Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Cryptography CS3SR3/SE3RA3 Ryszard Janicki Acknowledgments: Material based on Computer Security: Art and Science by Matt Bishop (Chapter 9) Ryszard Janicki Cryptography 1 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Cryptography and Cryptosystems Cryptography ≡ Secret Writing in Greek Denition (Cryptosystem) A cryptosystem is a 5-tuple (E; D; M; K; C), where: M is the set of plaintexts, K is the set of keys, E = fEk j k 2 Kg, where each Ek : M ! C, is the set of enciphering functions, D = fDk j k 2 Kg, where each Dk : C ! M, is the set of deciphering functions. Ryszard Janicki Cryptography 2 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Caesar Cipher Example (Caesar Cipher) Idea: letters are shifted and key=shift. If k = 3 the A ! D; B ! E;:::; Z ! C, and HELLO ! KHOOR. M = all sequences in Roman letters = fA; B; C;:::; Zg∗, K = fi j 0 ≤ i ≤ 25g, or K = fi j 1 ≤ i ≤ 26g, E = fEk j k 2 Kg, where for each m 2 M; Ek (m) = mk , and mk is derived from m by shifting each letter by k, D = fDk j k 2 Kg, where for each c 2 C; Dk (c) = ck , and ck is derived from c by shifting back each letter by k C = M. Ryszard Janicki Cryptography 3 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Goals and Adversaries The goal of cryptography is to keep enciphered information secret. An adversary wants to break a cipher-text. Adversary knows D and E. Three types of attacks: 1 Ciphertext only - Adversary has only the ciphertext. Goal: plaintext and, if possible, the key. 2 Known Plaintext - Adversary has the ciphertext and the plaintext that was enciphered. Goal: the key 3 Chosen Plaintext - Adversary may ask that specic plaintexts be enciphered, and is given the corresponding ciphetexts. Goal: the key A good cryptosystem protects against all three types of attacks. Ryszard Janicki Cryptography 4 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Classical Cryptosystems Denition Classical cryptosystems (also called single-key or symmetric cryptosystems) are cryptosystems that use the same key for encipherement and decipherement. In these systems, for all Ek 2 C −1 and k 2 K, there is a Dk 2 D such that Dk = Ek . Example The Caesar cipher discussed earlier had a key of 3, so the enciphering function was E3. To decipher KHOOR, we used the same key in decipherment function D3. Hence, the Caesar cipher is a classical cipher. There are two basic types of classical ciphers: transposition ciphers, and substitution ciphers. Ryszard Janicki Cryptography 5 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Transposition Ciphers Denition A transposition cipher rearranges the characters in the plaintext to form the ciptertext. The letters are not changed. Example (Rail-Fence Cipher) The rail-fence cipher is composed by writing the plaintext in two rows, proceeding down, then across, and reading the ciphertext across. 1 3 5 7 1 2 3 4 5 6 7 8 =) 2 4 6 8 =) 1 3 5 7 =) 1 3 5 7 2 4 6 8 2 4 6 8 HLOOL For example: HELLOWORLD =) ELWRD =) HLOOLELWRD Ryszard Janicki Cryptography 6 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Transposition Ciphers Example (Rail-Fence Cipher. Version 2) 1 4 7 1 2 3 4 5 6 7 8 9 =) 2 5 8 =) 3 6 9 1 4 7 2 5 8 =) 1 4 7 2 5 8 3 6 9 3 6 9 HLWL For example: HELLO WORLD =) EOOD =) LR HLWLEOODL R Ryszard Janicki Cryptography 7 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Transposition Ciphers Mathematically, the key to a transposition cipher is a permutation function. Permutations does not change the frequency of plaintext characters, which provides means of attack. Example For instance because HE has frequency 3:05% in English, one may assume that in HLOOLELWRD, E should follow H, so one may try: HE LL OW OR LD Reading the letters across and down produces HELLOWORLD. Ryszard Janicki Cryptography 8 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Substitution Ciphers Denition A substitution cipher changes characters in the plaintext to produce the ciphertexts. Example Consider Caesar cipher with the key k = 3 or D, i.e. A ! D; B ! E;:::; X ! A; Y ! B; Z ! C. HELLOWORLD ! KHOORZRUOG A Caesar cipher is susceptible to a statistical ciphertext-only attack. Ryszard Janicki Cryptography 9 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Substitution Ciphers Example Ciphertext: KHOORZRUOG (length is 10 characters). Numbering of letters: A ! 0; B ! 1;:::; Z ! 