Evolving Keys for Periodic Polyalphabetic Ciphers

Total Page:16

File Type:pdf, Size:1020Kb

Evolving Keys for Periodic Polyalphabetic Ciphers Evolving Keys for Periodic Polyalphabetic Ciphers Ralph Morelli and Ralph Walde Computer Science Department Trinity College Hartford, CT 06106 [email protected] Abstract recover increasingly longer portions of the key. As described more fully in the discussion, our results compare favorably A genetic algorithm is used to find the keys of Type to other approaches reported in the literature. II periodic polyalphabetic ciphers with mixed primary alphabets. Because of the difficulty of the ciphertext only cryptanalysis for Type II ciphers, a multi-phased Polyalphabetic Ciphers search strategy is used, each phase of which recovers a Following (King 1994), a polyalphabetic cipher can be de- bigger portion of the key. fined as follows. Given d cipher alphabets C1 ...Cd, let gi : A → Ci be a mapping from the plaintext alphabet A to th Introduction the i cipher alphabet Ci(1 ≤ i ≤ d). A plaintext message M = m . m m . m ... is enciphered by repeat- A periodic polyalphabetic cipher with period d encrypts a 1 d d+1 2d ing the sequence of mappings g1, . , gd every d characters, plaintext message into ciphertext by replacing each plaintext giving letter with a letter from one of d substitution alphabets. The d alphabets are typically selected from a sequence of related alphabets that is repeated as often as necessary to encrypt E(M) = g1(m1) . gd(md)g1(md+1) . gd(m2d) ... (1) the message. Although in the most general case the cipher alphabets are In polyalphabetic encryption a message is broken into d completely unrelated, in many classical polyalphabetic ci- columns, each encrypted by a different alphabet. The longer phers the alternative alphabets C , ..., C are shifted ver- the period, d—the more alphabets used–the more difficult it 2 d sions of the mixed primary cipher alphabet, C . Thus, in is to unscramble the message. 1 addition to the mixed primary alphabet, C , a second key, Ciphertext only cryptanalysis is the process of recovering 1 the shift keyword, is used to specify both the period and the the plaintext directly from the ciphertext message without shifts used to generate the other cipher alphabets, with ’a’ access to the message key. The search space for this type of representing a shift of 0, ’b’ a shift of 1, and so on.1 problem is much too large for brute force approaches. For In shifted polyalphabetic ciphers, the alternative alphabets a polyalphabetic cipher with a 26-letter alphabet and period are derived by performing a shift modulo 26 on each letter d the key space contains 26! × 26d−1 possible keys. That of the mixed primary alphabet. In the following example, gives approximately 1032 keys for a period of length 5 and the second alphabet is derived form the first by shifting each 1053 keys for a period of length 20. of its letters by one modulo 26: Several studies have used the genetic algorithm (GA) suc- cessfully in ciphertext only cryptanalysis (Clark and Daw- zerosumgabcdfhijklnpqtvwxy son 1997, Matthews 1993, Morelli, Walde and Servos 2004, afsptvnhbcdegijklmoqruwxyz Morelli and Walde 2003, Spillman 1993 and Spillman, In this case the primary alphabet is a simple substitution al- Janssen and Nelson 1993). Delman (2004) provides a recent phabet generated from the primary keyword zerosumgame. study that compares various efforts to apply GAs cryptogra- Thus, a polyalphabetic cipher with shifted alphabets en- phy. GA approaches evolve the message key(s) by repeat- cryption can be represented as the composition, or product, edly decrypting the message and measuring how close the of two operations: a substitution step, to create the mixed resulting text is to plaintext. primary alphabet, and a shift step, to derive a secondary For polyalphabetic ciphers, the search is made more diffi- alphabets. Substitution involves replacing a plaintext letter cult by the fact that each letter in two-letter (bigram), three- letter (trigram), or four-letter (tetragram) sequences is en- 1This type of cipher, which is sometimes called a double-key crypted from a different alphabet. In this study, we show cipher, was first introduced in the 15th century by Alberti and ex- that a collection of GAs working in parallel can be used to tended with contributions by Trithemius, Belaso, Porta, and Vi- genere. Such ciphers have been well studied, both from an histor- Copyright c 2006, American Association for Artificial Intelli- ical perspective (Kahn 1967, Bauer 1997) and as the basis behind gence (www.aaai.org). All rights reserved. secure, contemporary ciphers (Rubin 1995). 