Poet Admits // Mute Cypher: Beam Search to Find Mutually Enciphering

Total Page:16

File Type:pdf, Size:1020Kb

Poet Admits // Mute Cypher: Beam Search to Find Mutually Enciphering Poet Admits // Mute Cypher: Beam Search to find Mutually Enciphering Poetic Texts Cole Peterson and Alona Fyshe University of Victoria [email protected], [email protected] Abstract other English poem. In a sense, Bok¨ not only turns a microbe into a genetic book, he also engineers The Xenotext Experiment implants poetry into the microbe to be, in a sense, a poet. The organ- an extremophile’s DNA, and uses that DNA to generate new poetry in a protein form. ism’s molecular machinery powers this translation The molecular machinery of life requires that between the two texts, which, at a high level, is a these two poems encipher each other un- symmetric substitution cipher between the letters, der a symmetric substitution cipher. We and is described in more detail in Section 2. The search for ciphers which permit writing under two poems (the poet’s and the organism’s) must both the Xenotext constraints, incorporating ideas play by the rules we refer to as the Xenotext Con- from cipher-cracking algorithms, and using straints: n-gram data to assess a cipher’s “writabil- ity”. Our algorithm, Beam Verse, is a beam Each text is valid natural language. search which uses new heuristics to navigate • the cipher-space. We find thousands of ci- phers which score higher than successful ci- The substitution cipher function applied to one • phers used to write Xenotext constrained texts. text, results in the other text, and vice versa. In other words, the cipher function must be sym- 1 Introduction metric. For over a decade, poet Christian Bok¨ has been Whitespace characters (space, new line) enci- • working on The Xenotext (Bok,¨ 2008), a literary ex- pher themselves, and are the only characters al- periment which aims to insert poetry into the DNA lowed identity mappings. of an extremophile organism. In contrast to pop- ular modern data storage mediums like paper and After four years of work, Bok¨ successfully wrote hard disks, DNA is more robust to accidents, and two English poems which satisfied the Xenotext requires minimal maintenance to last hundreds or constraints1, becoming the first person to do so. The even thousands of years (Cox, 2001). Many groups first challenge was finding a cipher which allows are actively pursuing efficient and stable ways to use for two valid English texts to be written. Finding DNA to encode information (Shimanovsky et al., “writable” ciphers is difficult and is the focus of this 2002; Goldman et al., 2013). With his project, Bok¨ paper. aims to leave a lasting cultural contribution inside We present Beam Verse, a language-agnostic al- of an organism, which, as a result of DNA’s durabil- gorithm driven by the target language’s n-gram data, ity and self-replicating properties, could conceivably that searches for “writable” ciphers, and suggests survive longer than all other existing works of art. words and phrases which can be written under them. Furthermore, Bok¨ aims to craft his poem so the 1 abcdefghijlmq protein it instructs the cell to produce is yet an- The two poems used the cipher (tvukyspnoxrwz) 1339 Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pages 1339–1347, Austin, Texas, November 1-5, 2016. c 2016 Association for Computational Linguistics We do not concern ourselves with the full biochem- linked, as wherever the poet uses the letter E, the cell ical constraints of The Xenotext (eg. the actual im- uses the letter T, and vice versa. If the poet was to pact of the protein and the cell’s reaction to it, or write “mute” instead of “poet”, the cell would write its viability after folding) and instead only consider “poet” instead of “mute”. the Xenotext constraints listed above. This problem sits at the intersection of natural language process- Poet’s Letter P O E T ing and cryptography, and is a prerequisite to the genetic engineering required to fully realize a liv- DNA Codon AAC GAG CCG GGC ing xenotext. Our algorithm uncovers new ciphers mRNA Codon UUG CUC GGC CCG which make satisfying the Xenotext constraints in English possible, and makes it easier for a poet of Amino Acid phenylalanine leucine glycine proline any language to investigate the feasibility of writing Cell’s Letter M U T E two mutually enciphering texts in their own tongue. Table 1: Sample translation from text through DNA to new text 2 Genetic Background This view of DNA is extremely simplistic, and DNA provides instructions to a living cell to pro- serves only to motivate and provide context for the duce a protein. DNA has a double helix structure rest of this paper. When using a