Finishing Polyalphabetics & Demonstrating Transpositions

Total Page:16

File Type:pdf, Size:1020Kb

Finishing Polyalphabetics & Demonstrating Transpositions Finishing polyalphabetics & demonstrating transpositions Recorded lecture for 4/6/20 CS 330 Polyalphabetics & Transpositions HW is out • Due Wednesday night • Write C program to count letter frequencies in English text (ciphertext or plaintext) CS 330 Polyalphabetics & Transpositions Recall: Vigenère Cipher • write the keyword repeatedly (identifies column) • write the plaintext out (identifies row) • Encrypt each letter by writing the value at that row and column key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ CS 330 Polyalphabetics & Transpositions Recall: Finding the key length using sorted frequencies CS 330 Polyalphabetics & Transpositions 51 CS 330 Polyalphabetics & Transpositions 52 Finding the key length, Part two • we can quantify this by noticing that the best coset signature curves are generally those that are as low as possible on the left and as high as possible on the right. • we can measure this tendency by finding the difference between the area under the curve for the top half (from 14 to 26), minus the area of the curve for the bottom half (from 1 to 13), called Vj CS 330 Polyalphabetics & Transpositions 53 Finding the key length, Part two • The average (Ai) of these differences for all the cosets for a suggested key length L, gives us a value which measures how close we are to the signature of English. • The local maximum of these values for all numbers of coset values is the likely key length. CS 330 Polyalphabetics & Transpositions 54 Algorithm for finding key length: 1. read in the text and the maximum key length to try 2. for every L from 1 to the max key length do 3. break up the text into L cosets 4. compute the frequency counts for each coset 5. compute the frequency values (divide by length of each coset) 6. sort the frequency values 7. compute the Vi’s for each of the L cosets 8. compute the average (the Aj’s) of the Vi’s for each coset 9. find a place where an Aj is a local maximum. That’s a likely key length. CS 330 Polyalphabetics & Transpositions 55 CS 330 Polyalphabetics & Transpositions Finding the key, Part one • Now that you know the key length, you can find the key. • First, remember that each of the cosets contains letters that were encrypted with the same cipher alphabet • So that each of them is a monoalphabetic substitution CS 330 Polyalphabetics & Transpositions 57 Finding the key, Part one • And that with a Vigenere, the substitution alphabets are all shifted (Caesar) alphabets • And that each of the cosets will then have a graph that is close to a shifted graph of the English signature. • So, if you find the shifted graph that is closest to the English signature graph, you’ve found a key letter in the keyword. CS 330 Polyalphabetics & Transpositions 58 The English Scrawl... CS 330 Polyalphabetics & Transpositions The scrawl… CS 330 Polyalphabetics & Transpositions 60 Finding the key, Part two • So to quantify this… • One way to look at the scrawl of each coset and the signature of English is that graphically we’re trying to make them parallel to each other. – (so that each scrawl value is identical to a signature value or a multiple of it.) • How can we quantify this idea of ‘parallel’? CS 330 Polyalphabetics & Transpositions 61 Stealing from linear algebra • Vector CS 330 Polyalphabetics & Transpositions 62 Stealing from linear algebra • Vector • Dot product CS 330 Polyalphabetics & Transpositions 63 Stealing from linear algebra • Vector • Dot product • Vector magnitude CS 330 Polyalphabetics & Transpositions 64 Stealing from linear algebra • Vector • Dot product • Vector magnitude • Cauchy-Schwarz Inequality: a • b <= ||a|| ||b|| and a • b == ||a|| ||b|| iff a and b are parallel CS 330 Polyalphabetics & Transpositions 65 Stealing from linear algebra • Vector • Dot product • Vector magnitude • Cauchy-Schwarz Inequality: a • b <= ||a|| ||b|| and a • b == ||a|| ||b|| iff a and b are parallel the largest dot product is the closest to the product of the magnitudes, and the closest to parallel CS 330 Polyalphabetics & Transpositions 66 Algorithm for key letters 1. read in the text and the value for the length of the key - L 2. divide the text into L cosets 3. count the letter occurrences in each coset 4. compute the letter frequencies in each coset 5. for each coset j 1. compute the 26 shifted lists for this coset and their dot product with b, the standard frequencies of