25. STATISTICAL ATTACK: Frequencies of letters in KHOORZRUOG: 6 7 10 14 17 20 25 c = G H K O R U Z f (c) = 0.1 0.1 0.1 0.3 0.2 0.1 0.1 Correlation with average English text: 25 X Φ(i) = f (c)p(c − i); c=0 where p(x) are character frequencies in English (see Table 9-1 on page 11). Ryszard Janicki Cryptography 10 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Character Frequencies in English • p(0) = p(a) = 0:080; p(1) = p(b) = 0:015;:::; p(25) = p(z) = 0:002 Ryszard Janicki Cryptography 11 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Substitution Ciphers Example (continuation) Ciphertext: KHOORZRUOG. Numbering of letters: A ! 0; B ! 1;:::; Z ! 25. STATISTICAL ATTACK: For KHOORZRUOG, we have Φ(i) = 0:1p(6 − i) + 0:1p(7 − i) + 0:1p(10 − i) + 0:3p(14 − i) + 0:1p(20 − i) + 0:1p(25 − i) We are looking to the biggest Φ(i); i = 0;:::; 25. Ryszard Janicki Cryptography 12 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Values of Φ(i) for `KHOORZROOG` in English Φ(6) = 0:0660 =) KHOORZROOG ! EBIILTLOIA, Φ(10) = 0:0635 =) KHOORZROOG ! AXEEHPHKEW , Φ(3) = 0:0575 =) KHOORZROOG ! HELLOWORLD, Φ(14) = 0:0535 =) KHOORZROOG ! WTAADLDGAS, Ryszard Janicki Cryptography 13 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Vigenère Cipher Invented by Blaise de Vigenère in 1586. Denition The Vigenère cipher chooses a sequence of keys, represented by a string. The key letters are applied to successive plaintext characters, and when the end of the key is reached, the key starts over. The length of the key is called the period of the cipher. In other words, like Caesar cipher, but we use a phrase. Figure 9-3 on page 15 shows a tableau to implement this cipher eciently. Because this requires several dierent key letters, this type of cipher is called polyalphabetic. Ryszard Janicki Cryptography 14 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Ryszard Janicki Cryptography 15 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Vigenère Cipher Example Letters enumeration: A ! 0;:::; G ! 6;:::; I ! 8;:::; V ! 21;:::; Z ! 25: Message: THE BOY HAS THE BALL Key: VIG or 21-8-6. We encipher using Caesar cipher for each letter: Plaintext THEBOYHASTHEBALL Keys VIGVIGVIGVIGVIGV Ciphertext OPKWWECIYOPKWIMG, since (T + V ) mod 26 = O; (H + I ) mod 26 = P, (E + G) mod 26 = K, etc. Ryszard Janicki Cryptography 16 / 38 Cryptography Classical Cryptosystems Public Key Cryptography Cryptographic Checksums Vigenère Cipher Breaking is not easy but possible (Friedrich Kasiski in 1863). Breaking is based on the observation, that repetitions occur when characters of the key appear over the same characters in the ciphertext. Example Plaintext THE BOYHASTHE BALL Keys VIGVIGVIGVIGVIGV Ciphertext OPK WWECIYOPK WIMG, The string OPK appears twice. The ciphertext repetitions are nine character apart. Hence 9 is a multiple of the period, i.e. period must be either 3 or 9. We can then use some statistical analysis to break the cipher, however it is not easy. Ryszard Janicki Cryptography 17 / 38 7. A noted computer security expert has said that without integrity, no system can provide confidentiality. a. Do you agree? Justify your answer. b. Can a system provide integrity without confidentiality? Again, justify your answer. 8. A cryptographer once claimed that security mechanism other than cryptography were unnecessary because cryptography could provide any desired level of confidentiality and integrity. Ignoring availability, either justify or refute the cryptographer claim. 9. Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categories A, B and C, specify what type of access (read, write, both, or neither) is allowed in each of the following situations. Assume that discretionary access controls allow anyone access unless otherwise specified. a. Paul, cleared for (TOP SECRET, {A, C}), wants to access a document classified (SECRET, {B, C}). b. Anna, cleared for (CONFIDENTIAL, {C}), wants to access a document classified (CONFIDENTIAL, {B}). c. Jesse, cleared for (SECRET, {C}), wants to access a document classified (CONFIDENTIAL, {C}). d. Sammi, cleared for (TOP SECRET, {A, C}), wants to access a document classified (CONFIDENTIAL, {A}). e. Robin, who has no clearances (and so works at the UNCLASSIFIED level), wants to access a document classified (CONFIDENTIAL, {B}). 10. Give an example that demonstrates that the integrity level of subjects decreases in Biba’s low-water-mark policy. Under what conditions will the integrity level remain unchanged? 11. Decipher the following ciphertext, which was enciphered using the Caesar cipher: TEBKFKQEBZLROPBLCERJXKBSBKQP Cryptography Example (VigenèreClassical Cipher) Cryptosystems 12. Exercise 8 from page Public242 of Key Bishop’s Cryptography textbook. See below: The following messageCryptographic was Checksums enciphered with a Vigenère cipher. Find the key and decipher it: 2 SOLUTION We begin by looking for repetitions in the ciphertext. IYO appears twice 25 spaces apart. KRG also appears twice, 20 spaces apart. LVF is also repeated 55 spaces apart.
