Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford ([email protected])

Total Page:16

File Type:pdf, Size:1020Kb

Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford (Ralph.Morelli@Trincoll.Edu) Ciphers: Making and Breaking Ralph Morelli Trinity College, Hartford ([email protected]) Smithsonian Institute October 31, 2009 © 2009 Ralph Morelli You are free to reuse and remix this presentation under a creative commons license provided you give credit to the author. http://creativecommons.org/licenses/by/3.0/us/ This presentation was created using Open Office 3.0, free and open source software. http://www.openoffice.org/ Part II: Cryptology in Transition Outline Polyalphabetic Substitution Alberti Cipher Vigenère Cipher – Le Chiffre Indéchiffrable Kasiski Decipherment Mechanical Ciphers The Enigma Machine WWII Leon Battista Alberti (1404-1472) Leon Battista Alberti (1404-1472) Renaissance man. Architect, author, artist, poet, philosopher. Father of Modern Cryptography – First western exposition of frequency analysis. – Invention of polyalphabetic cipher. Courtyard of the Uffizi Palace Alberti the Architect Santa Maria Novella – Florence De Cifris First comprehensive account of cryptanalysis in the West. Invention of the polyalphabetic cipher. Alberti Cipher Disk Outer disk stationary with regular alphabet. Inner disk moveable with permuted alphabet. An inner disk letter (k) is picked as index, and aligned with some letter on outer disk (B). The index is changed every 3 or 4 words and inserted into the message. “Ciao amici” might be encrypted as “BlvgyCeztkt”. Compare Letter Frequencies Plain Caesar Simple Polyalphabetic Polyalphabetic Development Alberti (~ 1472): devised genuine polyalphabetic cipher with mixed alphabet plus a practical cipher disk device. Abbot Trithemius (~ 1508): used tables of regular alphabets to be used in fixed order. Giovanni Battista Belaso (~ 1550 ): invented principle of a key or keyword to select alphabets. Giovanni Battista Porta (~ 1563): “invented” using mixed alphabets. Blaise de Vigenère (~ 1586): combined table or Trithemius, keyword of Belaso, and mixed alphabets of Porta into an autokey cipher. Johannes Trithemius (1462-1516) Abbot, occultist. First printed book crypto book. Most famous for Steganagraphia (banned book). Believed to be about occult. Decrypted in 1998. Trithemius Cipher • The Trithemius Cipher cycles through each row of the table. Encryption: Meetusatthebridge ABCDEFGHIJKLMNOPQ MFEWYXGABQOMDVRVG So-called “Chiffre Indéchiffrable” • The Bellaso Cipher uses a keyword to select alphabets. Encryption: ZEBRASZEBRASZEBRAS therearesomethirty SLFIESQITFMWSLJRTQ ** ** Decryption: ZEBRASZEBRASZEBRAS slfiesqitfmwsljrtq THEREARESOMETHIRTY Vigenère's Autokey Cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z • Uses mixed A Z E B R A F I S H C D G J K L M N O P Q T U V W X Y B E B R A F I S H C D G J K L M N O P Q T U V W X Y Z alphabets and the text C B R A F I S H C D G J K L M N O P Q T U V W X Y Z E itself as the key. D R A F I S H C D G J K L M N O P Q T U V W X Y Z E B E A F I S H C D G J K L M N O P Q T U V W X Y Z E B R Encryption: F F I S H C D G J K L M N O P Q T U V W X Y Z E B R A G I S H C D G J K L M N O P Q T U V W X Y Z E B R A F H S H C D G J K L M N O P Q T U V W X Y Z E B R A F I Therearesomethirty (MSG=col) I H C D G J K L M N O P Q T U V W X Y Z E B R A F I S J C D G J K L M N O P Q T U V W X Y Z E B R A F I S H Xtherearesomethirt (KEY=row) K D G J K L M N O P Q T U V W X Y Z E B R A F I S H C OZGUUAOUVIZNWZMYDP (Crypto) L G J K L M N O P Q T U V W X Y