Analysis of the Zodiac 340-Cipher

Total Page:16

File Type:pdf, Size:1020Kb

Analysis of the Zodiac 340-Cipher San Jose State University SJSU ScholarWorks Master's Theses Master's Theses and Graduate Research 2008 Analysis of the Zodiac 340-cipher Thanǵ̆ Đaò San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_theses Recommended Citation Đao,̀ Thang,́̆ "Analysis of the Zodiac 340-cipher" (2008). Master's Theses. 3570. DOI: https://doi.org/10.31979/etd.bp2s-67qe https://scholarworks.sjsu.edu/etd_theses/3570 This Thesis is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Theses by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. ANALYSIS OF THE ZODIAC 340-CIPHER A Thesis Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Thang Dao May 2008 UMI Number: 1458137 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. ® UMI UMI Microform 1458137 Copyright 2008 by ProQuest LLC. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 E. Eisenhower Parkway PO Box 1346 Ann Arbor, Ml 48106-1346 ©2008 Thang Dao ALL RIGHT RESERVED APPROVED FOR THE DEPARTMENT OF COMPUTER SCIENCE Professor Mark Stamp fh^cMJl /<UJ?^— Professor Michael Beeson ley Herwifcf (SAVDS Inc.) APPROVED FOR THE UNIVERSITY aOi ABSTRACT ANALYSIS OF THE ZODIAC 340-CIPHER by Thang Dao The main purpose of this project is to determine whether the method used in the Zodiac 340-cipher (Z340) letter was a homophonic substitution, an improved version of the well-known simple substitution. A homophonic substitution employs a "one-to-many mapping" technique, as opposed to the "one-to-one mapping" of a simple substitution [3]. Due to the complexity of the homophonic substitution, an exhaustive solution to the Z340 is not possible in a feasible amount of time. This research proposes an approach to implement an automated solution to a homophonic substitution based on a hill-climb technique [4]. The software will be used to attempt to solve the Z340. Even if the software fails to solve the Z340, useful conclusions could be drawn. The objective is to reduce the number of methods that could have been used to encrypt the original message. ACKNOWLEDGEMENTS I would like to extend my gratitude to the followings persons. Without them, my research study could never have been completed: My advisor, Professor Mark Stamp, for his resources, invaluable insights, and patience. My committee member, Dr. Stanley Herwitz, for his motivation and editing skills. My committee member, Professor Michael Beeson, for his useful comments. And especially, to my lovely wife, Trannie Dao, for her encouragement, motivation, patience, and support. v TABLE OF CONTENTS 1. Introduction 1 1.1. The problem... 1 1.2. Prior work 2 1.3. Proposed solution 2 2. Zodiac Ciphers 3 2.1. Introduction to Zodiac ciphers 3 2.2.Z408 4 2.2.1. Z408 time line 4 2.2.2. Z408 Part 1, sent to Vallejo Times-Herald 5 2.2.3. Z408 Part 2, sent to San Francisco Chronicle 5 2.2.4. Z408 Part 3, sent to San Francisco Examiner 6 2.2.5. Z408, the original message 6 2.3.Z340 6 2.3.1. Z340 time line 6 2.3.2. Z340, sent to San Francisco Chronicle 7 vi 2.4. Z13 - The Zodiac's 3rd cipher 8 2.4.1. Z13 time line 8 2.4.2. Z13, sent to San Francisco Chronicle 9 2.5. Z32 - The Zodiac's 4th cipher 9 2.5.1. Z32 time line 9 2.5.2. Z32, sent to San Francisco Chronicle 9 3. Analysis of Zodiac Ciphers 10 3.1.Z408 10 3.1.1. Z408 decryption method 10 3.1.2. Z408 cipher alphabet 10 3.1.3. Z408 plaintext - ciphertext mappings 12 3.1.4. Z408 known errors 12 