F E D C B A 2. The Caesar Cipher, named after Julius Caesar, encodes an alphabet by shifting each letter forward a fixed number1 of places: A B C D E F G ··· T U V W X Y Z D E F G H I J ··· W X Y Z A C C 1Classically, 3. 1 General Monoalphabetic Substitution Ciphers In general, monoalphabetic substitution cipher are keyed by a choice of permutation of the letters in the alphabet. This may seem secure, since there are 26! ≈ 1061 permutations of fA,...,Zg to test in a brute force attack. This assumption was proven false by Al-Kindi (c. 800), who pioneered the use of frequency analysis in cryptanalysis. Monoalphabetic ciphers are now longer used in serious cryptography, but they endure as popular puzzles and are a mainstay of newspapers.2 2Eg. Cryptoquip. 2 English Letter Frequencies The following figure plots the relative frequencies of the letters A-Z in Madame Bovary (blue) and Moby Dick (orange): 0.14 0.12 0.10 0.08 0.06 0.04 0.02 5 10 15 20 25 3 Polyalphabetic Ciphers The next iteration of ciphers are now known as polyalphabetic ciphers.
    [Show full text]
  • An Introduction to Cryptography
    An Introduction to Cryptography Gianluigi Me [email protected] Anno Accademico 2011/12 Overview History of Cryptography (and Steganography) Modern Encryption and Decryption Principles Symmetric Key Cryptography Stream Ciphers and Cipher Block Modes Key Management for Conventional Cryptography Attack on Bad Implementation of Cryptography: IEEE 802.11 WEP Message Authentication Public Key Cryptography Digital Signatures Key Management for Public-Key Cryptography Main sources Network Security Essential / Stallings Applied Cryptography / Schneier Handbook of Applied Cryptography / Menezes, van Oorschot, Vanstone Innovative Cryptography, N. Moldovyan , A.Moldovyan Modern Cryptography: Theory and Practice, Wenbo Mao History of Steganography and Cryptography Steganography Steganography Steganos = “covered” in Greek, Graphein = “to write” Being able to communicate secretly has always been considered an advantage Secret messages were often not written down, but rather memorized by sworn messengers Or hidden Demaratus, a Greek immigrant to Persia, reveals Persia’s intention to attack Athens. Writes the secret message on a tablet, and covers it with wax. Histaiaeus encourages Aristagoras of Miletus to revolt against the Persian King. Writes message on shaved head of the messenger, and sends him after his hair grew Chinese wrote on silk, turned into wax-covered ball that was swallowed by the messenger Steganography (cont.) Invisible Ink Certain organic fluids are transparent when dried but the deposit can be charred
    [Show full text]