CS 241 Data Organization Ciphers

Total Page:16

File Type:pdf, Size:1020Kb

CS 241 Data Organization Ciphers CS 241 Data Organization Ciphers March 22, 2018 Cipher • In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption. • When using a cipher, the original information is known as plaintext, and the encrypted form as ciphertext. • The encrypting procedure of the cipher usually depends on a piece of auxiliary information, called a key. • A key must be selected before using a cipher to encrypt a message. • Without knowledge of the key, it should be difficult, if not nearly impossible, to decrypt the resulting ciphertext into readable plaintext. Substitution Cipher • In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system. • Example: case insensitive substitution cipher using a shifted alphabet with keyword "zebras": • Plaintext alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ • Ciphertext alphabet: ZEBRASCDFGHIJKLMNOPQTUVWXY flee at once. we are discovered! Enciphers to SIAA ZQ LKBA. VA ZOA RFPBLUAOAR! Other substitution ciphers Caesar cipher Shift alphabet by fixed amount. (Caesar apparently used 3.) ROT13 Replace letters with those 13 away. Used to hide spoilers on newsgroups. pigpen cipher Replace letters with symbols. Substitution Cipher: Encipher Example OENp(ENTE#X@EN#zNp(ENCL]pEnN7p-pE;8N]LN} dnEdNp#Nz#duN-Nu#dENXEdzE9pNCL]#L8NE;p-b @];(N0G;p]9E8N]L;GdENn#uE;p]9Nld-L/G]@]p _8NXd#|]nENz#dNp(EN9#uu#LNnEzEL;E8NXd#u# pENp(ENQELEd-@NOE@z-dE8N-LnN;E9GdENp(EN^ @E;;]LQ;N#zN<]bEdp_Np#N#Gd;E@|E;N-LnN#Gd NT#;pEd]p_8Nn#N#dn-]LN-LnNE;p-b@];(Np(]; N5#L;p]pGp]#LNz#dNp(ENCL]pEnN7p-pE;N#zN) uEd]9-D Breaking a Substitution Cipher In English, • The most common character is the space: \ ". • Letters in order of frequency are: ETAONRISHDLFCMUGYPWBVKXJQZ • Letter pairs in order of frequency are: TH HE AN RE ER IN ON AT ND ST ES EN OF TE ED OR TI HI AS TO • Doubled letters in order of frequency are: LL EE SS OO TT FF RR NN PP CC MM Substitution Cipher: plaintext & Map We the People of the United States, in Order to form a =51 more perfect Union, establish Justice, insure domestic e=39 Tranquility, provide for the common defense, promote t=28 the general Welfare, and secure the Blessings of Liberty o=24 to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America. [ N] [!%] ["Z] [#1] [$f] [%=] [&r] ['I] [( ] [)U] [*,] [+a] [,8] [-m] [.D] [/y] [0P] [1'] [2\] [33] [4h] [5?] [6t] [7K] [8"] [9W] [:.] [;c] [<:] [=o] [>F] [?{] [@R] [A)] [B^] [C5] [Dj] [EA] [Fv] [GM] [H$] [IY] [J0] [Ke] [L<] [Mq] [NH] [O}] [PT] [Q+] [R`] [S7] [Tl] [UC] [Vx] [WO] [X&] [Y[] [Z2] [[g] [\>] []s] [^J] [_!] [`V] [a-] [bb] [c9] [dn] [eE] [fz] [gQ] [h(] [i]] [j4] [ki] [l@] [mu] [nL] [o#] [pX] [q/] [rd] [s;] [tp] [uG] [v|] [wS] [x*] [y_] [z6] [{k] [|B] [}w] Substitution Map Generator: Globals #include<stdio.h> #defineASCII_START 32 #defineASCII_END 126 #defineMAP_SIZE 94 char map[MAP_SIZE]; • Program that creates a substitution map based on the first letter of the plaintext message. • The program creates a one-to-one map of all printable ASCII characters. Substitution Map Generator: buildMap void buildMap(char seed) • seed: first number in the { int i; pseudo-random sequence. int m=94; int a=189; • m, a, c: constants chosen to int c=53; int n=seed; give pseudo-random behaviour. for (i=0; i<MAP_SIZE; i++) { • for loop body: generates a n = (a*n + c) % m; pseudo-random number map[i] = n+ASCII_START; between 0 and m, maps } character i+ASCII_START to } n+ASCII_START Substitution Map Generator: printMap void printMap(void) { int i; for (i=0; i<MAP_SIZE; i++) { printf ("[%c%c]", i+ASCII_START, map [i ]); if ((i % 16) == 15) printf("\n"); } printf ("\n"); } Substitution Map Generator: main void main(void) { char c=getchar(); buildMap(c); printMap(); inti=0; while (c!