3.1.5. Z408 letters' frequency and theoretical keyspace 14 3.2.Z340 14 3.2.1. Z340 cipher alphabet 14 3.2.2. Z340 letters' frequency and theoretical keyspace 16 vii 3.3. Comparison between Z408 and Z340 16 3.3.1. Cipher class 16 3.3.2. Zodiac alphabet and a special character 17 4. Z340 Possible Encryption Methods 18 4.1. Rationale for selecting possible encryption methods 18 4.2. Simple substitution 20 4.2.1. Definition 20 4.2.2. Dictionary-based attacks 21 4.2.2.1. Overview 21 4.2.2.2. Disadvantages 22 4.2.3. Statistics-based attacks 22 4.3. Z340 possible encryption methods 23 4.3.1. One-time pad 23 4.3.2. Polyalphabetic substitution 25 5. Description of the Homophonic Substitution 26 6. Analysis of the Homophonic Substitution 28 viii 6.1. Theoretical keyspace 28 6.2. Dictionary-based attacks 28 6.3. Statistics-based attacks 29 7. Modifications to normal Frequency-based attack 30 7.1. Greedy algorithm variants 30 7.2. Employing higher-level N-graphs 31 8. Hill-climb Algorithm 32 8.1. Introduction 32 8.2. A single local optimum search 32 8.3. Hill-climb Algorithm Advantages 34 8.4. Hill-climb Algorithm Disadvantages 35 9. Structure Design of HCA on Homophonic Substitution 36 9.1. Selecting starting nodes 36 9.2. Finding and swapping adjacent nodes 40 9.3. Score calculation formula 42 10. Test Suite 1 and Results 44 ix 10.1. Test Suite 1 44 10.1.1. Original message and its corresponding ciphertext 44 10.1.2. Plaintext letters'frequency 46 10.1.3. Cipher symbols'frequency 46 10.1.4. Test Suite 1 actual plaintext-ciphertext mappings 47 10.2.1st experimental run 47 10.3. Discussion 48 11. Hill-climb Algorithm Optimization 48 11.1. Randomization Algorithm 48 11.2. Improved score calculation formula 49 12. Test Suite 1 Results using Optimized Hill-climb Algorithm 50 12.1. Definition of a Crib 50 12.2. Report format 50 12.3. 2nd experimental run - Test 1 - No Crib used 51 12.4. 2nd experimental run - Test 2-1 known Crib 52 12.5. 2nd experimental run - Test 3-2 known Cribs 54 x 12.6.2nd experimental run - Test 4-3 known Cribs 55 12.7. Discussion 57 13. Test Suite 2 and Results 57 13.1. Test Suite 2 57 13.1.1. Original message 57 13.1.2. Plaintext letters'frequency 58 13.1.3. Cipher symbols'frequency 59 13.1.4. Test Suite 2 actual plaintext-ciphertext mappings 59 13.2. Results 60 13.2.1.3rd experimental run - Test 1 - No Crib used 60 13.2.2. 3rd experimental run - Test 2-1 known Crib 60 13.3. Discussion 61 14. Applying the Optimized Hill-climb Algorithm to Z340 62 14.1. Test run 1 - No Crib 62 14.2. Test run 2 - 1 Crib 63 15. Conclusions 65 xi References 67 Appendix A: Test Suite 2 message 69 Appendix B: Zodiac Cover Letters 76 xii LIST OF TABLES Table 1: Z408 in numeric form 10 Table 2: Z408 plaintext-ciphertext mappings 12 Table 3: Z408 inconsistency 13 Table 4: Z340 in numeric form 15 Table 5: Hill-climb algorithm: total keyspace after ten swappings 40 Table 6: Test Suite 1: ciphertext in numeric form 45 Table 7: Test Suite 1: results using original HCA 47 Table 8: Test Suite 1: 2nd experimental run: test 1 result 51 Table 9: Test Suite 1: 2nd experimental run: test 2 result 53 Table 10: Test Suite 1: 2nd experimental run: test 3 result 54 Table 11: Test Suite 1: 2nd experimental run: test 4 result 55 Table 12: Test Suite 2: 3rd experimental run: test 1 result 60 Table 13: Test Suite 2: 3rd experimental run: test 2 result 61 Table 14: Z340 Test run 1 62 Table 15: Z340 Test run 2 64 xiii LIST OF FIGURES Figure 1: Z408 Part 1 5 Figure 