codon to represent (reminiscent of a twisted ladder) and is made up of a poet’s letter and an amino acid to represent one four nucleotides: adenine, cytosine, guanine, and of the organism’s letters, many complexities arise thymine, commonly abbreviated as A, T, C, and G. which add further constraints to the text, which we Each nucleotide always appears paired with another ignore in the remainder of the paper. When actually across the “rung” of the ladder, A with T, C with G, inserting his poetry into a cell, Bok¨ struggled to get and vice versa. To transfer the data in the DNA to the organism to express the correct protein, because the protein-producing ribosome, the double helix is he failed to account for the full complexity of the “unzipped”, separating the ladder at the rungs, and a cell and caused the cell to “censor” itself (Wershler, copy of the exposed DNA sequence called an mRNA 2012). However, we consider these additional con- transcript is synthesized, pairing in the same way straints to be future work. the DNA did, with the exception that adenine in the DNA strand pairs with uracil (U) in the mRNA. The 3 Substitution Ciphers ribosome reads the mRNA as instructions to produce Substitution ciphers are among the earliest known a specific protein. A protein is a sequence of amino forms of cryptography, having existed since at least acids and each triplet of nucleotides in the mRNA the days of Caesar (Sinkov, 1966). They work by (called a codon) represents one of the twenty amino replacing one letter in the plaintext with another to acids (see Table 2) (Campbell and Reece, 2008). form the ciphertext. However, they are never used We can write in the DNA of an organism by hav- in modern cryptography because, despite a large ing a codon represent a letter. When this sequence keyspace, substitution ciphers do not change the of codons (the full poem) is read by the organism, it letter frequency between plaintext and ciphertext. then writes a sequence of amino acids, each of which When properties of the plaintext are known (like the represent a letter, in reply2. The letters in each poem language it is written in), letter or word frequency have a bijective relationship determined by the bio- data from that language can be used to quickly crack chemical processes that link them. For example, as the cipher and uncover the key. shown in Table 2, the letters E and T are mutually Every word has a deterministic encryption under 2This makes the writing lipogrammatic, as there are only 20 a cipher. The encrypted word could be nonsense, or amino acids, and one of them (Serine) must be used as the space it could be another word. The word “poet”, for ex- character. Serine is used for the space because it is the only ample, can encrypt to many other words, including amino acid to encipher itself, as both codons AGT and TCA produce it, mirroring the constraint that the space is mapped to “mute”. The “poet mute” word-pair forms what ↔ poe itself in our ciphers. we call a partial cipher, and notate as (mut). We 1340 say this partial cipher has a cardinality of three, as 4 Scoring a Cipher’s “Writability” it defines three letter pairings. A full cipher in a When scoring a cipher, an important consideration 26-letter language has a cardinality of 13. We also poe is what makes one cipher more “writable” than an- refer to ( ) as a primary cipher, because it is the mut other. We might score a cipher on the number of lowest cardinality cipher to contain the word-pairing valid words under it, as having more words at your “poet mute”. ↔ disposal makes it easier to write, but this is not nec- essarily so if all the words are all rare and useless. As no characters except whitespace are allowed To combat this, we weight words based upon their identity mappings a word-pair like “eat cat” is ↔ frequency in language, so that better, more frequent not valid, as both a and t would have to map to words contribute more to a ciphers overall score. them selves. The symmetric Xenotext constraint This values highly frequent and syntactically impor- prohibits “admits” from pairing with “cipher”, as tant words, like “the” or “and”, while also allow- the letter i would require a mapping to both d and ing a large number of infrequent words to also con- h. However, “admits” can pair with the alterna- tribute significantly to the score. However, a word’s tive spelling “cypher”, forming the primary cipher admits poe usefulness when writing mutually enciphering texts (cypher). We can combine this cipher with (mut), as is explicitly tied to its sister word under the cipher. none of the letter pairs conflict with each other – they “The” looses its usefulness if every time it is used are compatible with each other.