= EOF) { if (c < ASCII_START) break; if (c > ASCII_END) break; if (i % 40 == 0) printf("\n"); printf ("%c", map[c-ASCII_START]); c=getchar(); i ++; } printf ("\n"); } Book Cipher A book cipher is a cipher in which the key is some aspect of a book or other piece of text. A message is typically encoded by three numbers for each letter: • Page • Line • Word Where the encoded letter is the first letter of the specified word. It is typically essential that both correspondents not only have the same book, but the same edition. One-time pad • Random key (or \pad") is at least as long as the text. • Add plaintext to key (modulo 26) to encrypt. • Subtract key from ciphertext to decrypt. • Destroy the key after use. • Problems: • Truly random key is hard to produce • How to exchange the key securely? • Never ever use the key again. • Modern stream ciphers mimic the one-time pad. Modern Cipher Categories Stream Ciphers Applied to a continuous stream of symbols. Algorithms applied to small blocks (1 to 16 bytes) are often still called stream ciphers. Block Ciphers Applied to blocks of symbols. Symmetric Key Algorithms The same key is used for both encryption and decryption. For example: RC4 (used in Secure Sockets Layer (SSL) ). Asymmetric Key Algorithms A different key is used for both encryption and decryption. For example: RSA which uses public / private key pairs. RSA: Key Generation 1. Choose two distinct prime numbers p and q. The primes should be chosen uniformly at random and should be of similar bit-length. 2. Compute the divisor, n = pq, to be used in the modulus operation. 3. Compute φ(pq) = (p − 1)(q − 1). The totient, φ, of a positive integer n is defined to be the number of positive integers less than or equal to n that are coprime to n. 4. Choose an integer e such that 1 < e < φ(pq), and e and φ(pq) are coprime. 5. Find d:(ed − 1) can be evenly divided by φ(p − 1)(q − 1). 6. The public key consists of the modulus n and e. 7. The private key consists of the modulus n and d. Linear Congruential Generator (LCG) A Linear Congruential Generator is one of the oldest and best known pseudorandom number generator algorithms: Xn+1 = (aXn + c) mod m where Xn is the sequence of pseudorandom values, and • Modulus: m; 0 < m • Multiplier: a; 0 < a < m • Increment: c; 0 ≤ c < m • Seed: X0; 0 ≤ X0 < m LCG example Example: Xn+1 = (7Xn + 11) mod 18; X0 = 0: X1 = (7(0) + 11) mod 18 = 11 X2 = (7(11) + 11) mod 18 = 16 X3 = (7(16) + 11) mod 18 = 15 X4 = (7(15) + 11) mod 18 = 8 LCG with Pseudorandom Behavior Xn+1 = (aXn + c) mod m • All of the values, a, c, m, and Xn used in an LCG are integers. • The sequence of integers in an LCG can never have a period greater than m. Why? • Some values of the modulus, multiplier and increment yield a sequence with maximum period and with good pseudorandom behavior. LCG with Pseudorandom Behavior An LCG will have a full period if and only if: • c and m are coprime (have no common factor > 1) • a − 1 is divisible by all prime factors of m, • a − 1 is a multiple of 4 if m is a multiple of 4. LCGs in Common Use Source m a c Numerical Recipes 232 1664525 1013904223 Borland C/C++ 232 22695477 1 glibc (used by GCC) 231 1103515245 12345 ANSI C: Watcom, Digital 231 1103515245 12345 Mars, CodeWarrior, IBM Visu- alAge C/C++ Borland Delphi, Virtual Pascal 232 134775813 1 32 Microsoft Visual/Quick 2 214013 (343FD16) 2531011 (269EC316) C/C++ Microsoft Visual Basic (6 and 224 1140671485 12820163 earlier) (43FD43FD16) (C39EC316) RtlUniform from Native API 231 − 1 2147483629 2147483587 (7FFFFFED16) (7FFFFFC316) Apple CarbonLib 231 − 1 16807 0 MMIX by