Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks

Total Page:16

File Type:pdf, Size:1020Kb

Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks Of Ciphers and Neurons Detecting the Type of Ciphers Using Artificial Neural Networks Nils Kopal University of Siegen, Germany [email protected] Abstract cuits). ANNs found usages in a broad set of dif- ferent applications and research fields. Their main There are many (historical) unsolved ci- purpose is fast filtering, classifying, and process- phertexts from which we don’t know the ing of (mostly) non-linear data, e.g. image pro- type of cipher which was used to encrypt cessing, speech recognition, and language trans- these. A first step each cryptanalyst does lation. Besides that, scientists were also able to is to try to identify their cipher types us- “teach” ANNs to play games or to create paintings ing different (statistical) methods. This in the style of famous artists. can be difficult, since a multitude of ci- Inspired by the vast growth of ANNs, also cryp- pher types exist. To help cryptanalysts, tologists started to use them for different crypto- we developed a first version of an artifi- graphic and cryptanalytic problems. Examples are cial neural network that is right now able the learning of complex cryptographic algorithms, to differentiate between five classical ci- e.g. the Enigma machine, or the detection of the phers: simple monoalphabetic substitu- type of cipher used for encrypting a specific ci- tion, Vigenere,` Playfair, Hill, and transpo- phertext. sition. The network is based on Google’s In late 2019 Stamp published a challenge on the TensorFlow library as well as Keras. This MysteryTwister C3 (MTC3) website called “Ci- paper presents the current progress in the pher ID”. The goal of the challenge is to assign research of using such networks for detect- the type of cipher to each ciphertext out of a set ing the cipher type. We tried to classify all of 500 ciphertexts, while 5 different types of ci- ciphers of a new MysteryTwister C3 chal- phers were used to encrypt these ciphertexts us- lenge called “Cipher ID” created by Stamp ing random keys. Each cipher type was used ex- in 2019. The network is able to classify actly 100 times and the different ciphertexts were about 90% of the ciphertexts of the chal- shuffled then. While the intention of the author lenge correctly. Furthermore, the paper was to motivate people to start research in the field presents the current state-of-the-art of ci- of machine learning and cipher type detection, all pher type detection. Finally, we present previous solvers solved the challenge by breaking a method which shows that one can save the ciphertexts using solvers for the 5 different ci- about 54% computation time for classifi- pher types. Thus, after revealing the plaintext of cation of cipher types when using our arti- each cipher, the participants knew which type of ficial neural network instead of trying dif- encryption algorithm was used. ferent solvers for all ciphertext messages We started to work on the cipher type detec- of Stamp’s challenge. tion problem in 2019 with the intention to de- 1 Introduction tect the ciphers’ types solely using ANNs. Ten- sorFlow (Abadi et al., 2016) and Keras (Chol- Artificial neural networks (ANNs) experienced a let, 2015) were used. TensorFlow is a free and renaissance over the past years. Supported by the open-source data flow and math library devel- development of easy-to-use software libraries, e.g. oped by Google written in Python, C++, and TensorFlow and Keras, as well as the wide range CUDA, and was publicly released in 2015. Keras of new powerful hardware (especially graphic card is a free and open-source library for developing processors and application-specific integrated cir- ANNs developed by Chollet and also written in Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 77 Python. In 2017 Google’s TensorFlow team de- 2 Related Work cided to support Keras in the TensorFlow core li- In this section, we present different papers and ar- brary. While working on the cipher type detection ticles, which deal with ANNs and cryptology. The problem, Stamp’s challenge was published. We usage of ANNs in the paper ranges between the then adapted our code and tools to the require- emulation of ciphers, the detection of the cipher ments of the challenge. Therefore, in this paper, type, and the recovering of cryptographic keys. we present our current progress of implementing Also, there are papers where the authors worked a cipher type detection ANN with the help of the with other techniques to detect the cipher type. aforementioned libraries especially for the MTC3 challenge. At the time of writing this paper, we are 1. Ibrahem (Khalel Ibrahem Al-Ubaidy, 2004) able to classify the type of ciphers of the afore- presents two ideas: First, to determine the