2: Z408 Part 2 5 Figure 3: Z408 Part 3 6 Figure 4: Z340 8 Figure 5: Zodiac's "My name is..." cipher 9 Figure 6: Zodiac's "Button" cipher 9 Figure 7: Z408 symbols' frequency 14 Figure 8: Z340 symbols' frequency 16 Figure 9: An example of simple substitution mappings 20 Figure 10: An example of a Caesar cipher 25 Figure 11: An example of a Homophonic substitution 27 Figure 12: An example of two local optima (Illustrated by Apple Grapher software in 3D mode) 34 Figure 13: An example of the Hill-climb algorithm advantages (Illustrated by Apple Grapher software in 2D mode) 35 xiv Figure 14: An example of the Hill-climb algorithm disadvantages (Illustrated by Apple Grapher software in 3D mode) 36 Figure 15: English letters frequency 38 Figure 16: Test Suite 1 plaintext letters' frequency 46 Figure 17: Test Suite 1 ciphertext letters frequency 46 Figure 18: Test Suite 1 actual plaintext-ciphertext mappings 47 Figure 19: Test Suite 2 plaintext letters' frequency 58 Figure 20: Test Suite 2 ciphertext letters' frequency 59 Figure 21: Test Suite 2 actual plaintext-ciphertext mappings 59 Figure 22: Z408 Part 1 cover letter 76 Figure 23: Z408 Part 2 cover letter 77 Figure 24: Z408 Part 3 cover letter 78 Figure 25: Z340 cover letter 79 Figure 26: Z13 cover letter 80 Figure 27: Z32 cover letter 81 xv LIST OF LISTINGS Listing 1: Hill-climb algorithm: a single local optimum search 33 Listing 2: Hill-climb algorithm: selecting starting nodes 38 Listing 3: Hill-climb algorithm: finding swappable nodes .41 Listing 4: Hill-climb algorithm: score calculation formula 43 Listing 5: Hill-climb algorithm: apply randomization 49 xvi 1.
Recommended publications
  • Words Should Be Fun: Scrabble As a Tool for Language Preservation in Tuvan and Other Local Languages1
    Vol. 4 (2010), pp. 213-230 http://nflrc.hawaii.edu/ldc/ http://hdl.handle.net/10125/4480 Words should be fun: Scrabble as a tool for language preservation in Tuvan and other local languages1 Vitaly Voinov The University of Texas at Arlington One small but practical way of empowering speakers of an endangered language to maintain their language’s vitality amidst a climate of rapid globalization is to introduce a mother-tongue version of the popular word game Scrabble into their society. This paper examines how versions of Scrabble have been developed and used for this purpose in various endangered or non-prestige languages, with a focus on the Tuvan language of south Siberia, for which the author designed a Tuvan version of the game. Playing Scrab- ble in their mother tongue offers several benefits to speakers of an endangered language: it presents a communal approach to group literacy, promotes the use of a standardized orthography, creates new opportunities for intergenerational transmission of the language, expands its domains of usage, and may heighten the language’s external and internal prestige. Besides demonstrating the benefits of Scrabble, the paper also offers practical suggestions concerning both linguistic factors (e.g., choice of letters to be included, cal- culation of letter frequencies, dictionary availability) and non-linguistic factors (board de- sign, manufacturing, legal issues, etc.) relevant to producing Scrabble in other languages for the purpose of revitalization. 1. INTRODUCTION.2 The past several decades have seen globalization penetrating even the most remote corners of the world, bringing with them popular American exports such as Coca-Cola and Hollywood movies.