445 with the corresponding letter from the mixed primary alpha- E C:rosumgabcdfhijklnpqtvwxyze bet. The shift step involves shifting a letter by an arbitrary Y. amount (modulo 26). S:npqtvwxyzerosumgabcdfhijkl The order of these operations is significant and leads to Y:xyzerosumgabcdfhijklnpqtvw two different ciphers known as Type I and Type II (Gaines M:fhijklnpqtvwxyzerosumgabcd 1939). In Type I, where substitution is performed first, the . Z:yzerosumgabcdfhijklnpqtvwx encryption and decryption operations can be represented as: To encrypt “the” using the shift keyword SYMBOL, we would select the corresponding letters from the S, Y, and M cj = gi(mj) = (C1(mj) + ki)(mod26) (2) rows, giving “duk”. This is equivalent to taking a letter, say −1 −1 ’t’, shifting it by, say s, giving ’l’, and replacing the result mj = gi (cj) = C1 ((cj + 26 − ki)(mod26)) (3) with the corresponding letter from the C1 alphabet, giving where C1(mj) represents substitution of the jth plaintext ’d’. character, mj, from the primary cipher alphabet C1 and ki represents the shift of the resulting ciphertext letter. In de- Index of Coincidence cryption the inverse operations are applied. Type II ciphers are much more difficult to analyze than Type In Type II the shift step is performed before substitution, I. To show this it is necessary to describe the Index of Coin- leading to the following encryption and decryption opera- cidence. The IC is a measure used to distinguish text that has tions: been encrypted with a polyalphabetic cipher from plaintext or from text that was encrypted with a single alphabet. First c = g (m ) = C ((m + k )(mod26)) (4) described by (Friedman 1920), the IC is the probability that j i j 1 j i two symbols chosen at random from a text will be equiva- −1 −1 mj = gi (cj) = (C1 (cj) + 26 − ki)(mod26) (5) lent. For a text of length N written in the standard alphabet, A...Z, where f represents character frequencies, the IC is A familiar way to represent a set of shifted alphabets is to use expressed as: a Vigenere tableau, in which the mixed primary alphabet, C1, is placed in the first row and alternative alphabets are placed in successive rows. The following table corresponds fi(fi−1) IC = Pi=A,Z (6) to a Type I cipher: N(N−1). Plaintext As Friedman showed, the IC value for English plaintext and ABCDEFGHIJKLMNOPQRSTUVWXYZ for a simple substitution cipher will be around 0.066. Text A:zerosumgabcdfhijklnpqtvwxy encrypted by a polyalphabetic substitution cipher would K B:afsptvnhbcdegijklmoqruwxyz have an IC value less than 0.066 depending on the number E C:bgtquwoicdefhjklmnprsvxyza of alphabets used. Polyalphabetics with periods greater than Y . Ciphertext 10 would have IC values that approach 0.038. Z:ydqnrtlfzabceghijkmopsuvwx The rows of the table represent the shifted alphabets. For Finding the Period example, the shift keyword SYMBOL would select the fol- Regardless of whether Type I or Type II encryption was used lowing alphabets from the above table: in creating a ciphertext, the IC can be used to find the ci- Plaintext pher’s period by performing an exhaustive search on each ABCDEFGHIJKLMNOPQRSTUVWXYZ possible period from 1 to some maximum length. For each S:rwjgkmeystuvxzabcdfhilnopq possible period, di, the plaintext is broken into di columns Y:xcpmqskeyzabdfghijlnortuvw and the IC is computed for each column. If di is the cor- K M:lqdaegysmnoprtuvwxzbcfhijk rect period, the average IC of the di columns will be close to E B:afsptvnhbcdegijklmoqruwxyz 0.066. If none of the values get close enough to 0.066, we Y O:nsfcgiauopqrtvwxyzbdehjklm take the di associated with the highest IC value. While this L:kpczdfxrlmnoqstuvwyabeghij algorithm is not guaranteed to find the correct period, we To encrypt the word “the” using the above table, we re- found it to be successful in nearly 100 percent of the cases. place ’t’ with its corresponding letter from the S alphabet. This is equivalent to replacing ’t’ by ’p’ from the mixed pri- Type I versus Type II Cryptanalysis mary alphabet and then shifting ’p’ by s places (modulo 26). Once the cipher’s period is known, cryptanalysis of a Type In either case, ’t’ is encrypted as ’h’. The word “the” would I cipher is very straightforward. Consider the following de- be encrypted as “hee.” piction of Type I encryption (substitution then shift): The table corresponding to a Type II cipher would be rep- resented as follows: 1 2 P0.066 ⇒ C0.066 → C0.038 (7) Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ When plaintext P, which has an IC of 0.066, is replaced by A:zerosumgabcdfhijklnpqtvwxy substitution (⇒) from the mixed primary alphabet, the re- K B:erosumgabcdfhijklnpqtvwxyz sulting ciphertext, C1, will have an IC value approximately 446 equal to plaintext (IC ≈ 0.066). When the ciphertext Thus, once the correct period is found, we perform GA is then shifted (→), resulting in a new ciphertext, C2, its search on two, then three, then four adjacent columns of ci- IC value will be characteristic of a polyalphabetic cipher phertext. At each phase we generate a partial decryption of (IC ≈ 0.038). the columns by composing the shift and substitution steps Given this characterization of a Type I cipher, it is easy to (← + ⇐).