English 2. find the index of the max dot product value over the 26 dot products; that is where the key letter is in the alphabet CS 330 Polyalphabetics & Transpositions 67 • To cryptanalyze a (possible) To summarize… polyalphabetic cipher: – do a frequency analysis and look at the relative frequencies – The best way today is to use the Barr-Samoson technique to find the key length and the key itself, and, just to be safe… • compute the index of coincidence to get a guess, N, of how many alphabets there might be, or use the key length signature algorithm. • try separating the ciphertext into the N separate texts and do a frequency analysis of each them. Compute the IC for each to see if it matches your guess (it should be near .066) or use the scrawl algorithm. • Use Kasiski. Look for confirmation by finding repeated ciphertext at intervals that match the IC or a multiple of the IC. – cryptanalyze each of the monoalphabets to find the key. 69 CS 330 Polyalphabetics & Transpositions So how secure is Vigenere? • Well, from 1586 till 1863 it was pretty unbreakable. • Now, it’s chump change…. – useful for short messages that don’t need to be secure for very long. 70 CS 330 Polyalphabetics & Transpositions So how secure is Vigenere? • Well, from 1586 till 1863 it was pretty unbreakable. • Now, it’s chump change…. – useful for short messages that don’t need to be secure for very long. • So what’s next??? – it seems like we’re running out of ways to make substitution ciphers secure… – It’s that pesky key length thing… 71 CS 330 Polyalphabetics & Transpositions Autokey Cipher • Ideally we want a key as long as the message 72 CS 330 Polyalphabetics & Transpositions Autokey Cipher • Ideally we want a key as long as the message • Vigenère proposed the autokey cipher – where the keyword is prefixed to the message as the initial key – then use the message itself as the rest of the key • eg. given key deceptive key: deceptivewearediscoveredsav plain: wearediscoveredsaveyourself cipher: ZICVTWQNGKZEIIGASXSTSLVVWLA 73 CS 330 Polyalphabetics & Transpositions Transposition Ciphers • Transpositions re-arrange the original plaintext to create the ciphertext. • Two usual types – a complete columnar transposition – an incomplete columnar transposition • Other types exist including – route transposition – rail-fence ciphers 75 CS 330 Polyalphabetics & Transpositions Complete Columnar Transposition – the message can be written as an n x m table of letters (some dummy letters may need to be added to fill out the table) – message is written row-by-row – then is read off column-by-column using a key to pick the columns. – the key is either a word (so you pick the columns off in alphabetical order) – or a number (and you pick the columns off in ascending order) 76 CS 330 Polyalphabetics & Transpositions plaintext: Laser beams can be modulated to carry more intelligence than radio waves key: SORCERY S O R C E R Y 6 3 4 1 2 5 7 L A S E R B E A M S C A N B E M O D U L A T E D T O C A R R Y M O R E I N T E L L I G E N C E T H A N R A D I O W A V E S X X ECDTM ECAER AUOOL EDSAM MERNE NASSO DYTNR VBNLC RLTIX LAETR IGAWE BAAEI HOX 77 CS 330 Polyalphabetics & Transpositions Incomplete Columnar Transposition – same as complete, but you don’t include the dummy letters so some columns are shorter than others. – harder to decipher because of the irregular length of the columns. 78 CS 330 Polyalphabetics & Transpositions HOLMES HAD BEEN SEATED FOR SOME HOURS IN SILENCE Length of text is 40 Key is CRYPT Pull columns off in the order: 1 4 2 5 3 1 2 3 4 5 H O L M E S H A D B Transposition E E N S E - Example 2 A T E D F O R S O M E H O U R S I N S I L E N C E Cipher is: HSEAO ESLMD SDOUS COHET RHIEE BEFMR IELAN ESONN CS 330 Polyalphabetics & Transpositions 79 HOLMES HAD BEEN SEATED FOR SOME HOURS IN SILENCE Length of text is 40 Key is HOLMES Pull Columns off in the order: 5 1 3 4 2 6 1 2 3 4 5 6 H O L M E S Downside here is H A D B E E that you’re fooled into thinking it’s a N S E A T E comPlete rectangle D F O R S O (beCause it faCtors M E H O U R niCely) S I N S I L E N C E Number of rows is 7 CiPher is: EETSU IHHND MSELD EOHNC MBARO SEOAS FEINS EEORL CS 330 Polyalphabetics & Transpositions 80 Cryptanalysis of Transposition Ciphers 1. Do a frequency analysis to confirm that it’s a transposition 2. Factor the length of the message to guess at rectangle size 3. Pick pair of factors and write down the message column- wise 4. These columns will be numbereD 1..n 5. Re-arrange the columns till you get text that makes sense.