    [Show full text]
  • Questions These Questions Are in a Specific Order. 1. What Is Scrabble
    Questions Re: The Game of Scrabble Radio Interview - 14th March 2019 - 2AIRFM These questions are in a specific order. 1. What is Scrabble? 2:30 sec. 2. Who invented it? 1:40 sec 3. Why is it called Scrabble? 30 sec 4. Why play Scrabble? 1:30 sec 5. Why should I join a Scrabble Club? 2:30 sec 6. What dictionary should I use? 3:00 mins. 7. Why are there weird words in the Scrabble Dictionary? 3:00 mins 8. What should I know? 2:30 sec 9. What is a good score in Scrabble? 1 min 10. How can I improve my Scrabble score? 1 min 11. How did you get interested in Scrabble? 1 min That’s eleven questions the volume has been turned up to 11! These are some suggestions for songs to be played between breaks:- Words of love – the Beatles G.L.O.R.I.A. - Them featuring Van Morrison Words - the Bee Gees V.A.C.A.T.I.O.N. - Connie Francis Words - Neil Young D.I.V.O.R.C.E. - Tammy Wynette https://soundcloud.com/user147680538/community-interview-14th-march-2019 1. What is Scrabble? The game of Scrabble has been around since 1933 in one form or another in Western society, so I’ve always thought that everyone would have least heard of it. It wasn’t until recently that I realised there are people out there who don’t know what it is. Oddly enough, one of my relatives who is a very worldly character having run various clubs in his day, whom you would have thought was very knowledgeable brought this fact home to me, he was unaware of what it is.
    [Show full text]
  • Classifying Classic Ciphers Using Machine Learning
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 5-20-2019 Classifying Classic Ciphers using Machine Learning Nivedhitha Ramarathnam Krishna San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Artificial Intelligence and Robotics Commons, and the Information Security Commons Recommended Citation Krishna, Nivedhitha Ramarathnam, "Classifying Classic Ciphers using Machine Learning" (2019). Master's Projects. 699. DOI: https://doi.org/10.31979/etd.xkgs-5gy6 https://scholarworks.sjsu.edu/etd_projects/699 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Classifying Classic Ciphers using Machine Learning A Project Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Nivedhitha Ramarathnam Krishna May 2019 © 2019 Nivedhitha Ramarathnam Krishna ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Classifying Classic Ciphers using Machine Learning by Nivedhitha Ramarathnam Krishna APPROVED FOR THE DEPARTMENT OF COMPUTER SCIENCE SAN JOSÉ STATE UNIVERSITY May 2019 Dr. Mark Stamp Department of Computer Science Dr. Thomas Austin Department of Computer Science Professor Fabio Di Troia Department of Computer Science ABSTRACT Classifying Classic Ciphers using Machine Learning by Nivedhitha Ramarathnam Krishna We consider the problem of identifying the classic cipher that was used to generate a given ciphertext message.
    [Show full text]
  • Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis ⋆
    Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis ⋆ Bing Sun1,2,4, Meicheng Liu2,3, Jian Guo2, Vincent Rijmen5, Ruilin Li6 1 College of Science, National University of Defense Technology, Changsha, Hunan, P.R.China, 410073 2 Nanyang Technological University, Singapore 3 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China, 100093 4 State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, P.R. China, 100878 5 Dept. Electrical Engineering (ESAT), KU Leuven and iMinds, Belgium 6 College of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, P.R.China, 410073 happy [email protected] [email protected] [email protected] [email protected] [email protected] Abstract. Impossible differential and zero correlation linear cryptanal- ysis are two of the most important cryptanalytic vectors. To character- ize the impossible differentials and zero correlation linear hulls which are independent of the choices of the non-linear components, Sun et al. proposed the structure deduced by a block cipher at CRYPTO 2015. Based on that, we concentrate in this paper on the security of the SPN structure and Feistel structure with SP-type round functions. Firstly, we prove that for an SPN structure, if α1 → β1 and α2 → β2 are possi- ble differentials, α1|α2 → β1|β2 is also a possible differential, i.e., the OR “|” operation preserves differentials. Secondly, we show that for an SPN structure, there exists an r-round impossible differential if and on- ly if there exists an r-round impossible differential α → β where the Hamming weights of both α and β are 1.