Recommended publications
  • FROM JULIUS CAESAR to the BLOCKCHAIN: a BRIEF HISTORY of CRYPTOGRAPHY by Côme JEAN JARRY & Romain ROUPHAEL, Cofounders of BELEM
    Corporate identity in the digital era #9 JANUARY 2017 FROM JULIUS CAESAR TO THE BLOCKCHAIN: A BRIEF HISTORY OF CRYPTOGRAPHY By Côme JEAN JARRY & Romain ROUPHAEL, cofounders of BELEM 22 The world’s most important asset is information. Now message was inscribed lengthwise. Once the parchment more than ever. With computer theft and hacking was unrolled, the letters of the message were mixed becoming a common threat, protecting information up and the message meaningless. The receiver would is crucial to ensure a trusted global economy. need an identical stick to decipher the text. The E-commerce, online banking, social networking or scytale transposition cipher relied on changing the emailing, online medical results checking, all our order of the letters, rather than the letters themselves. transactions made across digital networks and This cryptographic technique still prevails today. insecure channels of communication, such as the Internet, mobile phones or ATMs, are subjected to vulnerabilities. Our best answer is cryptography. And THE ART OF SUBSTITUTION it has always been. As a science and as an art, it is Julius Caesar was also known to use encryption to an essential way to protect communication. convey messages to his army generals posted in the Cryptography goes back to older times, as far back as war front. The Caesar cipher is a simple substitution the Ancient World. cipher in which each letter of the plaintext is rotated left or right by some number of positions down the alphabet. The receiver of the message would then Early cryptography was solely concerned with shift the letters back by the same number of positions concealing and protecting messages.
    [Show full text]
  • Slippery Hill-Climbing Technique for Ciphertext-Only Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers
    Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding [email protected] 2019-06-17 to appear in Cryptologia We present a stochastic method for breaking general periodic polyalphabetic substitution ciphers using only the ciphertext and without using any additional constraints that might come from the cipher’s structure. The method employs a hill-climbing algorithm for individual key alphabets, with occasional slipping down the hill. We implement the method with a computer and achieve reliable results for a sufficiently long ciphertext (150 characters per key alphabet). Because no constraints among the key alphabets are used, this method applies to any periodic polyalphabetic substitution cipher. Keywords: periodic polyalphabetic substitution cipher, hill-climbing, slippery hill-climbing, cryptanalysis, Vigenère, Quagmire In a monoalphabetic substitution cipher, each character of the plaintext is encrypted by the same bijective mapping between the standard alphabet (A...Z) and the key alphabet. The key alphabet is simply a permutation of the standard one. A stochastic ciphertext-only attack on the monoalphabetic substitution cipher (Jakobsen 1995) generates a “child” key from a “parent” key by swapping randomly chosen elements. The child replaces the parent if the fitness of the decrypted text improves over its predecessor, where fitness is a measure of how close a text resembles a particular language. This continues until no improvement is seen for a large number of child candidates. The periodic polyalphabetic substitution cipher is a generalization of the monoalphabetic cipher in which there are several key alphabets. During encryption, the choice of key alphabet cycles through them, where the choice of key is given by the position in the text modulo the number of keys.