mentioned challenge at a success rate of about key from a given plaintext-ciphertext pair. He 90%. Despite this relatively good detection rate calls this the “cryptanalysis approach”. Sec- it is still not good enough to solve the challenge ond, the emulation of an unknown cipher. on its own. Therefore, we also propose a first idea He calls this the “emulation approach”. He of a detection (and solving) method for ciphertexts used an ANN with two hidden layers in his with unknown cipher types. approach. For training his model he used The contributions and goals of this paper are: Levenberg-Marquardt (LM). He successfully trains Vigenere` cipher as well as two different 1. First public ANN classifier for classical ci- stream ciphers (GEFFE and THRESHOLD, phers developed with TensorFlow and Keras. which are both linear feedback shift regis- ters). 2. Presentation of the basics of ANNs to the au- dience of HistoCrypt, who are from differ- 2. Chandra (Chandra et al., 2007) present their ent research areas, e.g. history and linguistics method of cipher type identification. They (but mostly no computers scientists). created different ANNs which are able to dis- tinguish between different modern ciphers, 3. Example Python code which can be used to e.g. RC6 and Serpent. Their ANN architec- directly implement our methods in Tensor- ture is comparable small, consisting only of Flow and Keras. 2 hidden layers, where each layer has at most 25 neurons. They used different techniques 4. Overview of the existing work in the field of to map from the ciphertext to 400 “input pat- ANNs and cryptanalysis of classical/histori- terns”, which they fed to their network. cal ciphers and cipher type detection. 3. Sivagurunathan (Sivagurunathan et al., 2010) 5. Presentation of a first idea of a method which created an ANN with one hidden layer to does both, cipher type detection and solving distinguish between Vigenere` cipher, Hill ci- of classical ciphers. pher, and Playfair cipher. While their net- work was able to detect Playfair ciphers with The rest of this paper is structured as follows: an accuracy of 100%, the detection rate of Vi- Section 2 presents the related work in the field genere` and Hill was between 69% and 85%, of machine learning and cryptanalysis with a fo- depending on their test scenarios. cus on ANNs. Section 3 shows the founda- tion on which we created our methods. Here, 4. The BION classifiers from BION’s gadget 1 firstly we discuss ANNs in general. Secondly, we website are browser-based classifiers, inte- briefly present TensorFlow as well as Keras. After grated in two well working cipher type de- that, Section 4 presents our cipher type detection tection methods built in JavaScript. The first approach based on the aforementioned libraries. one works with random decision forests and Then, Section 5 discusses our first ideas for a ci- the second one is based on a multitude of pher type detection and solving method. Finally, ANNs. The basic idea with the second clas- Section 6 briefly concludes the paper and gives an sifier (ANN-based) is, that the different net- overview of planned future work with regards to works (different layers, activation functions, ANNs and cryptology. 1see https://bionsgadgets.appspot.com/ Proceedings of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020 78 etc.) each have a “vote” for the cipher type. 1 O In the end, the votes are shown, and the cor- b rect cipher type probably has the most votes. I1 O The classifiers are able to detect the cipher types defined by the American cryptogram I2 O ( association (ACM). ... ... ... 5. Nuhn and Knight’s (Nuhn and Knight, 2014) ) extensive work on cipher type detection used I O a support vector machine based on the lib- n SVM toolkit (Chang and Lin, 2011). In their Figure 1: A single neuron of an ANN with inputs, work, they used 58 different features to suc- outputs, bias, and activation function cessfully classify 50 different cipher types out of 56 cipher types specified by the Amer- ican cryptogram association (ACA). 3 Foundation 6. Greydanus (Greydanus, 2017) used recurrent In this section, we describe the foundation used neural networks (RNN) to learn the Enigma. for our detection method. First, we discuss the An RNN has connections going from succes- ANN in general. Then, we give an introduction sive hidden layer neurons to neurons in pre- to TensorFlow and Keras and show some example ceding layers. He showed that an RNN with Python code building an ANN. a 3000-unit long short-term memory cell can learn the decryption function of an Enigma 3.1 Artificial Neural Network machine with three rotors, of a Vigenere` ci- Artificial neural networks (ANNs) are computing pher, and of a Vigenere` Autokey cipher. Fur- models (organized as graphs) that are in principle thermore, he created an RNN network which inspired by the human brain.