    [Show full text]
  • Theory and Practice of Cryptography: Lecture 1
    Theory and Practice of Cryptography From Classical to Modern About this Course All course materials: http://saweis.net/crypto.shtml Four Lectures: 1. History and foundations of modern cryptography. 2. Using cryptography in practice and at Google. 3. Theory of cryptography: proofs and definitions. 4. A special topic in cryptography. Classic Definition of Cryptography Kryptósgráfo , or the art of "hidden writing", classically meant hiding the contents or existence of messages from an adversary. Informally, encryption renders the contents of a message unintelligible to anyone not possessing some secret information. Steganography, or "covered writing", is concerned with hiding the existence of a message -- often in plain sight. Scytale Transposition Cipher Caesar Substitution Cipher Zodiac Cipher Vigenère Polyalphabetic Substitution Key: GOOGLE Plaintext: BUYYOUTUBE Ciphertext: HIMEZYZIPK Rotor-based Polyalphabetic Ciphers Steganography He rodotus tattoo and wax tablets Inv is ible ink Mic rodots "Th e Finger" Priso n gang codes Low-order bits Codes Codes replace a specific piece of plaintext with a predefined code word. Codes are essentially a substitution cipher, but can replace strings of symbols rather than just individual symbols. Examples: "One if by land, two if by sea." Beale code Numbers stations ECB Mode Kerckhoffs' Principle A cryptosystem should be secure even if everything about it is public knowledge except the secret key. Do not rely on "security through obscurity". One-Time Pads Generate a random key of equal length to your message, then exclusive-or (XOR) the key with your message. This is information theoretically secure...but: "To transmit a large secret message, first transmit a large secret message" One time means one time.
    [Show full text]
  • Consonants, Vowels and Letter Frequency Stephen J
    This article was downloaded by:[Canadian Research Knowledge Network] On: 8 January 2008 Access Details: [subscription number 789349985] Publisher: Psychology Press Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Language and Cognitive Processes Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713683153 Transposed-letter effects: Consonants, vowels and letter frequency Stephen J. Lupker a; Manuel Perea b; Colin J. Davis c a University of Western Ontario, London, ON, Canada b Universitat de València, València, Spain c Royal Holloway University of London, Egham, UK Online Publication Date: 01 January 2008 To cite this Article: Lupker, Stephen J., Perea, Manuel and Davis, Colin J. (2008) 'Transposed-letter effects: Consonants, vowels and letter frequency', Language and Cognitive Processes, 23:1, 93 - 116 To link to this article: DOI: 10.1080/01690960701579714 URL: http://dx.doi.org/10.1080/01690960701579714 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article maybe used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
    [Show full text]
  • Letter Frequency Analysis of Languages Using Latin Alphabet
    International Linguistics Research; Vol. 1, No. 1; 2018 ISSN 2576-2974 E-ISSN 2576-2982 https://doi.org/10.30560/ilr.v1n1p18 Letter Frequency Analysis of Languages Using Latin Alphabet Gintautas Grigas1 & Anita Juškevičienė1 1 Institute of Data Science and Digital Technologies, Vilnius University, Lithuania Correspondence: Anita Juškevičienė, Institute of Data Science and Digital Technologies, Vilnius University, Akademijos str. 4, LT-08663, Vilnius, Lithuania. Tel: 370-5210-9314. E-mail: [email protected], [email protected] Received: February 23, 2018; Accepted: March 8, 2018; Published: March 26, 2018 Abstract The evaluation of the peculiarities of alphabets, particularly the frequency of letters is essential when designing keyboards, analysing texts, designing alphabet-based games, and doing some text mining. Thus, it is important to determine what might be useful for designers of text input tools, and of other technologies related to sets of letters. Knowledge of common features among different languages gives an opportunity to take advantage of the experience of other languages. Nowadays an increasing amount of texts is published on the Internet. In order to adequately compare the frequencies of letters in different languages used in the online space, Wikipedia texts have been selected as a source material for investigation. This paper presents the Method of the Adjacent Letter Frequency Differences in the frequency line, which helps to evaluate frequency breakpoints. This is a uniform evaluation criterion for 25 main languages using Latin script in order to highlight the similarities and differences among them. Research focuses on the letter frequency analysis in the area of rarely used native letters and frequently used foreign letters in a particular language.