Donald Knuth 264 6364136223846793005 1442695040888963407 Newlib 264 6364136223846793005 1 VAX's MTH$RANDOM, old 232 69069 1 versions of glibc Java's java.util.Random 248 25214903917 11 LC53 in Forth 232 − 5 232 − 333333333 0 Note: LCG's do not always return all of the bits in the values they produce. Example: Java produces 48 bits, but only returns the 32 most significant. table from http://en.wikipedia.org/wiki/Linear_congruential_generator Linear Congruential Generator in C #include<stdio.h> void main (void) 136235578099065 { unsigned long m = 1 << 31; 15519887047211639486 unsigned long a = 1103515245; 13838650204930187039 unsigned long c = 12345; 3346717808905085548 unsigned long x = 123456; 3049859088482533429 7398829542172257482 15952872801263783483 int i; 9897407542008592728 for (i=1; i<=100; i++) 12436645181455133361 8967167257519066006 { 15551416184959193879 x = (a*x + c) % m; 14392011937321128708 printf ("%20lu\n", x); 7012146815830884589 } 837494824685357858 9089108537697995187 } 4486637365379619696 10706175307392302825 3333036225721595758 15798734497693109775 1184521088365346460 762097951296315557 14053214745497771130 13752776674615655467 4036971838066272392 13168213029112046113 2176075275402511942 11251131393832824839 9338128740141843764 7951965562090585949 Toy Linear Congruential Generator 0 #include<stdio.h> 1 void main (void) 8 { int m = 18; 3 inta=7; 4 intc=1; 11 intx=0; 6 7 int i; 14 for (i=1; i<=28; i++) 9 { 10 printf ("%4d\n", x); 17 x = (a*x + c) % m; 12 } 13 } 2 15 16 5 0 1 8 3 4 11 6 7 14 9 Poor Linear Congruential Generator void main(void) This LCG does NOT { have a full period. int m = 18; How can this be 0 inta=6; intc=1; known before 1 intx=0; computing it? 7 int i; 7 for (i=1; i<=14; i++) (6 × 7 + 1) mod 18 7 { 7 printf ("%4d\n", x); (42 + 1) mod 18 x = (a*x + c) % m; 43 mod 18 7 } 7 7 } 7 7 7 7 7 7 Question: Linear Congruential Generator The output is: #include<stdio.h> A:7513 void main(void) { int m = 10; B:7574 inta=2; intc=1; C:7567 intx=7; D:7526 int i; for (i=1; i<=4; i++) E:7537 { printf ("%d", x); x = (a*x + c) % m; } printf ("\n"); } XOR Cipher Lab The cipher used in this project: • Encrypts plain text messages consisting solely of the printable ASCII characters.
Recommended publications
  • Grade 7/8 Math Circles Cryptography What Is Cryptography? Caesar Cipher
    Faculty of Mathematics Centre for Education in Waterloo, Ontario N2L 3G1 Mathematics and Computing Grade 7/8 Math Circles Winter 2015 - March 24/25 Cryptography What is Cryptography? Cryptography is the study of protecting, coding, storing and transmitting information and messages so that only those who are intended to may read it. In other words, it is the study of secret messages and codes. Encryption is the conversion of messages to the secret code, called ciphertext. In order to read the information normally, one must decrypt the ciphertext, converting it back into plaintext. Today, we will look at some different types of cryptography that are used. Caesar Cipher The first ciphertext that we will look at is Caesar Cipher. This ciphertext was used by Julius Caesar so that his messages could not be read by his enemies if intercepted. The cipher is used by shifting the alphabet. We use a number which will be the amount we shift the alphabet to get the ciphertext. The following is an example of a shift of 5: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z V W X Y Z A B C D E F G H I J K L M N O P Q R S T U Notice how each letter in the ciphertext is moved over 5 letters from the plaintext. So, the word \MATHEMATICS" in ciphertext would appear as \HVOCZHVODXN". Decrypt the message \NUWJ HKRAO YDKYKHWPA" using Caesar Cipher with a shift of 4.
