Principle and Computer Simulation Model of Variation of Delastell's

Total Page:16

File Type:pdf, Size:1020Kb

Principle and Computer Simulation Model of Variation of Delastell's INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES Volume 9, 2015 Principle and Computer Simulation Model of Variation of Delastell’s cipher BIFID M. Musilek and S. Hubalovsky resistance to the algorithm and subsequent programming. Abstract—An interesting possibility to develop system Rather than rewriting the mathematical task in the learning programmer thinking of students of computer science is integration of programming the new method based on introducing the digital technology to non-trivial pencil and paper cipher system. The system approach, modeling and simulation is used in learning computer support gives us the opportunity of experimenting and of students of Computer Support of Archives specialization at creative modifications of the original idea. The paper describe introducing method of system approach, modeling and computer Faculty of Art, University of Hradec Kralove (see e.g. [3] – simulation to learning of algorithm development and programming [7]). for student of Computer Support of Archives specialization. The The mentioned approach is demonstrated by case study of approach is based on creation of simulation program for encryption using of polygraphic Delastell’s cipher BIFID and its and decryption different types of ciphers. The paper describes the variation. The computer simulation of the case studies is principles of polygraphic Delastell’s cipher BIFID and its variation realized and visualized in Java Script programming language. as well as possibilities of encryption and decryption of the cipher using the computer simulation program. II. THEORETICAL BACKGROUND Keywords—Algorithmic thinking, Delastell’s cipher, education, historical encryption, programming. A. Principles of Polygraphic Substitution Cipher BIFID Polygraphic substitution cipher BIFID [8] combines I. INTRODUCTION fractionation of substitution tables with transposition. The HE ability to create mathematical model and transform it result is polygraphic substitution cipher. The specified cipher Tto algorithm as well as to computer simulation program operations are performed with a group of five digits in the develops system thinking, skills and imagination. Regarding basic variant, i.e. the substitution is clearly intended for a this fact the courses of algorithm development and group of five symbols by used encryption table (generally programming are an inseparable part of study skills of students called Polybius square) and by agreed manner of transposition specializing in “Informatics” at high schools and secondary of given numerical mid-text. Below example will clarify the schools [1]. situation. Learning of algorithm development and programming was/is The following message has to be encrypt by polygraphic often explained by the mathematical tasks, which can be ciphers BIFID: "Both men are employed on the Faculty of clearly described, defined and developed by algorithm. Science." The message has to be first rewritten to five-letter’s Altogether, the exercises are based on rewriting the groups, ignoring the spaces between the words and the last mathematical equations and formulas using algorithms and group is complete to five characters: practicing the standard algorithm. The complexity and integration of system approach to learning of algorithm BOTHM ENARE EMPLO YEDON development and programming is missing [2]. Students, who FACUL TYOFS CIENC EKLMN do not have sufficient mathematical experience, do not Encryption table (Polybius square) will be input based on understand algorithm as well as programming task. In such passwords University of Hradec Kralove, where letters I and J type of learning the students cannot see the context with are connected (as is common in English) to one field of square problems that occur in real life. Learning of algorithm – see Table 1: development escapes them, and the result is indifference or Table 1 Encryption table Stepan Hubalovsky is assoc. prof. at University of Hradec Kralove, Department of informatics, Faculty of Science, Hradec Kralove 500 38, 1 2 3 4 5 Rokitanskeho 62, Czech republic, [email protected]. 1 U N I/J V E Michal Musilek is assistant professor at University of Hradec Kralove, Department of informatics, Faculty of Science, Hradec Kralove 500 38, 2 R S T Y O Rokitanskeho 62, Czech republic, [email protected]. 