    [Show full text]
  • Substitution Ciphers
    Foundations of Computer Security Lecture 40: Substitution Ciphers Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 40: 1 Substitution Ciphers Substitution Ciphers A substitution cipher is one in which each symbol of the plaintext is exchanged for another symbol. If this is done uniformly this is called a monoalphabetic cipher or simple substitution cipher. If different substitutions are made depending on where in the plaintext the symbol occurs, this is called a polyalphabetic substitution. Lecture 40: 2 Substitution Ciphers Simple Substitution A simple substitution cipher is an injection (1-1 mapping) of the alphabet into itself or another alphabet. What is the key? A simple substitution is breakable; we could try all k! mappings from the plaintext to ciphertext alphabets. That’s usually not necessary. Redundancies in the plaintext (letter frequencies, digrams, etc.) are reflected in the ciphertext. Not all substitution ciphers are simple substitution ciphers. Lecture 40: 3 Substitution Ciphers Caesar Cipher The Caesar Cipher is a monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed “distance” away in the alphabet. For example, A is replaced by C, B by D, ..., Y by A, Z by B, etc. What is the key? What is the size of the keyspace? Is the algorithm strong? Lecture 40: 4 Substitution Ciphers Vigen`ere Cipher The Vigen`ere Cipher is an example of a polyalphabetic cipher, sometimes called a running key cipher because the key is another text. Start with a key string: “monitors to go to the bathroom” and a plaintext to encrypt: “four score and seven years ago.” Align the two texts, possibly removing spaces: plaintext: fours corea ndsev enyea rsago key: monit orsto gotot hebat hroom ciphertext: rcizl qfkxo trlso lrzet yjoua Then use the letter pairs to look up an encryption in a table (called a Vigen`ere Tableau or tabula recta).
    [Show full text]
  • A Comparative Study of Classical Substitution Ciphers
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 9, September- 2014 A Comparative Study of Classical Substitution Ciphers Anjlee Verma Navjot Kaur School of Computer Engineering Department of CSE/IT Lovely Professional University CGC Jhanjeri Phagwara, Punjab Mohali, Punjab Abstract— with the rapid development in the technology, the Cryptography (also known as cryptology) is a study and call for security has also raised its pitch and Information practice of hiding information. It is the technique in which a Security has become an important issue during last decades. piece of raw data is taken, scrambled into gibberish Cryptography; emerged as a solution; has reserved its mathematically, yet allowing for decrypting back into the unvanquishable place in the field of security. The principle original plain data. In other words, we can say that it is an art objective guiding the design of any cryptographic algorithm of manipulating messages so that they become more secure. It must be the security it provides against unauthorized attack. consists of processes of encoding and decoding. But, the performance and cost implementation of the algorithms Cryptography includes the techniques for creating various are also those factors which we cannot ignore. So, there is systems, procedures or algorithms for secret writing. Whereas always a deemed necessity to analyze, standardize and represent cryptanalysis consists of the techniques of breaking them.[2] these algorithms to the future researchers and struggling
    [Show full text]
  • Simple Ciphers
    Swenson c02.tex V3 - 01/29/2008 1:07pm Page 1 CHAPTER 1 Simple Ciphers As long as there has been communication, there has been an interest in keeping some of this information confidential. As written messages became more widespread, especially over distances, people learned how susceptible this particular medium is to being somehow compromised: The messages can be easily intercepted, read, destroyed, or modified. Some protective methods were employed, such as sealing a message with a wax seal, which serves to show the communicating parties that the message is genuine and had not been intercepted. This, however, did nothing to actually conceal the contents. This chapter explores some of the simplest methods for obfuscating the contents of communications. Any piece of written communication has some set of symbols that constitute allowed constructs, typically, words, syllables, or other meaningful ideas. Some of the simple methods first used involved simply manipulating this symbol set, which the cryptologic community often calls an alphabet regardless of the origin of