Recommended publications
  • Simple Substitution Cipher Evelyn Guo
    Simple Substitution Cipher Evelyn Guo Topic: Data Frequency Analysis, Logic Curriculum Competencies: • Develop thinking strategies to solve puzzles and play games • Think creatively and with curiosity and wonder when exploring problems • Apply flexible and strategic approaches to solve problems • Solve problems with persistence and a positive disposition Grade Levels: G3 - G12 Resource: University of Cambridge Millennium Mathematics Project - NRICH https://nrich.maths.org/4957 Cipher Challenge Toolkit https://nrich.maths.org/7983 Practical Cryptography website http://practicalcryptography.com/ciphers/classical-era/simple- substitution/ Materials: Ipad and Laptop which could run excel spreadsheet. Flip Chart with tips and hints for different levels of players Booklet flyers for anyone taking home. Printed coded message and work sheet (help sheet) with plain alphabet and cipher alphabet (leave blank) Pencils Extension: • Depends on individual player’s interest and math abilities, introduce easier (Atbash Cipher, Caesar Cipher) or harder ways ( AutoKey Cipher) to encrypt messages. • Introduce students how to use the practical cryptography website to create their own encrypted message instantly. • Allow players create their own cipher method. • Understand in any language some letters tend to appear more often than other letters Activity Sheet for Substitution Cipher Opening Question: Which Letters do you think are the most common in English? Start by performing a frequency analysis on some selected text to see which letters appear most often. It is better to use longer texts, as a short text might have an unusual distribution of letters, like the "quick brown fox jumps over the lazy dog" Introduce the Problem: In the coded text attached, every letter in the original message was switched with another letter.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Decrypt Cryptotexts: GBLVMUB JOGPSNBUJLZ VMNIR RPNBMZ EBMFLP OFABKEFT Decrypt: VHFUHW GH GHXA VHFUHW GH GLHX, VHFUHW GH WURLV VH
    PROLOGUE - I. Decrypt cryptotexts: Part IV GBLVMUB JOGPSNBUJLZ Secret-key cryptosystems VMNIR RPNBMZ EBMFLP OFABKEFT prof. Jozef Gruska IV054 4. Secret-key cryptosystems 2/99 PROLOGUE - II. CHAPTER 4: SECRET-KEY (SYMMETRIC) CRYPTOGRAPHY Decrypt: In this chapter we deal with some of the very old, or quite old, classical (secret-key or symmetric) cryptosystems and their cryptanalysis that were primarily used in the pre-computer era. VHFUHW GH GHXA These cryptosystems are too weak nowadays, too easy to break, especially VHFUHW GH GLHX, with computers. However, these simple cryptosystems give a good illustration of several of the VHFUHW GH WURLV important ideas of the cryptography and cryptanalysis. Moreover, most of them can be very useful in combination with more modern VHFUHW GH WRXV. cryptosystem - to add a new level of security. prof. Jozef Gruska IV054 4. Secret-key cryptosystems 3/99 prof. Jozef Gruska IV054 4. Secret-key cryptosystems 4/99 BASICS CRYPTOLOGY - HISTORY + APPLICATIONS Cryptology (= cryptography + cryptanalysis) has more than four thousand years long history. Some historical observation People have always had fascination with keeping information away from others. Some people – rulers, diplomats, military people, businessmen – have always had needs to keep some information away from others. BASICS Importance of cryptography nowadays Applications: cryptography is the key tool to make modern information transmission secure, and to create secure information society. Foundations: cryptography gave rise to several new key concepts of the foundation of informatics: one-way functions, computationally perfect pseudorandom generators, zero-knowledge proofs, holographic proofs, program self-testing and self-correcting, . prof. Jozef Gruska IV054 4. Secret-key cryptosystems 5/99 prof.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Traditional Symmetric-Key Ciphers
    Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel is called the ciphertext. To create the ciphertext from the plaintext, Alice uses an encryption algorithm and a shared secret key. To create the plaintext from ciphertext, Bob uses a decryption algorithm and the same secret key. If P is the plaintext, C is the ciphertext, and K is the key, We assume that Bob creates P1; we prove that P1 = P: Locking and unlocking with the same key Kerckhoff’s Principle Based on Kerckhoff’s principle, one should always assume that the adversary, Eve, knows the encryption/decryption algorithm. The resistance of the cipher to attack must be based only on the secrecy of the key. Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. Cryptanalysis attacks Ciphertext-Only Attack Ciphertext-only attack Known-Plaintext Attack Known-plaintext attack Chosen-Plaintext Attack Chosen-plaintext attack Chosen-Ciphertext Attack Chosen-ciphertext attack SUBSTITUTION CIPHERS A substitution cipher replaces one symbol with another. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Note A substitution cipher replaces one symbol with another. 1 Monoalphabetic Ciphres 2 Polyalphabetic Ciphers Monoalphabetic Ciphers Note In monoalphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the ciphertext is always one-to-one. Example The following shows a plaintext and its corresponding ciphertext.
    [Show full text]
  • 2.4 the Autokey Cipher and Cribs
    Jay Daigle Occidental College Math 400: Cryptology 2.4 The Autokey cipher and cribs 2.4.1 Using a crib One common tool in cryptanalysis is a crib, which is a known or guessed bit of plaintext corresponding to a ciphertext. (The term comes from the phrase \to crib notes" or \to crib an answer", meaning to copy or cheat on an assignment). Often a crib can be used to dramatically simplify cryptanalysis. (In fact, frequency analysis is essentially an attempt to imitate a crib). Cribs were famously used in Bletchley Park during World War II (where the term was coined). Many German Enigma operators used standardized terminology, including the reg- ular use of the word Wetter (\weather") in weather reports, and one operator who repeatedly transmitted the message \Nothing to report". Enigma operators were required to spell out all numbers, so Turing determined that the single most common word in messages was eins, meaning \one". Turing precomputed a catalog of what eins would look like encrypted in every possible position with various keys, which dramatically sped up decryption processes by seeing which of those were possible and judging them most likely. You will notice that this is basically the same idea as frequency analysis: instead of taking common letters, we instead look for common words. eins was not enough to break messages on its own, but it could give substantial speedups and hints for other encryption messages. 2.4.2 Breaking the Autokey cipher Cribs are an especially powerful tool in breaking the Autokey cipher, since the plaintext is also most of the keystream.