Z E B R A F I S H C D M J K L M N O P Q T U V W X Y Z E B R A F I S H C D G N K L M N O P Q T U V W X Y Z E B R A F I S H C D G K Decryption: O L M N O P Q T U V W X Y Z E B R A F I S H C D G K L P M N O P Q T U V W X Y Z E B R A F I S H C D G K L M OZGUUAOUVIZNWZMYDP(MSG=ltr) Q N O P Q T U V W X Y Z E B R A F I S H C D G K L M N R O P Q T U V W X Y Z E B R A F I S H C D G K L M N O XthereareS.. (KEY=row) S P Q T U V W X Y Z E B R A F I S H C D G K L M N O P T Q T U V W X Y Z E B R A F I S H C D G K L M N O P Q O in row X gives column T U T U V W X Y Z E B R A F I S H C D G K L M N O P Q T V U V W X Y Z E B R A F I S H C D G K L M N O P Q T U ... W V W X Y Z E B R A F I S H C D G K L M N O P Q T U V V in row E gives column S X W X Y Z E B R A F I S H C D G K L M N O P Q T U V W Y X Y Z E B R A F I S H C D G K L M N O P Q T U V W X Z Y Z E B R A F I S H C D G K L M N O P Q T U V W X Y Jefferson's Wheel Cipher Invented in 1795. 26 wheels with random 26- letter alphabets. Reinvented by Etienne Bazeries in 1890s with 20-30 wheels. Rearrange the wheels (key) and write message in one row and transmit any other row. U.S. Army M-94, 1923-1942. Our Polyalphabetic Cipher Disk Outer disk stationary Z Y A with regular alphabet. X z x y e B W b Inner disk moveable w C U/ r with permuted alphabet. Vu/v D T a Keyword = zebrafish t E f S q F i/j p R s G o Q h n H J P c m d I/ l O k g K N L M Cipher Disk Exercise 1. Pick a keyword and write it in lower case letters, L to R, on the inner disk. 2. Fill in the rest of the alphabet on the inner disk (i/j and u/v go in one cell each). 3. Pick a key (e.g., A = k) and align the disks. 4. Encrypt: For each plaintext letter, find it on the outer disk and substitute the lower case letter on the inner disk. 5. Decrypt: For each ciphertext letter, find it on the inner disk and substitute the upper case letter on the outer disk. Breaking the Unbreakable Cipher Breaking the Vigenère Cipher Vigenère cipher – a keyword of length n is used to select from among 26 Caesar-shifted alphabets. Thought to be unbreakable for ~ 300 years. 1863: Friederich Kasiski, a Prussian major, developed a method to break it. 1846: Charles Babbage, a British mathematician, philosopher, and inventor, discovered the same method. Basic approach: Find the length of the keyword, n, and use frequency analysis on the n columns, each of which is a Caesar shifted alphabet. Kasiski Method Location: 01234 56789 01234 56789 01234 56789 ... Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL ... Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION ... Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY ... Repeated Location Distance Factors Bigram KS 9 9 9, 3 SM 10 9 9, 3 ME 11 9 9, 3 ... ... ... ... Find the distances between repeated bigrams, some of which are due to repeated bigrams in the plaintext. Factor the distances—the keyword should have length equal to one factor. Break the text into columns and use frequency analysis on each column to identify the shifted alphabet used to encrypt that column. Automating Kasiski's Method Index of Coincidence Index of coincidence – the number of times two identical letters occur in the same position in two adjacent texts. William F. Friedman (Father of American cryptography). Language Normalized IC (1/26) Plain English 0.067 German 0.079 Caesar English 0.065 Simple English 0.065 Substitution Uniform distribution 0.0385 IC – Example Plain Caesar Simple Polyalphabetic 0.064 0.064 0.064 0.040 The Chi-square Test Used for comparing and observed frequency distribution with an expected distribution.