Recommended publications
  • Steganography: Steganography Is a Type of Secret Communication Where the Existence of a Message Is Concealed
    Steganography: Steganography is a type of secret communication where the existence of a message is concealed. You can remember this by looking at the two parts of the word “stegano – graphy.” Both parts are of Greek origin. The Greek word steganos means “covered,” and the Greek word graphein means “to write.” Thus, a literal translation of steganography could be “covered writing.” The most simple form of steganography is hiding messages and images within larger pictures, such as the hidden symbols that can be found in the US dollar bill (can you find the spiders?). There are several different forms of steganography: Invisible Inks: Even in ancient times, invisible inks were used to hide messages. One example is using lemon juice on off-white parchment; only by holding the parchment up to a light will you be able to see the secret message: Music Cipher: In this method, notes on a scale correspond with letters in the alphabet. The message can be communicated through sheet music, or actual sound. Null Cipher: A null cipher is a type of hidden message where the real message is “camouflaged” in an innocent sounding message. A famous example of a null cipher is one sent by a German Spy in WWII: Apparently neutral’s protest is thoroughly discounted and ignored. Isman hit hard. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. Taking the second letter in each word the following message emerges: Pershing sails from NY June 1. Digital Images: This fairly new method of steganography exploits the properties of digital images to hide messages.
    [Show full text]
  • Loads of Codes – Cryptography Activities for the Classroom
    Loads of Codes – Cryptography Activities for the Classroom Paul Kelley Anoka High School Anoka, Minnesota In the next 90 minutes, we’ll look at cryptosystems: Caesar cipher St. Cyr cipher Tie-ins with algebra Frequency distribution Vigenere cipher Cryptosystem – an algorithm (or series of algorithms) needed to implement encryption and decryption. For our purposes, the words encrypt and encipher will be used interchangeably, as will decrypt and decipher. The idea behind all this is that you want some message to get somewhere in a secure fashion, without being intercepted by “the bad guys.” Code – a substitution at the level of words or phrases Cipher – a substitution at the level of letters or symbols However, I think “Loads of Codes” sounds much cooler than “Loads of Ciphers.” Blackmail = King = Today = Capture = Prince = Tonight = Protect = Minister = Tomorrow = Capture King Tomorrow Plaintext: the letter before encryption Ciphertext: the letter after encryption Rail Fence Cipher – an example of a “transposition cipher,” one which doesn’t change any letters when enciphered. Example: Encipher “DO NOT DELAY IN ESCAPING,” using a rail fence cipher. You would send: DNTEAIECPN OODLYNSAIG Null cipher – not the entire message is meaningful. My aunt is not supposed to read every epistle tonight. BXMT SSESSBW POE ILTWQS RIA QBTNMAAD OPMNIKQT RMI MNDLJ ALNN BRIGH PIG ORHD LLTYQ BXMT SSESSBW POE ILTWQS RIA QBTNMAAD OPMNIKQT RMI MNDLJ ALNN BRIGH PIG ORHD LLTYQ Anagram – use the letters of one word, phrase or sentence to form a different one. Example: “Meet behind the castle” becomes “These belched a mitten.” Substitution cipher – one in which the letters change during encryption.
    [Show full text]
  • Chapter 1: Introduction
    CHAPTER 1: INTRODUCTION Introduction 1.1Steganography Steganography is a talent and science of defeat information by embedding messages contained by other, apparently risk-free communication. Steganography moving parts by replacing bits of ineffective or else unexploited data in standard computer files (such as sound, graphics, HTML, text, or even floppy disks ) through bits of dissimilar imperceptible information. This concealed information in sequence can be plain text, images, cipher, or even audio or video file. Steganography (exactly sense covered or hidden writing) years back to prehistoric Greece, where general practices consisted of drawing letters or communication in wooden tablets and wrapping them through polish, and tattooing a removed hair from messenger's head, let his hair growing back, after that removing it again when he reach a destination and get in touch with end point. 1.2 Use of Steganography Steganography from time to time is used while encryption is not acceptable. Otherwise extra frequently, in second - hand Steganography is used to additional encryption. An encrypted file may possibly at a standstill conceal information in sequence using Steganography; accordingly unvarying condition the encrypted folder or file is decrypted or deciphered. The concealed message or communication is not able to be visible. Steganography is data hidden inside another data. Steganography is a technique used with encryption as another way to protect data. These are applicable on images, videos or on audio files. In most of the cases it is used with text files but now a day’s commonly used in images also. It gives an option to overcome the problem of piracy, unauthorized information leak.