3 F H A D C ISSN: 2074-1316 186 INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES Volume 9, 2015 A B C D E F G Table 2 Frequency of characters in plain text 382 104 132 248 646 114 97 H I J K L M N The effectiveness of encryption algorithm may be calculated 324 323 0 32 194 99 326 based on index of coincidence. The index of coincidence was introduced to cryptanalysis by William Frederick Friedman [9] O P Q R S T U (1891-1969). If the frequencies of individual letters of the 370 106 3 300 302 432 130 alphabet is ni, the number of different characters forming the V W X Y Z alphabet k and total number of characters of the analyzed 56 114 11 72 2 text N, then the index of coincidence define IC is given by 4 K L B G M formula (1): 5 P Q W X Z k First, the text will be encrypt into to numeric mid-text: nn ii −⋅ )1( IC = (1) ∑ i=1 NN −⋅ )1( BOTHM ENARE EMPLO YEDON 42234 11321 14542 21321 The approximate formula is used in cryptoanalysis that 35325 52315 55125 45452 gives a more accurate value of the IC, for long analyzed text. We have also used the following approximate formula, FACUL TYOFS CIENC EKLMN because we analyzed the texts of length of the thousands of characters. The value of pi is the relative frequency (posteriori 33314 22232 31113 14441 th 13512 34512 53525 51252 probability) of occurrence of the i character of alphabet: The cipher text is reached from the mid-text in the second k = pIC 2 phase of encryption. The principle of the creation of the cipher ∑ i (2) from the mid-text is as follows: i=1 Twice two letters are taken from the first row of five-digit group; Another variable that we can be used for measurement of Then last letter of the first row is connected with the first the effectiveness of an encryption algorithm informatics letters of the second row; entropy is so called Shannon entropy Claude Elwood Shannon Finally twice two letters are taken from the second row. (1916-2001)). The index of coincidence of the information For the second phase of the encryption the same table as in entropy H is defined as follows: the first phase will be used: k ⋅−= log ppH 42234 11321 14542 21321 ∑ i 2 i (3) 35325 52315 55125 45452 i=1 LTKWO UHETE VXOPO RHVXQ Where pi is again the relative frequency of occurrence of the ith character of alphabet. 33314 22232 31113 14441 The index of coincidence for given plaintext (Oliver Twist 13512 34512 53525 51252 by Charles Dickens) is IC = 0.0657, informatics entropy text is AFKCN STTMN FUCCO VGENQ H = 4.16. After application of the above procedure to BIFID cipher It is clear from the example that this type of encryption is and to Polybius square obtained by using password University more complicated than the encryption of other substitution of Hradec Kralove, the frequency of the character is shown in ciphers, (simple substitution, bigram substitution of type Table 3. Playfair cipher or Four-square cipher). The complexity of the BIFID cipher can be proved by Table 3 Frequency of characters in cipher text increasing of information entropy of the ciphertext, e.g. if this cipher is generally worse decipherable. A B C D E F G 316 129 179 125 189 246 50 B. Index of Coincidence and Information Entropy H I J K L M N The text of the first chapter of the novel Oliwer Twist by 427 288 0 111 109 83 326 Charles Dickens has been chosen to calculate the information O P Q R S T U entropy. Table 2 shows frequency analysis of the plain text. 269 184 137 238 290 392 223 V W X Y Z 135 137 71 147 118 ISSN: 2074-1316 187 INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES Volume 9, 2015 Table 6 Encryption table for Czech alphabet The index of coincidence of the ciphertext is IC = 0.0500, text informatics entropy increases to H = 4.47. For 1 2 3 4 5 6 A L E X N D comparison, the plaintext was encrypt by bigram substitution 1 cipher Playfair using the same Polybiova squares. The resulted 2 R V I K Y ! ciphertext has length of 5080 characters whose extension was 3 B C Č Ď F G due to completion of double consonants. The index of 4 H J K L M Ň coincidence is H = 0.0524 and informatics entropy text is 5 O P Q Ř S Š H = 4.39, which is consistent with the expectation that bigram 6 T Ť U V W Z substitution will have for the same plaintext higher index of coincidence and lower informatics entropy than polygrams For both tables was chosen password "Александр substitution. Великий", respectively "Alexander Veliký“. Ideally random text, which uses 25 English letters (the letter Other variations of Polybius cipher are based on J is not present even in our chosen plaintext, nor in any of the permutations of used transposition. The letters can be cipher text), is minimal coincidence index IC = 1/25 = 0.0400 associated not only horizontally but also upward and and informatics maximum entropy H = log225 = 4.64. downward – see [*]. The message “Both men are employed on Let us summarize the values of the statistical characteristics the Faculty of Science." Is in this case encrypt as follows: of the four previously mentioned texts in Table 4. • The first phase is in all three cases the same.