Recommended publications
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, Lumasms
    Prosiding Seminar Ilmiah Nasional Komputer dan Sistem Intelijen (KOMMIT 2014) Vol. 8 Oktober 2014 Universitas Gunadarma – Depok – 14 – 15 Oktober 2014 ISSN : 2302-3740 IMPLEMENTASI ALGORITMA CAESAR, CIPHER DISK, DAN SCYTALE PADA APLIKASI ENKRIPSI DAN DEKRIPSI PESAN SINGKAT, LumaSMS Yusuf Triyuswoyo ST. 1 Ferina Ferdianti ST. 2 Donny Ajie Baskoro ST. 3 Lia Ambarwati ST. 4 Septiawan ST. 5 1,2,3,4,5Jurusan Manajemen Sistem Informasi, Universitas Gunadarma [email protected] Abstrak Short Message Service (SMS) merupakan salah satu cara berkomunikasi yang banyak digunakan oleh pengguna telepon seluler. Namun banyaknya pengguna telepon seluler yang menggunakan layanan SMS, tidak diimbangi dengan faktor keamanan yang ada pada layanan tersebut. Banyak pengguna telepon seluler yang belum menyadari bahwa SMS tidak menjamin integritas dan keamanan pesan yang disampaikan. Ada beberapa risiko yang dapat mengancam keamanan pesan pada layanan SMS, diantaranya: SMS spoofing, SMS snooping, dan SMS interception. Untuk mengurangi risiko tersebut, maka dibutuhkan sebuah sistem keamanan pada layanan SMS yang mampu menjaga integritas dan keamanan isi pesan. Dimana tujuannya ialah untuk menutupi celah pada tingkat keamanan SMS. Salah satu penanggulangannya ialah dengan menerapkan algoritma kriptografi, yaitu kombinasi atas algoritma Cipher Disk, Caesar, dan Scytale pada pesan yang akan dikirim. Tujuan dari penulisan ini adalah membangun aplikasi LumaSMS, dengan menggunakan kombinasi ketiga algoritma kriptografi tersebut. Dengan adanya aplikasi ini diharapkan mampu mengurangi masalah keamanan dan integritas SMS. Kata Kunci: caesar, cipher disk, kriptografi, scytale, SMS. PENDAHULUAN dibutuhkan dikarenakan SMS mudah digunakan dan biaya yang dikeluarkan Telepon seluler merupakan salah untuk mengirim SMS relatif murah. satu hasil dari perkembangan teknologi Namun banyaknya pengguna komunikasi.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Cipher Disk A
    Make It@Home: Cipher Disk A. Materials 1 Tack 1 Small Cipher Disk 1 Large Cipher Disk 1 Small Eraser Scissors B. Directions 1. Download and print the Cipher Disk.pdf document. 2. Cut out the two cipher disks. 3. Put the smaller disk on top of the larger disk and stick the tack thru the center of both disks. 4. Stick the sharp end of the tack into the eraser. This will prevent you from sticking yourself while turning the disks to make your ciphers. C. Encrypting A Code 1. Pick a letter from the smaller disk on top - this will be used as the KEY that will be shared between you and your friends to encrypt and decrypt the message. Once you have picked a letter from the smaller disk, line it up with the “A” from the larger disk. Example Key: LARGE DISK: A SMALL DISK: M KEY = A:M 2. Begin encrypting each letter of your secret message. Find the first letter of your message on the larger disk and write down the cipher letter which appears underneath it on the smaller disk. In the example below, A=M, B=L, C=K, etc. LARGE DISK: ABCDEFGHIJKLMNOPQRSTUVWXYZ SMALL DISK: MLKJIHGFEDCBAZYXWVUTSRQPON 3. Continue finding each letter until your message has been encrypted. Once you are finished, send your friend the encrypted message and KEY seperately. PLAINTEXT: MAKING CODES IS FUN CIPHERTEXT: AMCEZG KYJIU EU HSZ NOTE: Make sure your friend knows the KEY so they can use their Cipher Disk to break the code. For a super secure cipher, create a new KEY every time you send a message OR change the KEY every time you encrypt a letter.