Recommended publications
  • Classical Encryption Techniques
    CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Dr. Lo’ai Tawalbeh Fall 2005 Introduction Basic Terminology • plaintext - the original message • ciphertext - the coded message • key - information used in encryption/decryption, and known only to sender/receiver • encipher (encrypt) - converting plaintext to ciphertext using key • decipher (decrypt) - recovering ciphertext from plaintext using key • cryptography - study of encryption principles/methods/designs • cryptanalysis (code breaking) - the study of principles/ methods of deciphering ciphertext Dr. Lo’ai Tawalbeh Fall 2005 1 Cryptographic Systems Cryptographic Systems are categorized according to: 1. The operation used in transferring plaintext to ciphertext: • Substitution: each element in the plaintext is mapped into another element • Transposition: the elements in the plaintext are re-arranged. 2. The number of keys used: • Symmetric (private- key) : both the sender and receiver use the same key • Asymmetric (public-key) : sender and receiver use different key 3. The way the plaintext is processed : • Block cipher : inputs are processed one block at a time, producing a corresponding output block. • Stream cipher: inputs are processed continuously, producing one element at a time (bit, Dr. Lo’ai Tawalbeh Fall 2005 Cryptographic Systems Symmetric Encryption Model Dr. Lo’ai Tawalbeh Fall 2005 2 Cryptographic Systems Requirements • two requirements for secure use of symmetric encryption: 1. a strong encryption algorithm 2. a secret key known only to sender / receiver •Y = Ek(X), where X: the plaintext, Y: the ciphertext •X = Dk(Y) • assume encryption algorithm is known •implies a secure channel to distribute key Dr.
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • A Hybrid Cryptosystem Based on Vigenère Cipher and Columnar Transposition Cipher
    International Journal of Advanced Technology & Engineering Research (IJATER) www.ijater.com A HYBRID CRYPTOSYSTEM BASED ON VIGENÈRE CIPHER AND COLUMNAR TRANSPOSITION CIPHER Quist-Aphetsi Kester, MIEEE, Lecturer Faculty of Informatics, Ghana Technology University College, PMB 100 Accra North, Ghana Phone Contact +233 209822141 Email: [email protected] / [email protected] graphy that use the same cryptographic keys for both en- Abstract cryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to Privacy is one of the key issues addressed by information go between the two keys. The keys, in practice, represent a Security. Through cryptographic encryption methods, one shared secret between two or more parties that can be used can prevent a third party from understanding transmitted raw to maintain a private information link [5]. This requirement data over unsecured channel during signal transmission. The that both parties have access to the secret key is one of the cryptographic methods for enhancing the security of digital main drawbacks of symmetric key encryption, in compari- contents have gained high significance in the current era. son to public-key encryption. Typical examples symmetric Breach of security and misuse of confidential information algorithms are Advanced Encryption Standard (AES), Blow- that has been intercepted by unauthorized parties are key fish, Tripple Data Encryption Standard (3DES) and Serpent problems that information security tries to solve. [6]. This paper sets out to contribute to the general body of Asymmetric or Public key encryption on the other hand is an knowledge in the area of classical cryptography by develop- encryption method where a message encrypted with a reci- ing a new hybrid way of encryption of plaintext.
    [Show full text]
  • EVOLUTIONARY COMPUTATION in CRYPTANALYSIS of CLASSICAL CIPHERS 1. Introduction
    Ø Ñ ÅØÑØÐ ÈÙ ÐØÓÒ× DOI: 10.1515/tmmp-2017-0026 Tatra Mt. Math. Publ. 70 (2017), 179–197 EVOLUTIONARY COMPUTATION IN CRYPTANALYSIS OF CLASSICAL CIPHERS Eugen Antal — Martin Elia´ˇs ABSTRACT. Evolutionary computation has represented a very popular way of problem solving in the recent years. This approach is also capable of effectively solving historical cipher in a fully automated way. This paper deals with empirical cryptanalysis of a monoalphabetic substitution using a genetic algorithm (GA) and a parallel genetic algorithm (PGA). The key ingredient of our contribution is the parameter analysis of GA and PGA. We focus on how these parameters affect the success rate of solving the monoalphabetic substitution. 1. Introduction Historical (also called classical) ciphers belong to historical part of cryptology. They had been used until the expansion of computers and modern cryptosys- tems. Under a classical cipher we can consider a standard cryptosystem based on commonly used definition [6]. Comparing the main properties of classical ciphers to modern cryptosystems (used nowadays) leads to major differences in their properties. Some selected differences [5] are: • The encryption algorithm of classical ciphers can be performed using paper and pencil (or some mechanical device) easily. • Classical ciphers are mostly used to encrypt text written in some natural language. • Classical ciphers are vulnerable to statistical analysis. c 2017 Mathematical Institute, Slovak Academy of Sciences. 2010 M a t h e m a t i c s Subject Classification: 94A60,68P25. K e y w o r d s: historical ciphers, grid, MPI, genetic algorithm, parallel genetic algorithm. This work was partially supported by grants VEGA 1/0159/17.