Recommended publications
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • What Is a Cryptosystem?
    Cryptography What is a Cryptosystem? • K = {0, 1}l • P = {0, 1}m • C′ = {0, 1}n,C ⊆ C′ • E : P × K → C • D : C × K → P • ∀p ∈ P, k ∈ K : D(E(p, k), k) = p • It is infeasible to find F : P × C → K Let’s start again, in English. Steven M. Bellovin September 13, 2006 1 Cryptography What is a Cryptosystem? A cryptosystem is pair of algorithms that take a key and convert plaintext to ciphertext and back. Plaintext is what you want to protect; ciphertext should appear to be random gibberish. The design and analysis of today’s cryptographic algorithms is highly mathematical. Do not try to design your own algorithms. Steven M. Bellovin September 13, 2006 2 Cryptography A Tiny Bit of History • Encryption goes back thousands of years • Classical ciphers encrypted letters (and perhaps digits), and yielded all sorts of bizarre outputs. • The advent of military telegraphy led to ciphers that produced only letters. Steven M. Bellovin September 13, 2006 3 Cryptography Codes vs. Ciphers • Ciphers operate syntactically, on letters or groups of letters: A → D, B → E, etc. • Codes operate semantically, on words, phrases, or sentences, per this 1910 codebook Steven M. Bellovin September 13, 2006 4 Cryptography A 1910 Commercial Codebook Steven M. Bellovin September 13, 2006 5 Cryptography Commercial Telegraph Codes • Most were aimed at economy • Secrecy from casual snoopers was a useful side-effect, but not the primary motivation • That said, a few such codes were intended for secrecy; I have some in my collection, including one intended for union use Steven M.
    [Show full text]
  • A Covert Encryption Method for Applications in Electronic Data Interchange
    Technological University Dublin ARROW@TU Dublin Articles School of Electrical and Electronic Engineering 2009-01-01 A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan Blackledge Technological University Dublin, [email protected] Dmitry Dubovitskiy Oxford Recognition Limited, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/engscheleart2 Part of the Digital Communications and Networking Commons, Numerical Analysis and Computation Commons, and the Software Engineering Commons Recommended Citation Blackledge, J., Dubovitskiy, D.: A Covert Encryption Method for Applications in Electronic Data Interchange. ISAST Journal on Electronics and Signal Processing, vol: 4, issue: 1, pages: 107 -128, 2009. doi:10.21427/D7RS67 This Article is brought to you for free and open access by the School of Electrical and Electronic Engineering at ARROW@TU Dublin. It has been accepted for inclusion in Articles by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License A Covert Encryption Method for Applications in Electronic Data Interchange Jonathan M Blackledge, Fellow, IET, Fellow, BCS and Dmitry A Dubovitskiy, Member IET Abstract— A principal weakness of all encryption systems is to make sure that the ciphertext is relatively strong (but not that the output data can be ‘seen’ to be encrypted. In other too strong!) and that the information extracted is of good words, encrypted data provides a ‘flag’ on the potential value quality in terms of providing the attacker with ‘intelligence’ of the information that has been encrypted.