    [Show full text]
  • Substitution Cipher in Cryptography, a Substitution Cipher Is a Method Of
    Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Substitution ciphers can be compared with transposition ciphers. In a transposition cipher, the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged. By contrast, in a substitution cipher, the units of the plaintext are retained in the same sequence in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext and vice-versa. Contents • 1 Simple substitution o 1.1 Examples o 1.2 Security for simple substitution ciphers • 2 Homophonic substitution • 3 Polyalphabetic substitution • 4 Polygraphic substitution • 5 Mechanical substitution ciphers • 6 The one-time pad • 7 Substitution in modern cryptography • 8 Substitution ciphers in popular culture Simple substitution 1 ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps.
    [Show full text]
  • Web Technologies Hari Kharel 40312824
    Web Technologies Hari Kharel 40312824 Web Technologies Hari Kharel – 40312824 COURSEWORK 1 – DESIGNING A WEBSITE WHICH ENCODES AND DECODES CIPHERS Web Technologies Hari Kharel 40312824 Web Technologies Hari Kharel 40312824 Contents Introduction .................................................................................................................................................. 3 Overview ................................................................................................................................................... 3 Choice of Ciphers ...................................................................................................................................... 3 SOFTWARE DESIGN ........................................................................................................................................... 4 Cipher Page Design ................................................................................................................................... 4 Game Page Design .................................................................................................................................... 5 Implementation ............................................................................................................................................ 6 Cipher Implementation ............................................................................................................................. 6 Game Implementation .............................................................................................................................
    [Show full text]
  • A Methodology for the Cryptanalysis of Classical Ciphers with Search
    phers with Search Metaheuristics George Lasry A Methodology for the Cryptanalysis of A Methodology for the Cryptanalysis of Classical Ci Classical Ciphers with Search Metaheuristics ISBN 978-3-7376-0458-1 kassel university 9 783737 604581 George Lasry press kassel kassel university press !"# $ % !&' (&)) )*) # + ,)&) - .# +,)/ & + 0123405 / ! & ' & ' & ' 6 # 7 + ))) 8)+$ 9"#)9& )3405 7/':5;.<.5<51.4=>;.0(* 7/':5;.<.5<51.4=>:.;(.* &27++ ?)! ) 04)0:300 $",:5;<5<514=>:; "@'++ . #) +++4443.=4=>:3 '340;9 # !B9$ ) ). ) ,! “After climbing a great hill, one only finds that there are many more hills to climb.” Nelson Mandela Abstract Cryptography, the art and science of creating secret codes, and cryptanalysis, the art and science of breaking secret codes, underwent a similar and parallel course during history. Both fields evolved from manual encryption methods and manual codebreaking techniques, to cipher ma- chines and codebreaking machines in the first half of the 20th century, and finally to computer- based encryption and cryptanalysis from the second half of the 20th century. However, despite the advent of modern computing technology, some of the more challenging classical cipher systems and machines have not yet been successfully cryptanalyzed. For others, cryptanalytic methods exist, but only for special and advantageous cases, such as when large amounts of ciphertext are available. Starting from the 1990s, local search metaheuristics such as hill climbing, genetic algorithms, and simulated annealing have been employed, and in some cases, successfully, for the cryptanal- ysis of several classical ciphers. In most cases, however, results were mixed, and the application of such methods rather limited in their scope and performance. In this work, a robust framework and methodology for the cryptanalysis of classical ciphers using local search metaheuristics, mainly hill climbing and simulated annealing, is described.