    [Show full text]
  • Decrypted Secrets
    Decrypted Secrets Methods and Maxims of Cryptology Bearbeitet von Friedrich L Bauer Neuausgabe 2006. Buch. xiv, 525 S. Hardcover ISBN 978 3 540 24502 5 Format (B x L): 15,5 x 23,5 cm Gewicht: 992 g Weitere Fachgebiete > EDV, Informatik > Datenbanken, Informationssicherheit, Geschäftssoftware > Informations- und Kodierungstheorie Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 1 Introductory Synopsis En cryptographie, aucune r`egle n’est absolue. [In cryptography, no rule is absolute.] Etienne´ Bazeries (1901) 1.1 Cryptography and Steganography We must distinguish between cryptography (Greek kryptos, hidden) and steganography (Greek steganos, covered). The term cryptographia, to mean secrecy in writing, was used in 1641 by John Wilkins, a founder with John Wallis of the Royal Society in London; the word ‘cryptography’ was coined in 1658 by Thomas Browne, a famous English physician and writer. It is the aim of cryptography to render a message incomprehensible to an un- authorized reader: ars occulte scribendi. One speaks of overt secret writing: overt in the sense of being obviously recognizable as secret writing. The term steganographia was also used in this sense by Caspar Schott, a pupil of Athanasius Kircher, in the title of his book Schola steganographia, published in Nuremberg in 1665; however, it had already been used by Trithemius in his first (and amply obscure) work Steganographia, which he began writing in 1499, to mean ‘hidden writing’.
    [Show full text]
  • Codebreakers
    1 Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • A Method for Steganography Using Edge Detection Through Operator
    7 IV April 2019 https://doi.org/10.22214/ijraset.2019.4252 International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 7 Issue IV, Apr 2019- Available at www.ijraset.com A Method for Steganography using Edge Detection through Operator Ms. Sanjukta Chakraborty1, Prof. Samir Kumar Bandyopadhyay2 1Seacom Skills University, India 2 Department of Computer Science and Engineering, University of Calcutta, India Abstract: In recent times, privacy protection is a special stream of studies to evolve new methodologies to cope up with recent threats and malicious attacks. Steganography is a method of data hiding where cover object is used to hide secret data and generates a Stego object. Since Stego objects are look-a-like of cover object, it is not readily noticeable as a carrier of hidden data. The objectives of steganography are un-detectability, robustness and embedding capacity. A new technique of image steganography is proposed using the concept of edge detection. An operator with unique feature is selected to find maximum edge strength in different orientations. Keywords: Digital Steganography, Image Steganography, Edge Detection, Operator Selection I. INTRODUCTION The basic model of Digital Steganography is composed of three types of objects: Cover or Carrier or vessel object, secret object and Stego object. In a simple manner, Cover plus Secret is equal to Stego. Depending on the type of the cover object there are different types of Digital Steganography like Image Steganography, Audio Steganography, Video Steganography and Text Steganography. Steganography is a method of data hiding where cover object is used to hide secret data and outputs a Stego object.