    [Show full text]
  • Battle Management Language: History, Employment and NATO Technical Activities
    Battle Management Language: History, Employment and NATO Technical Activities Mr. Kevin Galvin Quintec Mountbatten House, Basing View, Basingstoke Hampshire, RG21 4HJ UNITED KINGDOM [email protected] ABSTRACT This paper is one of a coordinated set prepared for a NATO Modelling and Simulation Group Lecture Series in Command and Control – Simulation Interoperability (C2SIM). This paper provides an introduction to the concept and historical use and employment of Battle Management Language as they have developed, and the technical activities that were started to achieve interoperability between digitised command and control and simulation systems. 1.0 INTRODUCTION This paper provides a background to the historical employment and implementation of Battle Management Languages (BML) and the challenges that face the military forces today as they deploy digitised C2 systems and have increasingly used simulation tools to both stimulate the training of commanders and their staffs at all echelons of command. The specific areas covered within this section include the following: • The current problem space. • Historical background to the development and employment of Battle Management Languages (BML) as technology evolved to communicate within military organisations. • The challenges that NATO and nations face in C2SIM interoperation. • Strategy and Policy Statements on interoperability between C2 and simulation systems. • NATO technical activities that have been instigated to examine C2Sim interoperation. 2.0 CURRENT PROBLEM SPACE “Linking sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo” (Lt Gen Sir Robert Fulton, Deputy Chief of Defence Staff, 29th May 2002) Although General Fulton made that statement in 2002 at a time when the concept of network enabled operations was being formulated by the UK and within other nations, the requirement remains extant.
    [Show full text]
  • A New Cryptosystem for Ciphers Using Transposition Techniques
    Published by : International Journal of Engineering Research & Technology (IJERT) http://www.ijert.org ISSN: 2278-0181 Vol. 8 Issue 04, April-2019 A New Cryptosystem for Ciphers using Transposition Techniques U. Thirupalu Dr. E. Kesavulu Reddy FCSRC (USA) Research Scholar Assistant Professor, Dept. of Computer Science Dept. of Computer Science S V U CM&CS – Tirupati S V U CM&CS - Tirupati India – 517502 India – 517502 Abstract:- Data Encryption techniques is used to avoid the performs the decryption. Cryptographic algorithms are unauthorized access original content of a data in broadly classified as Symmetric key cryptography and communication between two parties, but the data can be Asymmetric key cryptography. recovered only through using a key known as decryption process. The objective of the encryption is to secure or save data from unauthorized access in term of inspecting or A. Symmetric Cryptography adapting the data. Encryption can be implemented occurs by In the symmetric key encryption, same key is used for both using some substitute technique, shifting technique, or encryption and decryption process. Symmetric algorithms mathematical operations. By adapting these techniques we more advantageous with low consuming with more can generate a different form of that data which can be computing power and it works with high speed in encrypt difficult to understand by any person. The original data is them. The symmetric key encryption takes place in two referred to as the plaintext and the encrypted data as the modes either as the block ciphers or as the stream ciphers. cipher text. Several symmetric key base algorithms have been The block cipher mode provides, whole data is divided into developed in the past year.
    [Show full text]
  • Elements of Cryptography
    Elements Of Cryptography The discussion of computer security issues and threats in the previous chap- ters makes it clear that cryptography provides a solution to many security problems. Without cryptography, the main task of a hacker would be to break into a computer, locate sensitive data, and copy it. Alternatively, the hacker may intercept data sent between computers, analyze it, and help himself to any important or useful “nuggets.” Encrypting sensitive data com- plicates these tasks, because in addition to obtaining the data, the wrongdoer also has to decrypt it. Cryptography is therefore a very useful tool in the hands of security workers, but is not a panacea. Even the strongest cryp- tographic methods cannot prevent a virus from damaging data or deleting files. Similarly, DoS attacks are possible even in environments where all data is encrypted. Because of the importance of cryptography, this chapter provides an introduction to the principles and concepts behind the many encryption al- gorithms used by modern cryptography. More historical and background ma- terial, descriptions of algorithms, and examples, can be found in [Salomon 03] and in the many other texts on cryptography, code breaking, and data hiding that are currently available in libraries, bookstores, and the Internet. Cryptography is the art and science of making data impossible to read. The task of the various encryption methods is to start with plain, readable data (the plaintext) and scramble it so it becomes an unreadable ciphertext. Each encryption method must also specify how the ciphertext can be de- crypted back into the plaintext it came from, and Figure 1 illustrates the relation between plaintext, ciphertext, encryption, and decryption.