    [Show full text]
  • Grade 6 Math Circles Cryptography Solutions Atbash Cipher Caesar Cipher
    Faculty of Mathematics Centre for Education in Waterloo, Ontario N2L 3G1 Mathematics and Computing Grade 6 Math Circles November 5/6 2019 Cryptography Solutions Hello World Khoor Zruog Hello Zruog Khoor Khoor Zruog World 1. Person A encrypts plaintext 2. Person B receives ciphertext 3. Person B decrypts ciphertext back into ciphertext into plaintext Atbash Cipher Examples 1. Encrypt \Math Circles" using the Atbash cipher. Nzgs Xrixovh 2. Decrypt \ORLM PRMT" using the Atbash cipher. LION KING Caesar Cipher Examples: Encrypt or decrypt the following messages using the shift number given in parentheses: a) Welcome to Math Circles! (5) Bjqhtrj yt Rfym Hnwhqjx! plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext F G H I J K L M N O P Q R S T U V W X Y Z A B C D E 1 b) Ljw hxd anjm cqrb? (9) Can you read this? plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext J K L M N O P Q R S T U V W X Y Z A B C D E F G H I c) What if I did a Caesar Shift of 26 units on \Welcome to Math Circles!"? A Caesar shift of 26 would be shifting by the length of the alphabet. For example I would be shifting A 26 letters to the right.
    [Show full text]
  • Loads of Codes – Cryptography Activities for the Classroom
    Loads of Codes – Cryptography Activities for the Classroom Paul Kelley Anoka High School Anoka, Minnesota In the next 90 minutes, we’ll look at cryptosystems: Caesar cipher St. Cyr cipher Tie-ins with algebra Frequency distribution Vigenere cipher Cryptosystem – an algorithm (or series of algorithms) needed to implement encryption and decryption. For our purposes, the words encrypt and encipher will be used interchangeably, as will decrypt and decipher. The idea behind all this is that you want some message to get somewhere in a secure fashion, without being intercepted by “the bad guys.” Code – a substitution at the level of words or phrases Cipher – a substitution at the level of letters or symbols However, I think “Loads of Codes” sounds much cooler than “Loads of Ciphers.” Blackmail = King = Today = Capture = Prince = Tonight = Protect = Minister = Tomorrow = Capture King Tomorrow Plaintext: the letter before encryption Ciphertext: the letter after encryption Rail Fence Cipher – an example of a “transposition cipher,” one which doesn’t change any letters when enciphered. Example: Encipher “DO NOT DELAY IN ESCAPING,” using a rail fence cipher. You would send: DNTEAIECPN OODLYNSAIG Null cipher – not the entire message is meaningful. My aunt is not supposed to read every epistle tonight. BXMT SSESSBW POE ILTWQS RIA QBTNMAAD OPMNIKQT RMI MNDLJ ALNN BRIGH PIG ORHD LLTYQ BXMT SSESSBW POE ILTWQS RIA QBTNMAAD OPMNIKQT RMI MNDLJ ALNN BRIGH PIG ORHD LLTYQ Anagram – use the letters of one word, phrase or sentence to form a different one. Example: “Meet behind the castle” becomes “These belched a mitten.” Substitution cipher – one in which the letters change during encryption.
    [Show full text]
  • CODE SCHOOL: TOP SECRET COMMUNICATIONS DURING WWII Codes and Ciphers a Code Is a Word Or Message That Is Replaced with an Agreed Code Word Or Symbol
    CODE SCHOOL: TOP SECRET COMMUNICATIONS DURING WWII Codes and Ciphers A code is a word or message that is replaced with an agreed code word or symbol. A cipher is when each letter in an alphabet is replaced with another letter, number, picture, or other symbol. Ciphers always have key that is shared among those sending and receiving the message. A coded message would be like saying, “The eagle has landed!”, while a cipher may look like this: 8-5-12-12-15. In the cipher, each letter of the alphabet has been replaced by its corresponding number (A = 1). Do you know the message? Communications during Wartime Navajo Code Talkers Humans figured out how to send secret One incredible example of transmitting secret messages a long time ago. The Greeks used messages was through the US’s use of the something we now call the Caesar cipher (the Navajo language. More than 400 Navajo alphabet is shifted so each letter is replaced by Indians served as code talkers, communicating a different one), while Spartans used a device secret messages for the U.S. Marines. These called a scytale (where a message was written Navajo servicemen were specially trained to on a piece of paper and would be read using a use their own language to communicate during special rod). battles throughout the Pacific campaign. The Navajo code used their own Navajo words to stand for English words. For example, the English word “air” was translated into the Navajo word for air. If an English word did not exist in the Navajo language, they would use Navajo words to symbolize the English word— Skytale submarine became besh-lo, meaning iron fish.