the language. Other older tricks involved jumbling up the ordering of the presentation of these symbols. Many of these techniques were in regular use up until a little more than a century ago; it is interesting to note that even though these techniques aren’t sophisticated,COPYRIGHTED newspapers often publish MATERIAL puzzles called cryptograms or cryptoquips employing these cryptographic techniques for readers to solve. Many books have been published that cover the use, history, and cryptanal- ysis of simple substitution and transposition ciphers, which we discuss in this chapter. (For example, some of the resources for this chapter are References [2] and [4].) This chapter is not meant to replace a rigorous study of these techniques, such as is contained in many of these books, but merely to expose the reader to the contrast between older methods of cryptanalysis and newer methods.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Polyalphabetic Ciphers
    POLYALPHABETIC CIPHERS MTH 440 Monoalphabetic ciphers • Our examples of the permutation, shift, decimation, and affine ciphers were monoalphabetic ciphers, that is every letter was replaced by the same letter each time. • Hv ufe fh kar karvedrh vu pfkarpfkdlh fer fivnk erfmdkz, karz fer svk lrekfds; hv ufe fh karz fer lrekfds, karz fer svk fivnk erfmdkz. – Fmirek Rdshkrds. • In a decimation cipher A always represents itself • Even a random substitution cipher with 26! ~ 4 x 1026 different possible “keys” is easy to solve with a simple frequency analysis (given enough ciphertext) Polyalphabetic ciphers • In a polyalphabetic cipher, multiple “alphabets” are used to encipher. • If two letters are the same in the ciphertext it does not mean they must decipher to the same plaintext letter. Vigenere cipher - codeword KEY: K E Y K E Y E PLAIN: T R Y T H I S D Vigenere Cipher - codeword KEY: K E Y K E Y E PLAIN: T R Y T H I S D D V W D L G W Finish enciphering (problem 1) Vigenere - decipher KEY: K E Y Cipherext D A M T T W O Finish deciphering (problem 2) Polyalphabetic ciphers BYIRL BFMVG SXFEJ FJLXA MSVZI QHENK FIFCY JJRIF SEXRV CICDT EITHC BQVXS GWEXF PZHHT JGSPL HUHRP FDBPX NLMFV TFMIG RBZJT XIGHT JDAMW VMSFX LHFMS UXSDG EZDIE PCZLK LISCI JIWSI HTJVE VWVFM VWISO DFKIE QRQVL EPVHM YZSRW CIMZG LWVQQ RAWRT ZFKYV HOZIF JRDHG WVWKR RQSKM XOSFM VQEGS OJEXV HGBJT XXRHT JFTMQ WASJS JPOZP ZRHUS CZZVI VHTFK XLHME MFYPG RQHCE VHHTJ TEYVS EBYMG KWYUV PXKSY YFXLH GQURV EWWAS The frequency analysis of a polyalphabetic cipher looks different than plaintext or monoalphabetic analyses.
    [Show full text]
  • Cryptography
    CS 419: Computer Security Week 6: Cryptography © 2020 Paul Krzyzanowski. No part of this Paul Krzyzanowski content, may be reproduced or reposted in whole or in part in any manner without the permission of the copyright owner. cryptography κρυπός γραφία hidden writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 2 cryptanalysis κρυπός ἀνάλυσις hidden action of loosing, solution of a problem, undo The analysis and decryption of encrypted text or information without prior knowledge of the keys. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 3 cryptology κρυπός λογια hidden speaking (knowledge) 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 4 Cryptography ¹ Security Cryptography may be a component of a secure system Just adding cryptography may not make a system secure October 16, 2020 CS 419 © 2020 Paul Krzyzanowski 5 Cryptography: what is it good for? • Confidentiality – Others cannot read contents of the message • Authentication – Determine origin of message • Integrity – Verify that message has not been modified • Nonrepudiation – Sender should not be able to falsely deny that a message was sent October 16, 2020 CS
    [Show full text]
  • Substitution Cipher in Cryptography, a Substitution Cipher Is a Method Of
    Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Substitution ciphers can be compared with transposition ciphers. In a transposition cipher, the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged. By contrast, in a substitution cipher, the units of the plaintext are retained in the same sequence in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext and vice-versa. Contents • 1 Simple substitution o 1.1 Examples o 1.2 Security for simple substitution ciphers • 2 Homophonic substitution • 3 Polyalphabetic substitution • 4 Polygraphic substitution • 5 Mechanical substitution ciphers • 6 The one-time pad • 7 Substitution in modern cryptography • 8 Substitution ciphers in popular culture Simple substitution 1 ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps.