    [Show full text]
  • Can You Keep a Secret?
    Codes and Ciphers 20 Can You Keep a Secret? Codes and ciphers have been around just about as long as there has been written language. The ability to communicate in secret – as well as the ability to peer into the secret communications of others – has been central to a surprising number of major world events throughout history, often with nations as well as lives hanging in the balance. A word first about the difference between a code and a cipher: • A code is a secret language used to disguise the meaning of a message. The simplest form is a “jargon code,” where a particular phrase corresponds to a previously defined message. “The milkman comes in the morning,” for example, could mean “the invasion begins at dawn.” • A cipher conceals what is referred to as a “plaintext” message by substituting (a “substitu- tion cipher”) and/or scrambling (a “transposition cipher”) the letters. As we shall see later, a simple substitution cipher may encrypt the message “Call me tomorrow morning” as “FDO OPH WRP RUU RZP RUQ LQJ.” For our purposes, we will use such general terms as “code,” Cryptography, sometimes called “cryptology,” is “code breaker,” “encryp- tion” and “decryption” to from the Greek, meaning “hidden writing,” and its refer both to codes and ci- use has been documented for over 2,000 years. phers, rather than repeatedly drawing the distinction between the two. Hidden Writing Cryptography, sometimes called “cryptology,” is from the Greek, meaning “hidden writing” and its use has been documented for over 2,000 years. From the beginning, codes have always been of greatest use in matters of war and diplomacy.
    [Show full text]
  • Vigenere Cryptography
    Fall 2006 Chris Christensen MAT/CSC 483 Cryptography of the Vigenère Cipher Cryptanalysis is based upon finding the ghosts of patterns of the plaintext. We have seen that an important technique of doing this is frequency analysis. So, cryptographers try to develop ciphers that are not easily attacked by frequency analysis. There are two basic ways to do this: use more than one ciphertext alphabet or encrypt more than one letter in a block. First, we will consider using more than one cipher text alphabet. Simple substitution ciphers, Caesar ciphers, multiplicative ciphers, and affine ciphers are all examples of monoalphabetic ciphers – only one ciphertext alphabet is used. Even if the original word lengths are concealed and the substitution alphabet is random, it is possible to find a solution by using frequency data, repetition patterns and information about the way letters combine with one another. What makes the solution possible is the fact that a given plain language letter is always represented by the same cipher letter. As a consequence, all the properties of plain language such as frequencies and combinations are carried over into the cipher and may be utilized for solution. In effect we could say that all such properties are invariant except that the names of the letters have been changed. It would seem then that one way to obtain greater security would be to use more than one alphabet in enciphering a message. The general system could be one that uses a number of different alphabets for encipherment, with an understanding between correspondents of the order in which the alphabets are to be used.