    [Show full text]
  • Caesar's Cipher Is a Monoalphabetic
    Mathematical summer in Paris - Cryptography Exercise 1 (Caesar’s cipher ?) Caesar’s cipher is a monoalphabetic encryption method where all letters in the alphabet are shifted by a certain constant d. For example, with d = 3, we obtain A ! D; B ! E;:::; Y ! B; Z ! C: 1. Translate the encryption function f in algebraic terms. What is the decryption function g? 2. What is the key in Caesar’s cipher? How many keys are possible? 3. Decrypt the ciphertext LIPPSASVPH. Exercise 2 (Affine encryption ?) We now want to study a more general kind of encryption method, called affine encryption. We represent each letter in the latin alphabet by its position in the alphabet, starting with 0, i.e. A ! 0; B ! 1; C ! 2;:::; Z ! 25; and we consider the map f : x ! ax + b mod 26; where a and b are fixed integers between 0 and 25. We want to use the map f to encrypt each letter in the plaintext. 1. What happens if we choose a = 1? We now choose a = 10 and b = 3. def 2. Let 0 ≤ y ≤ 25 such that y = f(x) = 10x + 3 mod 26. Prove that there exists k 2 Z such that y = 10x + 26k + 3. 3. Prove that y is always odd. 4. What can we say about this encryption method? We now choose a = 9 and b = 4. 5. Find an integer u 2 Z such that 9u = 1 mod 26. 6. Explain why the equation y = 9x + 4 mod 26, with 0 ≤ y ≤ 25, always has a solution.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Short History Polybius's Square History – Ancient Greece
    CRYPTOLOGY : CRYPTOGRAPHY + CRYPTANALYSIS Polybius’s square Polybius, Ancient Greece : communication with torches Cryptology = science of secrecy. How : 12345 encipher a plaintext into a ciphertext to protect its secrecy. 1 abcde The recipient deciphers the ciphertext to recover the plaintext. 2 f g h ij k A cryptanalyst shouldn’t complete a successful cryptanalysis. 3 lmnop 4 qrstu Attacks [6] : 5 vwxyz known ciphertext : access only to the ciphertext • known plaintexts/ciphertexts : known pairs TEXT changed in 44,15,53,44. Characteristics • (plaintext,ciphertext) ; search for the key encoding letters by numbers chosen plaintext : known cipher, chosen cleartexts ; • shorten the alphabet’s size • search for the key encode• a character x over alphabet A in y finite word over B. Polybius square : a,...,z 1,...,5 2. { } ! { } Short history History – ancient Greece J. Stern [8] : 3 ages : 500 BC : scytale of Sparta’s generals craft age : hieroglyph, bible, ..., renaissance, WW2 ! • technical age : complex cipher machines • paradoxical age : PKC • Evolves through maths’ history, computing and cryptanalysis : manual • electro-mechanical • by computer Secret key : diameter of the stick • History – Caesar Goals of cryptology Increasing number of goals : secrecy : an enemy shouldn’t gain access to information • authentication : provides evidence that the message • comes from its claimed sender signature : same as auth but for a third party • minimality : encipher only what is needed. • Change each char by a char 3 positions farther A becomes d, B becomes e... The plaintext TOUTE LA GAULE becomes wrxwh od jdxoh. Why enciphering ? The tools Yesterday : • I for strategic purposes (the enemy shouldn’t be able to read messages) Information Theory : perfect cipher I by the church • Complexity : most of the ciphers just ensure computational I diplomacy • security Computer science : all make use of algorithms • Mathematics : number theory, probability, statistics, Today, with our numerical environment • algebra, algebraic geometry,..