    [Show full text]
  • Language, Probability, and Cryptography
    Language, Probability, and Cryptography Adriana Salerno [email protected] Bates College MathFest 2019 I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Cipher: XYZABCDEFGHIJKL... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... Substitution ciphers Julius Caesar 100 - 40 BCE Example: Shift the letters in the alphabet a fixed amount. I Plain: ABCDEFGHIJKLMNO... I Cipher: XYZABCDEFGHIJKL... Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. For example, permutations of the English alphabet. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. Substitution ciphers In general: Substitution ciphers are maps from one alphabet to another. Definition A simple substitution cipher is any function from one alphabet to another of the same size. For example, permutations of the English alphabet. Example 1: Random permutation of beginning of Pride and Prejudice HR HD V RBXRN XSHMKBDVYYJ VCUSOIYKPQKP RNVR V DHSQYK ZVS HS AODDKDDHOS OG V QOOP GOBRXSK ZXDR FK HS IVSR OG V IHGK NOIKMKB YHRRYK USOIS RNK GKKYHSQD OB MHKID OG DXCN V ZVS ZVJ FK OS NHD GHBDR KSRKBHSQ V SKHQNFOXBNOOP RNHD RBXRN HD DO IKYY GHTKP HS RNK ZHSPD OG RNK DXBBOXSPHSQ GVZHYHKD RNVR NK HD COSDHPKBKP RNK BHQNRGXY ABOAKBRJ OG DOZK OSK OB ORNKB OG RNKHB PVXQNRKBD ZJ PKVB ZB FKSSKR DVHP NHD YVPJ RO NHZ OSK PVJ NVMK JOX NKVBP RNVR SKRNKBGHKYP AVBU HD YKR VR YVDR ZB FKSSKR ..
    [Show full text]
  • 1. History of Cryptography Cryptography (From Greek , Hidden
    1. History of cryptography Cryptography (from Greek , hidden, and , writing), is the practice and study of secret writing(or hidden information). Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) — conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). History is filled with examples where people tried to keep information secret from adversaries. Kings and generals communicated with their troops using basic cryptographic methods to prevent the enemy from learning sensitive military information. In fact, Julius Caesar reportedly used a simple cipher, which has been named after him. As society has evolved, the need for more sophisticated methods of protecting data has increased. As the word becomes more connected, the demand for information and electronic services is growing, and with the increased demand comes increased dependency on electronic systems. Already the exchange of sensitive information, such as credit card numbers, over the internet is common practice. Protecting data and electronic system is crucial to our way of living. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. It is necessary to distinct cryptography, crypto analysis and cryptology. Cryptography is a branch of cryptology dealing with the design of system for encryption and decryption intended to ensure confidentiality, integrity and authenticity of message.