    [Show full text]
  • Cryptology: an Historical Introduction DRAFT
    Cryptology: An Historical Introduction DRAFT Jim Sauerberg February 5, 2013 2 Copyright 2013 All rights reserved Jim Sauerberg Saint Mary's College Contents List of Figures 8 1 Caesar Ciphers 9 1.1 Saint Cyr Slide . 12 1.2 Running Down the Alphabet . 14 1.3 Frequency Analysis . 15 1.4 Linquist's Method . 20 1.5 Summary . 22 1.6 Topics and Techniques . 22 1.7 Exercises . 23 2 Cryptologic Terms 29 3 The Introduction of Numbers 31 3.1 The Remainder Operator . 33 3.2 Modular Arithmetic . 38 3.3 Decimation Ciphers . 40 3.4 Deciphering Decimation Ciphers . 42 3.5 Multiplication vs. Addition . 44 3.6 Koblitz's Kid-RSA and Public Key Codes . 44 3.7 Summary . 48 3.8 Topics and Techniques . 48 3.9 Exercises . 49 4 The Euclidean Algorithm 55 4.1 Linear Ciphers . 55 4.2 GCD's and the Euclidean Algorithm . 56 4.3 Multiplicative Inverses . 59 4.4 Deciphering Decimation and Linear Ciphers . 63 4.5 Breaking Decimation and Linear Ciphers . 65 4.6 Summary . 67 4.7 Topics and Techniques . 67 4.8 Exercises . 68 3 4 CONTENTS 5 Monoalphabetic Ciphers 71 5.1 Keyword Ciphers . 72 5.2 Keyword Mixed Ciphers . 73 5.3 Keyword Transposed Ciphers . 74 5.4 Interrupted Keyword Ciphers . 75 5.5 Frequency Counts and Exhaustion . 76 5.6 Basic Letter Characteristics . 77 5.7 Aristocrats . 78 5.8 Summary . 80 5.9 Topics and Techniques . 81 5.10 Exercises . 81 6 Decrypting Monoalphabetic Ciphers 89 6.1 Letter Interactions . 90 6.2 Decrypting Monoalphabetic Ciphers .
    [Show full text]
  • Midterm Project - the Alberti Cipher Wheel Spring 2017
    Midterm Project - The Alberti Cipher Wheel Spring 2017 This project should consist of a short written report (about 5 pages) which includes your responses for (1)-(4), (6), (7) plus the physical Alberti wheel and video/photos illustrating its use as described in (6). Include a bibliography of sources you used. The Alberti wheel you will use is illustrated in the figure below and was used with Latin so certain letters are missing. 1. Who was Leon Battista Alberti and when did he live? Why was it so important at the time? Was it used as a monoalphabetic or polyalphabetic cipher? Why? Could it be used as the other type of cipher? (i.e., if you answer monoalphabetic, then could it be used as a polyalphabetic cipher or vis versa) 2. Describe how the Alberti cipher was used. Describe how a pointer character was used, how a key word was used and how the numbers were used to encrypt a shift.. Explain what constitutes a key for the Alberti cipher. How many different starting positions are there? 3. The Alberti cipher disk was made to be used in Latin so certain letters (like \H") are missing. In this case you have to make a decision on how these are going to be encrypted. For example, \H" is often encrypted as \FF". I believe there are six of these letters missing on the outer disk. State how you are going to encrypt them. 4. The Alberti cipher contains four numbers (1,2,3,4) on the outer wheel. If you use the \O" to encrypt zero, then we could encrypt a number using base 5 (recall that for binary numbers we used base 2, i.e., 0 and 1.) What is the number 15 (in our decimal system) in base 5 and how would you encrypt it assuming the wheel is set as in the figure.
    [Show full text]
  • SIS and Cipher Machines: 1930 – 1940
    SIS and Cipher Machines: 1930 – 1940 John F Dooley Knox College Presented at the 14th Biennial NSA CCH History Symposium, October 2013 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States License. 1 Thursday, November 7, 2013 1 The Results of Friedman’s Training • The initial training regimen as it related to cipher machines was cryptanalytic • But this detailed analysis of the different machine types informed the team’s cryptographic imaginations when it came to creating their own machines 2 Thursday, November 7, 2013 2 The Machines • Wheatstone/Plett Machine • M-94 • AT&T machine • M-138 and M-138-A • Hebern cipher machine • M-209 • Kryha • Red • IT&T (Parker Hitt) • Purple • Engima • SIGABA (M-134 and M-134-C) • B-211(and B-21) 3 Thursday, November 7, 2013 3 The Wheatstone/Plett Machine • polyalphabetic cipher disk with gearing mechanism rotates the inner alphabet. • Plett’s improvement is to add a second key and mixed alphabet to the inner ring. • Friedman broke this in 1918 Principles: (a) The inner workings of a mechanical cryptographic device can be worked out using a paper and pencil analog of the device. (b) if there is a cycle in the mechanical device (say for particular cipher alphabets), then that cycle can be discovered by analysis of the paper and pencil analog. 4 Thursday, November 7, 2013 4 The Army M-94 • Traces its roots back to Jefferson and Bazieres • Used by US Army from 1922 to circa 1942 • 25 mixed alphabets. Disk order is the key.