    [Show full text]
  • A Secure Variant of the Hill Cipher
    † A Secure Variant of the Hill Cipher Mohsen Toorani ‡ Abolfazl Falahati Abstract the corresponding key of each block but it has several security problems [7]. The Hill cipher is a classical symmetric encryption In this paper, a secure cryptosystem is introduced that algorithm that succumbs to the know-plaintext attack. overcomes all the security drawbacks of the Hill cipher. Although its vulnerability to cryptanalysis has rendered it The proposed scheme includes an encryption algorithm unusable in practice, it still serves an important that is a variant of the Affine Hill cipher for which a pedagogical role in cryptology and linear algebra. In this secure cryptographic protocol is introduced. The paper, a variant of the Hill cipher is introduced that encryption core of the proposed scheme has the same makes the Hill cipher secure while it retains the structure of the Affine Hill cipher but its internal efficiency. The proposed scheme includes a ciphering manipulations are different from the previously proposed core for which a cryptographic protocol is introduced. cryptosystems. The rest of this paper is organized as follows. Section 2 briefly introduces the Hill cipher. Our 1. Introduction proposed scheme is introduced and its computational costs are evaluated in Section 3, and Section 4 concludes The Hill cipher was invented by L.S. Hill in 1929 [1]. It is the paper. a famous polygram and a classical symmetric cipher based on matrix transformation but it succumbs to the 2. The Hill Cipher known-plaintext attack [2]. Although its vulnerability to cryptanalysis has rendered it unusable in practice, it still In the Hill cipher, the ciphertext is obtained from the serves an important pedagogical role in both cryptology plaintext by means of a linear transformation.
    [Show full text]
  • Tap Code 1 2 3 4 5 1 a B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5
    Solution to Kryptos 2: Challenge 1 The audio files indicate that the prisoners are communicating with each other by “tapping”. There are two distinct tapping sounds which indicate the two prisoners are exchanging some sort of information back and forth. Furthermore, unlike Morse Code, each audio file is made up of pairs of taps which leads one to believe that each pair of taps corresponds to a word or letter. The longest tapping sequence is five, so if one assumes that each tap-pair corresponds to a pair of integers between 1 and 5, then this code could encipher 25 items – most likely letters. At this point, one could try a frequency analysis to help identify which pairs of integers correspond to which letters. Alternatively, a little research might yield the “tap code” (see e.g. Wikipedia) which has been used by prisoners of war in various conflicts throughout history, most recently Vietnam. It is based on the Polybius square, some of which have slightly different arrangements of the 26 letters placed into 25 cells. Challenge 1 was based on the following key found on Wikipedia: Tap code 1 2 3 4 5 1 A B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5 V W X Y Z The tap code table This has all letters except “K”, so “C” is used instead. The letter “X” is used to separate sentences. The first audio file begins with the following tap-pairs: (2,4), (4,3), (1,3), (3,4), (5,1), (1,5), (4,2),… which yields the following plaintext: i, s, c, o, v, e, r, … By adding in the likely punctuation, the complete conversation can be decoded: PLAINTEXT Prisoner 1: Is cover intact? Prisoner 2: Yes.
    [Show full text]
  • A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher
    International Journal of Advanced Technology & Engineering Research (IJATER) www.ijater.com A HYBRID CRYPTOSYSTEM BASED ON VIGENÈRE CIPHER AND COLUMNAR TRANSPOSITION CIPHER Quist-Aphetsi Kester, MIEEE, Lecturer Faculty of Informatics, Ghana Technology University College, PMB 100 Accra North, Ghana Phone Contact +233 209822141 Email: [email protected] / [email protected] graphy that use the same cryptographic keys for both en- Abstract cryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to Privacy is one of the key issues addressed by information go between the two keys. The keys, in practice, represent a Security. Through cryptographic encryption methods, one shared secret between two or more parties that can be used can prevent a third party from understanding transmitted raw to maintain a private information link [5]. This requirement data over unsecured channel during signal transmission. The that both parties have access to the secret key is one of the cryptographic methods for enhancing the security of digital main drawbacks of symmetric key encryption, in compari- contents have gained high significance in the current era. son to public-key encryption. Typical examples symmetric Breach of security and misuse of confidential information algorithms are Advanced Encryption Standard (AES), Blow- that has been intercepted by unauthorized parties are key fish, Tripple Data Encryption Standard (3DES) and Serpent problems that information security tries to solve. [6]. This paper sets out to contribute to the general body of Asymmetric or Public key encryption on the other hand is an knowledge in the area of classical cryptography by develop- encryption method where a message encrypted with a reci- ing a new hybrid way of encryption of plaintext.
    [Show full text]