    [Show full text]
  • An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 13, NO. 1, Jan. 2019 435 Copyright ⓒ 2019 KSII An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers Guoyong Han1,2, Wenying Zhang1,* and Hongluan Zhao3 1 School of Information Science and Engineering, Shandong Normal University, Jinan, China [e-mail: [email protected]] 2 School of Management Engineering, Shandong Jianzhu University, Jinan, China [e-mail: [email protected]] 3 School of Computer Science and Technology, Shandong Jianzhu University, Jinan, China *Corresponding author: Wenying Zhang Received January 29, 2018; revised June 6, 2018; accepted September 12, 2018; published January 31, 2019 Abstract Impossible differential cryptanalysis is an essential cryptanalytic technique and its key point is whether there is an impossible differential path. The main factor of influencing impossible differential cryptanalysis is the length of the rounds of the impossible differential trail because the attack will be more close to the real encryption algorithm with the number becoming longer. We provide the upper bound of the longest impossible differential trails of several important block ciphers. We first analyse the national standard of the Russian Federation in 2015, Kuznyechik, which utilizes the 16-byte LFSR to achieve the linear transformation. We conclude that there is no any 3-round impossible differential trail of the Kuznyechik without the consideration of the specific S-boxes. Then we ascertain the longest impossible differential paths of several other important block ciphers by using the matrix method which can be extended to many other block ciphers. As a result, we show that, unless considering the details of the S-boxes, there is no any more than or equal to 5-round, 7-round and 9-round impossible differential paths for KLEIN, Midori64 and MIBS respectively.
    [Show full text]
  • Shift Cipher Substitution Cipher Vigenère Cipher Hill Cipher
    Lecture 2 Classical Cryptosystems Shift cipher Substitution cipher Vigenère cipher Hill cipher 1 Shift Cipher • A Substitution Cipher • The Key Space: – [0 … 25] • Encryption given a key K: – each letter in the plaintext P is replaced with the K’th letter following the corresponding number ( shift right ) • Decryption given K: – shift left • History: K = 3, Caesar’s cipher 2 Shift Cipher • Formally: • Let P=C= K=Z 26 For 0≤K≤25 ek(x) = x+K mod 26 and dk(y) = y-K mod 26 ʚͬ, ͭ ∈ ͔ͦͪ ʛ 3 Shift Cipher: An Example ABCDEFGHIJKLMNOPQRSTUVWXYZ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 • P = CRYPTOGRAPHYISFUN Note that punctuation is often • K = 11 eliminated • C = NCJAVZRCLASJTDQFY • C → 2; 2+11 mod 26 = 13 → N • R → 17; 17+11 mod 26 = 2 → C • … • N → 13; 13+11 mod 26 = 24 → Y 4 Shift Cipher: Cryptanalysis • Can an attacker find K? – YES: exhaustive search, key space is small (<= 26 possible keys). – Once K is found, very easy to decrypt Exercise 1: decrypt the following ciphertext hphtwwxppelextoytrse Exercise 2: decrypt the following ciphertext jbcrclqrwcrvnbjenbwrwn VERY useful MATLAB functions can be found here: http://www2.math.umd.edu/~lcw/MatlabCode/ 5 General Mono-alphabetical Substitution Cipher • The key space: all possible permutations of Σ = {A, B, C, …, Z} • Encryption, given a key (permutation) π: – each letter X in the plaintext P is replaced with π(X) • Decryption, given a key π: – each letter Y in the ciphertext C is replaced with π-1(Y) • Example ABCDEFGHIJKLMNOPQRSTUVWXYZ πBADCZHWYGOQXSVTRNMSKJI PEFU • BECAUSE AZDBJSZ 6 Strength of the General Substitution Cipher • Exhaustive search is now infeasible – key space size is 26! ≈ 4*10 26 • Dominates the art of secret writing throughout the first millennium A.D.