    [Show full text]
  • Introduction to Cryptography - 1 CSC4601 F04 Overviewoverview
    IntroductionIntroduction toto CryptographyCryptography Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_04/ Louisiana State University 5- Introduction to Cryptography - 1 CSC4601 F04 OverviewOverview Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 2 CSC4601 F04 CommunicationCommunication SecrecySecrecy The history of codes and ciphers is the story of centuries-old battle between codemakers and codebreakers Evolution of codes. Always under attack from codebreakers. Analogous to the situation of a strain of infectious bacteria under the attack of antibiotics Technologies involved from mathematics to linguistics, from information theory to quantum theory Louisiana State University 5- Introduction to Cryptography - 3 CSC4601 F04 TheThe EvolutionEvolution ofof SecretSecret WritingWriting In The histories, Herodotus, “the father of history”, chronicled the conflicts between Greece and Persia in the fifth century B.C. The art of secret writing saved the Greece Demaratus send information to Greece about Persian preparation using secret messages: scraping the wax off a pair of wooden folding tablets, writing on the wood underneath and then covering the message with wax again. Herodotus chronicled also the story of Histaiaeus who wanted to encaurage Aristagoras of Miletus to revolt against Persians To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to grow. It seems this period of history tolerated a certain lack of urgency. Hiding a message is known as steganography derived from the Greek word steganos meaning “covered” and graphein–“to write”.
    [Show full text]
  • Cryptography
    Cryptography BMEVITMAV52 Information and Network Security [email protected] Cryptography • Cryptography – Greek word: secret writing • The encrypted message is visible, but the meaning is unknown • Basic notations – Plaintext (P) – Ciphertext (C) – Key (K) – Encryption: C = E(P, K) – Decryption: P = D(C, K) 2018/19-1 Information and Network Security 2 Steganography • Steganography – Greek word: covert writing • The “encrypted” message is invisible • First steganography – Based on Herodotus notes (~400 BC) • Demeratus: Message under the clay tables, information about military movements • Histiaeus: Message under the hair of a servant – Pliny the Elder (roman empire) • Invisible ink (milk of the thithymallus plant), message between the rows 2018/19-1 Information and Network Security 3 Cryptanalysis • To get the key – Known plaintext • Some parts of the text (P1) and its secret form (C1) is known by the attacker • E.g.: ZIP archives with known files – Ciphertext only attack • Only the secret form of the message is known. • Usually this is the case – Brute force – dictionary – smart force attacks • Testing the keys • Rainbow tables – Side channel attack • Attack on the implementation (not on theory) • E.g. RSA attacks • To get the message without the key • Modify message without the key 2018/19-1 Information and Network Security 4 Security, obscurity, design • Security by obscurity – The encryption method is not publicly known. It is a secret of the inventors – May contain design errors – May result severe errors when the method is discovered by others • Security by design – The encryption method is well known by the public. (OPEN) The key s the only secret – The method is investigated by many cryptanalyst • Kerckhoffs' principle and Shannon's maxim – The enemy knows the system (but not the key) 2018/19-1 Information and Network Security 5 History of cryptography Classic encryption • ~ 2500 BC – Mystic hieroglyphs in Egypt.
    [Show full text]
  • A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)
    International Journal of Machine Learning and Computing, Vol. 9, No. 3, June 2019 A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher) Tun Myat Aung, Htet Htet Naing, and Ni Ni Hla methods for permutation of characters. In the first method, the Abstract—Fast progression of digital data exchange in text is written into a table column by column and then electronic way, information security is becoming much more transmitted row by row. In the second method, the text is important in data storage and transmission on public written into a table row by row and then transmitted column communication networks. Cryptography has come up as a by column. Rail-fence cipher, Route cipher, Columnar cipher, solution which plays a vital role in information security system against malicious attacks. In cryptography, there are various Transposition using Matrix and Double transposition are cipher techniques such as monoalphabetic cipher, popular transposition ciphers [1]. polyalphabetic cipher, etc. to support data confidentiality as security mechanisms. They are methods of encrypting plain text message into cipher text protecting it from adversaries. The encryption process of encryption of alphabets is the converting original message into non readable form. One of the most popular cipher cipher techniques is the Vigenère cipher. It is a polyalphabetic cipher plain text key text technique which uses the Vigenère table for the process of encryption of alphabets. As the Vigenère cipher does not have the properties of diffusion and confusion, it is longer vulnerable decryption to Kasiski and Friedman attacks based on letter frequency analysis. Thus, in this paper we propose a polyalphabetic cipher Fig.
    [Show full text]