Recommended publications
  • Classical Encryption Techniques
    CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Dr. Lo’ai Tawalbeh Fall 2005 Introduction Basic Terminology • plaintext - the original message • ciphertext - the coded message • key - information used in encryption/decryption, and known only to sender/receiver • encipher (encrypt) - converting plaintext to ciphertext using key • decipher (decrypt) - recovering ciphertext from plaintext using key • cryptography - study of encryption principles/methods/designs • cryptanalysis (code breaking) - the study of principles/ methods of deciphering ciphertext Dr. Lo’ai Tawalbeh Fall 2005 1 Cryptographic Systems Cryptographic Systems are categorized according to: 1. The operation used in transferring plaintext to ciphertext: • Substitution: each element in the plaintext is mapped into another element • Transposition: the elements in the plaintext are re-arranged. 2. The number of keys used: • Symmetric (private- key) : both the sender and receiver use the same key • Asymmetric (public-key) : sender and receiver use different key 3. The way the plaintext is processed : • Block cipher : inputs are processed one block at a time, producing a corresponding output block. • Stream cipher: inputs are processed continuously, producing one element at a time (bit, Dr. Lo’ai Tawalbeh Fall 2005 Cryptographic Systems Symmetric Encryption Model Dr. Lo’ai Tawalbeh Fall 2005 2 Cryptographic Systems Requirements • two requirements for secure use of symmetric encryption: 1. a strong encryption algorithm 2. a secret key known only to sender / receiver •Y = Ek(X), where X: the plaintext, Y: the ciphertext •X = Dk(Y) • assume encryption algorithm is known •implies a secure channel to distribute key Dr.
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks
    Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks Nils Kopal University of Siegen, Germany [email protected] Abstract cuits). ANNs found usages in a broad set of dif- ferent applications and research fields. Their main There are many (historical) unsolved ci- purpose is fast filtering, classifying, and process- phertexts from which we don’t know the ing of (mostly) non-linear data, e.g. image pro- type of cipher which was used to encrypt cessing, speech recognition, and language trans- these. A first step each cryptanalyst does lation. Besides that, scientists were also able to is to try to identify their cipher types us- “teach” ANNs to play games or to create paintings ing different (statistical) methods. This in the style of famous artists. can be difficult, since a multitude of ci- Inspired by the vast growth of ANNs, also cryp- pher types exist. To help cryptanalysts, tologists started to use them for different crypto- we developed a first version of an artifi- graphic and cryptanalytic problems. Examples are cial neural network that is right now able the learning of complex cryptographic algorithms, to differentiate between five classical ci- e.g. the Enigma machine, or the detection of the phers: simple monoalphabetic substitu- type of cipher used for encrypting a specific ci- tion, Vigenere,` Playfair, Hill, and transpo- phertext. sition. The network is based on Google’s In late 2019 Stamp published a challenge on the TensorFlow library as well as Keras. This MysteryTwister C3 (MTC3) website called “Ci- paper presents the current progress in the pher ID”.