    [Show full text]
  • New Polyalphabetic Substitution Scheme for Secure Communication
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9 Issue-3, January 2020 New Polyalphabetic Substitution Scheme for Secure Communication Ranju S. Kartha, Varghese Paul The main term Cryptology is the science and secret Abstract: The internet is a very powerful and useful tool for communications involving both Cryptography and communication, information and connectivity. So it is very Cryptanalysis. Cryptography is the technology that used for important to keep yourself safe and secure online. The best way of transmitting messages to make them secure and immune to secure information is encryption; there are many cryptographic algorithms available for encryption. These cryptographic attack. Cryptanalysis deals with study and analysis of algorithms are classified according to their encrypting process; as breaking the secrecy of the message with or without knowing substitution cipher or transposition cipher. In Polyalphabetic the key. Confidentiality, Integrity and Availability are the ciphers, the substitution rule changes continuously from main goals of cryptography. Cryptographic algorithms are to character to character according to the keyword and plaintext. be designed to achieve the above goals. Cryptographic Vigenere cipher is considered to be the most efficient algorithms rely on a secret piece of information which is Polyalphabetic substitution cipher. But it is vulnerable to attacks, due to its repeating nature of the keyword. To overcome this known as secret key. The algorithm is known to everyone that vulnerability, here we are presenting a new Polyalphabetic exists in public domain but the secret key which is only known substitution scheme which uses infinite number of 26 x 26 to the authorized persons.
    [Show full text]
  • Space of Polyalphabetic Substitution Ciphers 89
    The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008 87 Applying Genetic Algorithms for Searching Key- Space of Polyalphabetic Substitution Ciphers Ragheb Toemeh 1 and Subbanagounder Arumugam 2 1Department of Computer Science and Engineering, Government College of Technology, India 2Directorate of Technical Education, India Abstract: In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption scheme is studied. In Vigenere cipher, g uessing the key size is done by applying Genetic Algorithm. The frequency analysis is used as an essential factor in objective function. Keywords: Polyalphabetic cipher, Vigenere cipher, genetic algorithm . Received May 27, 2006; Accepted August 5, 2006 1. Introduction Cryptanalysis is the process of attempting to recover the plaintext and /or key from a ciphertext. In the Brute Force attack the attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained; it has the disadvantage of high computational complexity. In order to overcome this drawback, the optimization heuristics techniques like Genetic Algorithm (GA) are used. The possibility of Figure 1. Relative Character Frequencies from Great Expectations using a random type search to break a cipher is (1860-1861). explored. The focus of this work is on the use of a GA to conduct a directed random search of a key space and 2. Genetic Algorithms to guess the key size. In 1863, a prussian major named Kasiski proposed a method for breaking a Vigenere A GA is general method of solving problems to which cipher that consisted of finding the length of the no satisfactory, obvious, solution exists.
    [Show full text]
  • Comparison Between the Types of Substitute Ciphers Jemima Abraham1, Siddharth Nanda2, Rajeshwari Gundla3 1U.G
    IJRECE VOL. 7 ISSUE 2 (APRIL- JUNE 2019) ISSN: 2393-9028 (PRINT) | ISSN: 2348-2281 (ONLINE) Comparison between the types of Substitute Ciphers Jemima Abraham1, Siddharth Nanda2, Rajeshwari Gundla3 1U.G. Student, 2Faculty, 3Senior Faculty SOE, ADYPU, Lohegaon, Pune, Maharashtra, India1 IT, iNurture, Bengaluru, India2,3 Abstract - Cryptography is an art of converting critical Encryption Algorithm: Process of converting from plain information into un-understandable data so that any text to cipher text. unauthenticated person may not get hold of the sensitive Decryption Algorithm: Process of converting cipher text to data [2].Substitute cipher is one such technique which plain text. replaces one symbol with another. In substitute cipher each Key: It is the algorithm used to encrypt and decrypt the letter has a corresponding fixed alphabet that is substituted data. to get the plain text [1]. There is a variety of methods used in substituting. In this paper the comparison between the different types of substitute cipher is studied. This comparison will help in understanding which cipher is highly used, secured and difficult to crack. Figure 1: Simple Cryptosystem Keywords - Cipher, cryptanalyst, plain text, encryption, decryption, techniques, keys, substitute, Monoalphabetic, Symmetric & Asymmetric Encryption Algorithm: There Polyalphabetic. are two main methods by which encryption algorithm can be classified: I. INTRODUCTION Symmetric Key Cryptography Today’s most challenging issue is data security that affects Asymmetric Key Cryptography all aspects of our day-to-day lives especially communication. However, by introducing cryptography Symmetric Key is also known as a private or secret key [7]. techniques, many problems related to integrity, In this, the same key is used for both encrypting and confidentiality, availability, authentication and authorization decrypting the message.
    [Show full text]