    [Show full text]
  • Plaintext, Encryption, Ciphertext: a History of Cryptography and Its Influence on Contemporary Society
    TOC PLAINTEXT, ENCRYPTION, CIPHERTEXT: A HISTORY OF CRYPTOGRAPHY AND ITS INFLUENCE ON CONTEMPORARY SOCIETY QUINN DUPONT PHD DISSERTATION UNIVERSITY OF TORONTO, FACULTY OF INFORMATION CHAPTER 1 “REPRESENTATION” – SUBMISSION TO SIGCIS 2015 DRAFT (PLEASE DO NOT DISTRIBUTE) 1 TOC TABLE OF CONTENTS 1.! Introduction i.! Philological complexity ii.! What do we know of cryptography? iii.! Rewriting three schemata iv.! Chapter summaries Part One: Plaintext 2.! Representation i.! Alberti’s notation ii.! Mimesis and media iii.! Ancient theories of mimesis i.! Plato’s theory of mimesis ii.! Aristotle’s theory of mimesis iv.! Late medieval and renaissance web of resemblances v.! Conventia in memory techniques from Lull to Alberti’s cipher wheel vi.! Aemulatio, analogy, and sympathy in Trithemius’ magical cryptography 3.! Media and notation i.! Francis Bacon’s artifcial languages (1605-1623) i.! Francis Bacon’s bi-literal cipher ii.! Te development of notational schemes (1605-1686) iii.! Notational discourse networks i.! Identity and the alphabet ii.! A theory of notation 4.! Codes and codeworks i.! Agrippa (a book of the dead) i.! Forensic description of Agrippa ii.! Te compiled binary iii.! Te cryptographic algorithm 1.! Encryption efect 2.! Te “self-destruct” mechanism ii.! Bitcoin iii.! Executable software Part Two: Encryption 5.! Media of perception 6.! Communication and transmission 7.! Translation and Transcription 2 TOC Part Tree: Ciphertext 8.! Otherness and order, revealed 9.! Silence 10.! Epilogue i.! Politics: Homogeneity and visibility ii.! Rise of mnenotechnologies iii.! Ubiquitous cryptography 3 PART 1 – PLAINTEXT CHAPTER 2 – REPRESENTATION PLAINTEXT In his seminal work on cryptography De componendis cifris,1 Leon Battista Alberti (1404-1472) diverts from his task of exploring and inventing cryptography systems to recall a time strolling through a garden with his friend Dati.
    [Show full text]
  • Cryptography and Data Security
    Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 1982-05 Cryptography and Data Security Denning, Dorothy E. þÿDenning, D. E., Cryptography and Data Security, Addison Wesley, May 1982. http://hdl.handle.net/10945/37163 Cryptography and 13ata Security Dorothy Elizabeth Rob,ling Denning PURDUE UNIVERSITY A VV ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts [] Menlo Park, California London II Amsterdam • Don Mills, Ontario I Sydney Library of Congress Cataloging in Publication Data Denning, Dorothy E., (Dorothy Elizabeth), 1945- Cryptography and data security. Includes bibliographical references and index. 1. Computers--Access control. 2. Cryptography. 3. Data protection. 1. Title. QA76.9.A25D46 1982 001.64'028'9 81-15012 ISBN 0-201-10150-5 AACR2 Copyright © 1982 by Addison-Wesley Publishing Company, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other- wise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. ISBN 0-201-10150-5 A BCDE FG H I J-M A-898765432 In memory of my Father, Cornelius Lowell Robling 1910-1965 Preface Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modifica- tion.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]