    [Show full text]
  • A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher
    International Journal of Advanced Technology & Engineering Research (IJATER) www.ijater.com A HYBRID CRYPTOSYSTEM BASED ON VIGENÈRE CIPHER AND COLUMNAR TRANSPOSITION CIPHER Quist-Aphetsi Kester, MIEEE, Lecturer Faculty of Informatics, Ghana Technology University College, PMB 100 Accra North, Ghana Phone Contact +233 209822141 Email: [email protected] / [email protected] graphy that use the same cryptographic keys for both en- Abstract cryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to Privacy is one of the key issues addressed by information go between the two keys. The keys, in practice, represent a Security. Through cryptographic encryption methods, one shared secret between two or more parties that can be used can prevent a third party from understanding transmitted raw to maintain a private information link [5]. This requirement data over unsecured channel during signal transmission. The that both parties have access to the secret key is one of the cryptographic methods for enhancing the security of digital main drawbacks of symmetric key encryption, in compari- contents have gained high significance in the current era. son to public-key encryption. Typical examples symmetric Breach of security and misuse of confidential information algorithms are Advanced Encryption Standard (AES), Blow- that has been intercepted by unauthorized parties are key fish, Tripple Data Encryption Standard (3DES) and Serpent problems that information security tries to solve. [6]. This paper sets out to contribute to the general body of Asymmetric or Public key encryption on the other hand is an knowledge in the area of classical cryptography by develop- encryption method where a message encrypted with a reci- ing a new hybrid way of encryption of plaintext.
    [Show full text]
  • EVOLUTIONARY COMPUTATION in CRYPTANALYSIS of CLASSICAL CIPHERS 1. Introduction
    Ø Ñ ÅØÑØÐ ÈÙ ÐØÓÒ× DOI: 10.1515/tmmp-2017-0026 Tatra Mt. Math. Publ. 70 (2017), 179–197 EVOLUTIONARY COMPUTATION IN CRYPTANALYSIS OF CLASSICAL CIPHERS Eugen Antal — Martin Elia´ˇs ABSTRACT. Evolutionary computation has represented a very popular way of problem solving in the recent years. This approach is also capable of effectively solving historical cipher in a fully automated way. This paper deals with empirical cryptanalysis of a monoalphabetic substitution using a genetic algorithm (GA) and a parallel genetic algorithm (PGA). The key ingredient of our contribution is the parameter analysis of GA and PGA. We focus on how these parameters affect the success rate of solving the monoalphabetic substitution. 1. Introduction Historical (also called classical) ciphers belong to historical part of cryptology. They had been used until the expansion of computers and modern cryptosys- tems. Under a classical cipher we can consider a standard cryptosystem based on commonly used definition [6]. Comparing the main properties of classical ciphers to modern cryptosystems (used nowadays) leads to major differences in their properties. Some selected differences [5] are: • The encryption algorithm of classical ciphers can be performed using paper and pencil (or some mechanical device) easily. • Classical ciphers are mostly used to encrypt text written in some natural language. • Classical ciphers are vulnerable to statistical analysis. c 2017 Mathematical Institute, Slovak Academy of Sciences. 2010 M a t h e m a t i c s Subject Classification: 94A60,68P25. K e y w o r d s: historical ciphers, grid, MPI, genetic algorithm, parallel genetic algorithm. This work was partially supported by grants VEGA 1/0159/17.
    [Show full text]
  • Language, Probability, and Cryptography
    Language, Probability, and Cryptography Adriana Salerno [email protected] Bates College MathFest 2019 I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Example 1: Random permutation of beginning of Pride and Prejudice HR HD V RBXRN XSHMKBDVYYJ VCUSOIYKPQKP RNVR V DHSQYK ZVS HS AODDKDDHOS OG V QOOP GOBRXSK ZXDR FK HS IVSR OG V IHGK NOIKMKB YHRRYK USOIS RNK GKKYHSQD OB MHKID OG DXCN V ZVS ZVJ FK OS NHD GHBDR KSRKBHSQ V SKHQNFOXBNOOP RNHD RBXRN HD DO IKYY GHTKP HS RNK ZHSPD OG RNK DXBBOXSPHSQ GVZHYHKD RNVR NK HD COSDHPKBKP RNK BHQNRGXY ABOAKBRJ OG DOZK OSK OB ORNKB OG RNKHB PVXQNRKBD ZJ PKVB ZB FKSSKR DVHP NHD YVPJ RO NHZ OSK PVJ NVMK JOX NKVBP RNVR SKRNKBGHKYP AVBU HD YKR VR YVDR ZB FKSSKR ..