    [Show full text]
  • Codebreakers
    Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • A Systematic Study on Classical Cryptographic Cypher in Order to Design a Smallest Cipher
    International Journal of Scientific and Research Publications, Volume 9, Issue 12, December 2019 507 ISSN 2250-3153 A systematic study on classical cryptographic cypher in order to design a smallest cipher Md. Shamim Hossain Biswas*, Dr. Md. Asraf Ali, Dr. Mostafijur Rahman, Mr. Md. Khaled Sohel, Mr. Md. Maruf Hasan, Kausik Sarkar, Abu Shamim Aminur razzaque * Department of Software Engineering, Daffodil International University Bangladesh DOI: 10.29322/IJSRP.9.12.2019.p9662 http://dx.doi.org/10.29322/IJSRP.9.12.2019.p9662 Abstract- The cryptography is the branch of Cryptology. It is a 1.1 Classical Cypher combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of XOR cipher, NULL Cipher, Baconian Cipher, Caesar algorithm which comprise of encryption and decryption. The Cipher, ROT13 Cipher, Affine Cipher, Atbash Cipher, cipher paly important role in modern technology. The keyword cipher, Auto-key Cipher, Bifid cipher, Trifid technologies involving communication including the Internet, cipher, Railfence Cipher, ADFGVX Cipher, ADFGX Mobile Phones, Digital Television, and ATM machine rely on Cipher, Straddling Checkerboard Cipher, Permutation cipher in order to maintain security and privacy. Thinking about Cipher, Running Key Cipher, Nomenclators Cipher, Four- aforesaid importance of cipher in cryptography, in this article, square cipher, Beaufort Cipher, Base64 Cipher, Lorenz we have designed a smallest cipher which may be efficient in Cipher, Enigma Machine Cipher, Polybius Square Cipher, RFID chips. The smallest cipher has been comprised of five Simple Polybius Cipher, Porta Cipher, Vigenere Cipher, mathematical operation: Exponentiation, Multiplication, Homophonic Substitution Cipher, Playfair Cipher, Hill Addition, Subtraction and Division based on systematic study of cipher, Fractionated Morse Cipher, Scytale Cipher, Grille classical cipher.
    [Show full text]
  • Ones and Zeros Early Computers John Napier (1550
    Early Computers The definition of a Ones and Zeros computer is “a device that computes, …” The abacus could be considered the first Chapter 12 computer. Its effectiveness has withstood the test of time and it is still used in some parts of the world. Lewinter & Widulski The Saga of Mathematics 1 Lewinter & Widulski The Saga of Mathematics 2 John Napier (1550 - 1617) Napier’s Bones In 1617, Scottish Napier's Bones were mathematician John multiplication tables Napier invented a inscribed on strips of technique of using wood or bone. numbering rods for Napier’s idea led to the multiplication. invention of the slide rule The rods became known in the mid 1600s by as "Napier's Bones." William Oughtred. Lewinter & Widulski The Saga of Mathematics 3 Lewinter & Widulski The Saga of Mathematics 4 The Pascaline The Pascaline In 1642, Blaise Pascal As they agonized over the columns of figures, Pascal invented his "Pascaline" decided to build a machine that would do the job much faster and more accurately. calculator. His machine could add and subtract. Pascal, a mathematician The machine used a series of toothed wheels, which and philosopher, and his were turned by hand and which could handle numbers father, a tax official, were up to 999,999.999. compiling tax reports for Pascal’s device was also called the “numerical the French government in calculator” and was one of the world’s first mechanical adding machines. Paris. Lewinter & Widulski The Saga of Mathematics 5 Lewinter & Widulski The Saga of Mathematics 6 1 Gottfried Wilhelm von Leibniz The Step Reckoner In 1671, Gottfried von This machine could add, subtract, multiply, divide and figure Leibniz invented the square roots through a series of stepped additions.