    [Show full text]
  • Cryptography
    Cryptography Cryptography 24-02-2018 Anson Ho Cryptography Origin A$@LSDHello Alice Bob Eve Cryptography Application - Military Communication Enigma German soldier A German soldier B Alan Turing Cryptography Application - HTTPS HTTP HTTPS Internet Internet ● Man-in-the-middle attack MITM ○ middle = VPN, WiFI router, … ○ attack = record / modify data Cryptography Application - Authentication Other: zero-knowledge proof Cryptography Application - Cryptocurrency ● Block chain ○ decentralization -> P2P ○ Record storage and verification are spread across the network Cryptography Application(?) - Cryptoworm Cryptography Classical Cipher ● Shift cipher ○ Caesar cipher DEF -> ABC # = 26 ○ ROT13 DEF -> QRS ● Substitution cipher ○ DEF -> SWF # = 26! ○ DEF -> PAW Cryptography Classical Cipher ● Vigenere cipher (a + b mod 26) ○ Plaintext: ATTACKATDAWN ○ Key: LEMONLEMONLE (LEMON) ○ Ciphertext: LXFOPVEFRNHR ● Transposition cipher ○ ABCDEF -> FEDCBA ○ ABCDEF -> ABC FED Cryptography Hashing ● OI ○ e.g.: rolling hash ■ will be taught in String Algorithms ○ memory, time <-> a small probability of WA ● General ○ for verification ○ a (hopefully) injective function ■ without collision (f(a) = f(b) but a != b) ○ easy to compute the value ○ difficult to compute the inverse value ○ usually not “continuous” ■ “a and b are close” does not implies “f(a) and f(b) are close” Cryptography MD5 ● A hashing function ● Software checksum ● No longer safe ● Other: ○ SHA-2 Cryptography Hashing vs Encryption ● Hashing ○ one-way ● Encryption ○ two-way ○ reverse: decryption Cryptography Symmetric / Asymmetric Key Encryption ● Symmetric Key Encryption ○ same keys for encryption and decryption ○ e.g. xor ■ 123 xor 456 = 435 ■ 435 xor 456 = 123 ○ e.g. Advanced Encryption Standard (AES) ● Asymmetric Key Encryption ○ different keys for encryption and decryption ■ one public ■ one private ■ two keys are paired, i.e. they cannot be generated independently Cryptography RSA ● Rivest–Shamir–Adleman n = pq where p and q are primes ● R.H.S.
    [Show full text]
  • Solving Substitution Ciphers
    Solving Substitution Ciphers Sam Hasinoff Department of Computer Science, University of Toronto [email protected] Abstract We present QUIPSTER, an experimental system for the automatic solu- tion of short substitution ciphers (Cryptoquotes). The system operates using an -gram model of English characters and stochastic local search over the space of ¡£¢¥¤§¦©¨ possible keys. Experimental results show a median of 94% cipher letters correctly decoded, which is typi- cally good enough for an unskilled human to finish decoding the cipher with minimal additional effort. Extensions incorporating a dictionary with word frequencies and a database of word patterns are also discussed. 1 Introduction In Arthur Conan Doyle’s short story “The Adventure of the Dancing Men” (1903), the pro- tagonist Sherlock Holmes solves a murder mystery by realizing that a series of unusual stick figure drawings (Figure 1) are actually messages encoded using a substitution cipher [5]. The substitution cipher is a well-known classical cipher in which every plaintext character in all its occurrences in a message is replaced by a unique ciphertext character. Figure 1: Dancing men ciphertext from “The Adventure of the Dancing Men” (1903). Thus, each permutation of the 26 letters of the English alphabet (there are ¡¢¤¦¨ in total) gives a unique key for encrypting a message. If a particular permutation is used to encrypt a message, then the inverse of that permutation can be used to decrypt it. A worked out example of a substitution cipher is given in Figure 2. Decoding substitution ciphers is a popular activity among amateur cryptographers and peo- ple who enjoy word puzzles.
    [Show full text]
  • Enhancing Security of Caesar Cipher Using Different Methods
    IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS Anupama Mishra [email protected] Abstract Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on combination of techniques substitution and transposition. In this paper I have focused on the well known classical techniques the aim was to induce some strength to these classical encryption for that purpose I blended classical encryption with the some more techniques. my proposed method showed that it is better in terms of providing more security to any given text message. In our experiments I took Caesaer Ciphers as representatives of Classical Techniques. To make it more secure I have used some techniques like I have used multiple level Row Transposition Ciphers, encryption with same key at each level and encryption with different key at each level. Keywords — substitution, transposition, cryptography, Caesar cipher ---------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Cryptography, Conventional encryption is marked by its usage of single key for both the process of encryption and decryption In today’s information age, it is impossible to imagine without whereas in public key cryptography separate keys are used. internet. This modern era is dominated by paperless offices- Further on conventional techniques are further broken in to mail messages-cash transactions and virtual departmental Classical and Modern techniques.