    [Show full text]
  • 1. History of Cryptography Cryptography (From Greek , Hidden
    1. History of cryptography Cryptography (from Greek , hidden, and , writing), is the practice and study of secret writing(or hidden information). Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). History is filled with examples where people tried to keep information secret from adversaries. Kings and generals communicated with their troops using basic cryptographic methods to prevent the enemy from learning sensitive military information. In fact, Julius Caesar reportedly used a simple cipher, which has been named after him. As society has evolved, the need for more sophisticated methods of protecting data has increased. As the word becomes more connected, the demand for information and electronic services is growing, and with the increased demand comes increased dependency on electronic systems. Already the exchange of sensitive information, such as credit card numbers, over the internet is common practice. Protecting data and electronic system is crucial to our way of living. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. It is necessary to distinct cryptography, crypto analysis and cryptology. Cryptography is a branch of cryptology dealing with the design of system for encryption and decryption intended to ensure confidentiality, integrity and authenticity of message.
    [Show full text]
  • Cryptography
    Cryptography Cryptography 24-02-2018 Anson Ho Cryptography Origin A$@LSDHello Alice Bob Eve Cryptography Application - Military Communication Enigma German soldier A German soldier B Alan Turing Cryptography Application - HTTPS HTTP HTTPS Internet Internet ● Man-in-the-middle attack MITM ○ middle = VPN, WiFI router, … ○ attack = record / modify data Cryptography Application - Authentication Other: zero-knowledge proof Cryptography Application - Cryptocurrency ● Block chain ○ decentralization -> P2P ○ Record storage and verification are spread across the network Cryptography Application(?) - Cryptoworm Cryptography Classical Cipher ● Shift cipher ○ Caesar cipher DEF -> ABC # = 26 ○ ROT13 DEF -> QRS ● Substitution cipher ○ DEF -> SWF # = 26! ○ DEF -> PAW Cryptography Classical Cipher ● Vigenere cipher (a + b mod 26) ○ Plaintext: ATTACKATDAWN ○ Key: LEMONLEMONLE (LEMON) ○ Ciphertext: LXFOPVEFRNHR ● Transposition cipher ○ ABCDEF -> FEDCBA ○ ABCDEF -> ABC FED Cryptography Hashing ● OI ○ e.g.: rolling hash ■ will be taught in String Algorithms ○ memory, time <-> a small probability of WA ● General ○ for verification ○ a (hopefully) injective function ■ without collision (f(a) = f(b) but a != b) ○ easy to compute the value ○ difficult to compute the inverse value ○ usually not “continuous” ■ “a and b are close” does not implies “f(a) and f(b) are close” Cryptography MD5 ● A hashing function ● Software checksum ● No longer safe ● Other: ○ SHA-2 Cryptography Hashing vs Encryption ● Hashing ○ one-way ● Encryption ○ two-way ○ reverse: decryption Cryptography Symmetric / Asymmetric Key Encryption ● Symmetric Key Encryption ○ same keys for encryption and decryption ○ e.g. xor ■ 123 xor 456 = 435 ■ 435 xor 456 = 123 ○ e.g. Advanced Encryption Standard (AES) ● Asymmetric Key Encryption ○ different keys for encryption and decryption ■ one public ■ one private ■ two keys are paired, i.e. they cannot be generated independently Cryptography RSA ● Rivest–Shamir–Adleman n = pq where p and q are primes ● R.H.S.
    [Show full text]
  • Solving Substitution Ciphers
    Solving Substitution Ciphers Sam Hasinoff Department of Computer Science, University of Toronto [email protected] Abstract We present QUIPSTER, an experimental system for the automatic solu- tion of short substitution ciphers (Cryptoquotes). The system operates using an -gram model of English characters and stochastic local search over the space of ¡£¢¥¤§¦©¨ possible keys. Experimental results show a median of 94% cipher letters correctly decoded, which is typi- cally good enough for an unskilled human to finish decoding the cipher with minimal additional effort. Extensions incorporating a dictionary with word frequencies and a database of word patterns are also discussed. 1 Introduction In Arthur Conan Doyle’s short story “The Adventure of the Dancing Men” (1903), the pro- tagonist Sherlock Holmes solves a murder mystery by realizing that a series of unusual stick figure drawings (Figure 1) are actually messages encoded using a substitution cipher [5]. The substitution cipher is a well-known classical cipher in which every plaintext character in all its occurrences in a message is replaced by a unique ciphertext character. Figure 1: Dancing men ciphertext from “The Adventure of the Dancing Men” (1903). Thus, each permutation of the 26 letters of the English alphabet (there are ¡¢¤¦¨ in total) gives a unique key for encrypting a message. If a particular permutation is used to encrypt a message, then the inverse of that permutation can be used to decrypt it. A worked out example of a substitution cipher is given in Figure 2. Decoding substitution ciphers is a popular activity among amateur cryptographers and peo- ple who enjoy word puzzles.