    [Show full text]
  • List of More Than 330 Entries
    Nomenclatura List of more than 330 Entries Introduction Linda A. Bertram and Gunther van Dooble: Nomenclatura: What does a modern "Encyclopedia of Cryptography and Internet Security" offer for the education, discussion and sovereignty of learning professionals? - An interdisciplinary view on the Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Ideas, Key-Terms, Definitions and Good Practice..........................17 Access Control.............. 62 Authorization............... 79 AE - Adaptive Echo..........62 AutoCrypt...................... 80 AES - Advanced Availability.................... 80 Encryption Standard ....63 Backdoor....................... 81 AE-Token........................66 Big Seven Study Algorithm...................... 66 (2016)......................... 84 Alice and Bob.................68 Biometric Passport...... 85 Android...........................68 Birthday Problem......... 87 Anonymity.....................69 Blinding.......................... 88 Answer Method.............70 Block Cipher.................. 90 Asymmetric Calling.....71 Bluetooth....................... 92 Asymmetric Botan.............................. 92 Encryption.................71 Bouncy Castle............... 93 Attack.............................73 Broadcast (in Audit.............................. 74 Cryptography).......... 94 Authentication..............77 Brute-force Attack........94 6 Encyclopedia of modern Cryptography and Internet Security
    [Show full text]
  • The Rise of Steganography
    Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005 The Rise of Steganography Alan Siper, Roger Farley and Craig Lombardo Introduction Remember the last time you went shopping online? Remember all the pictures of clothes and electronics you viewed? What if those images weren’t really for you? What if those pants you were looking at were really detailed blueprints of military installations? You would never know. This is the nature of steganography. Revelations about this technique will be discussed in this paper. Topics will include its history, why it is used, how it works, techniques, counter- measures, risks, legal and ethical issues, and the future. History of Steganography To understand steganography, we must first understand its predecessor: cryptography. Cryptography is the art of protecting information by transforming it into an unreadable format, called cipher text. To decipher this unreadable format, a secret key is required. Cryptography has followed man through many stages of evolution. Cryptography can be found as far back as 1900 B.C. in ancient Egyptian scribe using non-standard hieroglyphics in an inscription. From 500 – 600 B.C. Hebrew scribes used ATBASH, a reversed alphabet simple solution cipher. From 50 - 60 B.C. Julius Caesar used a simple substitution with the normal alphabet in government communications. Cryptography continued through history with may variations. Today cryptography has reached a new level, quantum cryptography. Quantum cryptography combines physics and cryptography to produce a new cryptosystem that cannot be defeated without the sender and receiver having the knowledge of the attempted and failed intrusion. Through the long history of cryptography, steganography was developed and flourished on its own.
    [Show full text]
  • CNS Lecture 4 - 2
    In the news CNS Widely Deployed Software (1) CRITICAL: Apple QuickTime Multiple Vulnerabilities Lecture 4 (2) HIGH: Adobe Flash Player Multiple Vulnerabilities (3) HIGH: Microsoft Internet Explorer Compressed Content Heap Overflow(MS06-042) (4) HIGH: Microsoft Pragmatic General Multicast Buffer Overflow (MS06-052) Random Numbers (5) HIGH: Microsoft Publisher File Parsing Buffer Overflow (MS06-054) Steganography (6) MODERATE: Cisco IOS VTP Multiple Vulnerabilities (7) MODERATE: HP OpenView Multiple Vulnerabilities Classical cryptography (8) MODERATE: PHP NULL Processing Arbitrary File Overwrite (9) LOW: Microsoft Indexing Service Cross Site Scripting Vulnerability(MS06-053) Other Software Assignments ncp (10) HIGH: Multiple Products PHP File Include Vulnerabilities (11) HIGH: Multiple Products SQL Injection Vulnerabilities Hash/hmac values are binary data, you can’t use strcpy() (12) HIGH: Tagger LE Remote Code Execution or strcmp(), use memcpy() (13) MODERATE: Act Networks NetPerformer FRAD Multiple Vulnerabilities (14) MODERATE: SQL-Ledger/LedgerSMB Remote Code Execution CNS Lecture 4 - 2 Random Numbers 34495638193476348762347346 You are here … Attacks & Defenses Cryptography Applied crypto •Why? • Risk assessment •Random numbers •SSH • Generating (pseudo) random • Viruses numbers from a random seed •Hash functions •PGP • Unix security • • Sources of random bits • authentication MD5, SHA,RIPEMD S/Mime • •Classical + stego •SSL Network security Crypto Toolkit Firewalls,vpn,IPsec,IDS secret-key crypto •Number theory •Kerberos public-key
    [Show full text]