    [Show full text]
  • Breaking the Enigma Code
    SAINT MARY’S COLLEGEOF CALIFORNIA MATHEMATICS SENIOR SEMINAR SENIOR ESSAY Breaking the Enigma Code Erica Musgrave Faculty Advisor: Dr. Christopher Jones May 16, 2016 1 INTRODUCTION Until the end of World War I, almost all commmunication between military per- sonnel was through transferring messages by hand or by telegram. These methods of commmunication were often challenging and slow, but the interception of the enemy’s messages was rare. As a result, people did not see the need for a high level encryption. After World War I, the radio became the primary method of contact which meant com- munication became nearly instantaneous, and it was much easier to communicate with any military station whether it was on land or at sea. However, communicating through radio also had a major consequence. It was now very easy for the enemy to intercept messages, so people soon realized the codes and encipherments that were previously used would no longer suffice. As a result, many cryptographers began to develop more advanced encryption systems [2]. Arthur Scherbius, a German inventor, was one of these cryptographers who had a desire to replace the previously inadequate cryptographic systems. He developed an electrical cipher machine called the Enigma which was not only effective but also extremely efficient and easy to use. In 1923 he started to produce and advertise his Enigma machine which resulted in the German government becoming interested in his design. Then in 1926, the German military decided to buy a large number of ma- chines and use them as their main source of encipherment, and the Enigma quickly became known as the most fearsome encryption device in history.
    [Show full text]
  • An Introduction to Cryptography
    An Introduction to Cryptography Gianluigi Me [email protected] Anno Accademico 2011/12 Overview History of Cryptography (and Steganography) Modern Encryption and Decryption Principles Symmetric Key Cryptography Stream Ciphers and Cipher Block Modes Key Management for Conventional Cryptography Attack on Bad Implementation of Cryptography: IEEE 802.11 WEP Message Authentication Public Key Cryptography Digital Signatures Key Management for Public-Key Cryptography Main sources Network Security Essential / Stallings Applied Cryptography / Schneier Handbook of Applied Cryptography / Menezes, van Oorschot, Vanstone Innovative Cryptography, N. Moldovyan , A.Moldovyan Modern Cryptography: Theory and Practice, Wenbo Mao History of Steganography and Cryptography Steganography Steganography Steganos = “covered” in Greek, Graphein = “to write” Being able to communicate secretly has always been considered an advantage Secret messages were often not written down, but rather memorized by sworn messengers Or hidden Demaratus, a Greek immigrant to Persia, reveals Persia’s intention to attack Athens. Writes the secret message on a tablet, and covers it with wax. Histaiaeus encourages Aristagoras of Miletus to revolt against the Persian King. Writes message on shaved head of the messenger, and sends him after his hair grew Chinese wrote on silk, turned into wax-covered ball that was swallowed by the messenger Steganography (cont.) Invisible Ink Certain organic fluids are transparent when dried but the deposit can be charred
    [Show full text]
  • Classical Encryption Techniques
    Classical Encryption Techniques • Introduction • Symmetric Cipher Model • Substitution Ciphers • Transposition (permutation) Ciphers • Product Ciphers (rotor machines) • Steganograpy 1 Introduction • all classical encryption algorithms are private-key • sender and recipient share a common key • was only type prior to invention of public- key in 1970’s • Acronyms: conventional / private-key / single-key 2 Symmetric Cipher Model1 there must be a secure mechanism for the distribution of this key a priori 3 The size of the key space is 26! 4 * 1026; only 25 for shift cipher Caesar cipher: Substitution 4 Symmetric Cipher Model2 • two requirements for secure use of symmetric encryption: – a strong encryption algorithm – a secret key known only to sender / receiver c = EK(m) m = DK(c) • assume encryption algorithm is known – Low cost chip implementations • implies a secure channel to distribute key – The principal security problem 5 Symmetric Cipher Model3 • Cryptography can characterize by: – type of encryption operations used • substitution / transposition / product – number of keys used • single-key or private / two-key or public – way in which plaintext is processed • block / stream 6 Symmetric Cipher Model4 • Two approaches to attack: – Cryptanalysis • Algorithm and some knowledge of plaintext or even plaintext-ciphertext are known • Attempt to deduce plaintext or the key being used – Brute-force attack • Try to find the key based on a ciphertext • On average, half of all possible keys must be tried 7 Symmetric Cipher Model5 • 5 types of cryptanalytic attacks on encrypted messages • ciphertext only – Opponents only know algorithm / ciphertext – Can use brute-force to try all possible keys, or – Can use statistical tests to identify plaintext • known plaintext – Opponents know algorithm/ciphertext & some plaintext-cyphertext pairs using the same key – E.g.
    [Show full text]