    [Show full text]
  • Enhancing Security of Caesar Cipher Using Different Methods
    IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS Anupama Mishra [email protected] Abstract Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on combination of techniques substitution and transposition. In this paper I have focused on the well known classical techniques the aim was to induce some strength to these classical encryption for that purpose I blended classical encryption with the some more techniques. my proposed method showed that it is better in terms of providing more security to any given text message. In our experiments I took Caesaer Ciphers as representatives of Classical Techniques. To make it more secure I have used some techniques like I have used multiple level Row Transposition Ciphers, encryption with same key at each level and encryption with different key at each level. Keywords — substitution, transposition, cryptography, Caesar cipher ---------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cryptography, Conventional encryption is marked by its usage of single key for both the process of encryption and decryption In today’s information age, it is impossible to imagine without whereas in public key cryptography separate keys are used. internet. This modern era is dominated by paperless offices- Further on conventional techniques are further broken in to mail messages-cash transactions and virtual departmental Classical and Modern techniques.
    [Show full text]
  • Breaking the Enigma Code
    SAINT MARY’S COLLEGEOF CALIFORNIA MATHEMATICS SENIOR SEMINAR SENIOR ESSAY Breaking the Enigma Code Erica Musgrave Faculty Advisor: Dr. Christopher Jones May 16, 2016 1 INTRODUCTION Until the end of World War I, almost all commmunication between military per- sonnel was through transferring messages by hand or by telegram. These methods of commmunication were often challenging and slow, but the interception of the enemy’s messages was rare. As a result, people did not see the need for a high level encryption. After World War I, the radio became the primary method of contact which meant com- munication became nearly instantaneous, and it was much easier to communicate with any military station whether it was on land or at sea. However, communicating through radio also had a major consequence. It was now very easy for the enemy to intercept messages, so people soon realized the codes and encipherments that were previously used would no longer suffice. As a result, many cryptographers began to develop more advanced encryption systems [2]. Arthur Scherbius, a German inventor, was one of these cryptographers who had a desire to replace the previously inadequate cryptographic systems. He developed an electrical cipher machine called the Enigma which was not only effective but also extremely efficient and easy to use. In 1923 he started to produce and advertise his Enigma machine which resulted in the German government becoming interested in his design. Then in 1926, the German military decided to buy a large number of ma- chines and use them as their main source of encipherment, and the Enigma quickly became known as the most fearsome encryption device in history.
    [Show full text]
  • An Introduction to Cryptography
    An Introduction to Cryptography Gianluigi Me [email protected] Anno Accademico 2011/12 Overview History of Cryptography (and Steganography) Modern Encryption and Decryption Principles Symmetric Key Cryptography Stream Ciphers and Cipher Block Modes Key Management for Conventional Cryptography Attack on Bad Implementation of Cryptography: IEEE 802.11 WEP Message Authentication Public Key Cryptography Digital Signatures Key Management for Public-Key Cryptography Main sources Network Security Essential / Stallings Applied Cryptography / Schneier Handbook of Applied Cryptography / Menezes, van Oorschot, Vanstone Innovative Cryptography, N. Moldovyan , A.Moldovyan Modern Cryptography: Theory and Practice, Wenbo Mao History of Steganography and Cryptography Steganography Steganography Steganos = “covered” in Greek, Graphein = “to write” Being able to communicate secretly has always been considered an advantage Secret messages were often not written down, but rather memorized by sworn messengers Or hidden Demaratus, a Greek immigrant to Persia, reveals Persia’s intention to attack Athens. Writes the secret message on a tablet, and covers it with wax. Histaiaeus encourages Aristagoras of Miletus to revolt against the Persian King. Writes message on shaved head of the messenger, and sends him after his hair grew Chinese wrote on silk, turned into wax-covered ball that was swallowed by the messenger Steganography (cont.) Invisible Ink Certain organic fluids are transparent when dried but the deposit can be charred
    [Show full text]