    [Show full text]
  • Chapter 6: the Great Sphinx - Symbol for Christ
    Chapter 6: The Great Sphinx - Symbol For Christ “‘And behold, I am coming quickly, and My reward is with Me, to give to every one according to his work. I am the Alpha and the Omega, the Beginning and the End, the First and the Last.’ Blessed are those who do His commandments, that they may have the right to the tree of life…” - Rev. 22:12-14 The opening Scripture for this chapter makes it very clear that Yahshua has always existed, and that all matter, time, and space began - and will end - with Him. As shown in previous chapters, Yahshua is stating that He is the Alpha and Omega to tell us that He embodies every letter in the alphabet, and every word in our vocabularies. This is a direct analogy of His status as the true, and only Word of God. His appellation as the Alpha and Omega also suggests that Yahshua will ultimately have the first and last word in all disputes. Though this is first made clear in the Book of Isaiah - in connection with Christ in His role as Yahweh, the Creator (Isaiah 44:6; 48:12) - Yahshua applies it to Himself without any ambiguity in the Book of Revelation. By calling Himself “the Beginning and the End,” and “the First and the Last,” Yahshua was implying that He is the beginning and end of the Zodiac, of the Universe, and of time itself. But how, you may wonder, does this relate to the Great Sphinx, which is the subject of this chapter? In the other books in the Language of God Book Series, it was shown that the Great Sphinx may mark both the beginning and end of the Zodiac, and the beginning and end of time.
    [Show full text]
  • An Improved Arabic Keyboard Layout
    Sci.Int.(Lahore),33(1),5-15,2021 ISSN 1013-5316; CODEN: SINTE 8 5 AN IMPROVED ARABIC KEYBOARD LAYOUT 1Amjad Qtaish, 2Jalawi Alshudukhi, 3Badiea Alshaibani, 4Yosef Saleh, 5Salam Bazrawi College of Computer Science and Engineering, University of Ha'il, Ha'il, Saudi Arabia. [email protected], [email protected], [email protected], [email protected], [email protected] ABSTRACT: One of the most important human–machine interaction (HMI) systems is the computer keyboard. The keyboard layout (KL) dictates how a person interacts with a physical keyboard through the way in which the letters, numbers, punctuation marks, and symbols are mapped and arranged on the keyboard. Mapping letters onto the keys of a keyboard is complex because many issues need to be taken into considerations, such as the nature of the language, finger fatigue, hand balance, typing speed, and distance traveled by fingers during typing and finger movements. There are two main kinds of KL: English and Arabic. Although numerous research studies have proposed different layouts for the English keyboard, there is a lack of research studies that focus on the Arabic KL. To address this lack, this study analyzed and clarified the limitations of the standard legacy Arabic KL. Then an efficient Arabic KL was proposed to overcome the limitations of the current KL. The frequency of Arabic letters and bi-gram probabilities were measured on a large Arabic corpus in order to assess the current KL and to design the improved Arabic KL. The improved Arabic KL was then evaluated and compared against the current KL in terms of letter frequency, finger-travel distance, hand and finger balance, bi-gram frequency, row distribution, and most frequent words.
    [Show full text]
  • Encryption Block Cipher
    10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits.
    [Show full text]