    [Show full text]
  • Grade 7 and 8 Math Circles Cryptography Introduction
    Faculty of Mathematics Centre for Education in Waterloo, Ontario N2L 3G1 Mathematics and Computing Grade 7 and 8 Math Circles March 19th/20th/21st Cryptography Introduction Before we begin, it's important to look at some terminology that is important to what we will be learning about. Plaintext: The message or information a sender wishes to share with a specific person. It is very easy to read and must be somehow hidden from those that are not intended to see it. Encryption: The process of the plaintext in such a way that only authorized parties can clearly read it. Ciphertext: The text created by plaintext. It looks like gibberish and is very hard to read. Cipher: A of transforming a message to conceal its meaning. Decryption: The opposite of . It is the process of turning ciphertext back into the readable plaintext. Substitution Cipher The earliest evidence of cryptography have been found in Mesopotamian, Egyptian, Chinese, and Indian writings, but it was the Hebrew scholars of 600 to 500 BCE that began to use simple substitution ciphers. In a substitution cipher the alphabet is rewritten in some other order to represent the the substitution. Caesar Ciphers The Caesar cipher is the simplest and most famous substitution cipher. It was first used by the famous Roman general Julius Caesar, who developed it to protect important military messages. 1 To produce a Caesar cipher simply shift the alphabet some units to the right. Julius Caesar's original cipher was created by shifting the alphabet three units to the right, as shown below. plaintext A B C D E F G H I J K L M ciphertext X Y Z A B C D E F G H I J plaintext N O P Q R S T U V W X Y Z ciphertext K L M N O P Q R S T U V W When encrypting a message, match every letter in the plaintext with the corresponding ciphertext letter beneath it.
    [Show full text]
  • Top Secret! Shhhh! Codes and Ciphers
    Top Secret! Shhhh! Codes and Ciphers 20 15 16 19 5 3 18 5 20 19 8 8 8 Can you figure out what this message says? Do you love secret codes? Do you want to be able to write messages to friends that no one else can read? In this kit you will get to try some codes and learn to code and decode messages. Materials Included in your Kit Directions and template pages Answer key for all codes in this packet starts on page 8. 1 #2 Pencil 1 Brad Fastener Tools You’ll Need from Home Scissors A Piece of Tape Terminology First let’s learn a few terms together. CODE A code is a set of letters, numbers, symbols, etc., that is used to secretly send messages to someone. CIPHER A cipher is a method of transforming a text in order to conceal its meaning. KEY PHRASE / KEY OBJECT A key phrase lets the sender tell the recipient what to use to decode a message. A key object is a physical item used to decrypt a code. ENCRYPT This means to convert something written in plain text into code. DECRYPT This means to convert something written in code into plain text. Why were codes and ciphers used? Codes have been used for thousands of years by people who needed to share secret information with one another. Your mission is to encrypt and decrypt messages using different types of code. The best way to learn to read and write in code is to practice! SCYTALE Cipher The Scytale was used by the ancient Greeks.
    [Show full text]
  • SOLVING CIPHER SECRETS Edited by M
    SOLVING CIPHER SECRETS Edited by M. E. Ghaver INTERESTED FANS SEND IN SOME LIVELY CHAT-AND SEVERAL NEW PUZZLERS ARE OFFERED FOR HUNGRY HEADS ID you ever have trouble in occasionally, notwithstanding our combined solving some particular efforts to the contrary. cipher? And did you ever This, by way of introduction, fans, to a feel like running the party sort of " get-together " celebration that we ragged that contrived the have planned in this article. affair? It's just this way. So much has been Well, that's how Frank Spalding, of received from cipher enthusiasts in the way Wrangell, Alaska, must have felt about the of interesting questions, general comments, cipher of Foster F. V. Staples, in the June ciphers, and methods of solving them, that 6 " Solving Cipher Secrets." the only adequate way to cope with the sit• " If I could have caught him last night— uation, and thus to discharge this duty to June 7," writes Mr. Spalding, " he would our readers, is for us all to get together in have had to do some tall explaining." an entire article devoted to that purpose. Nevertheless, Mr. Spalding succeeded in So let's pull up our chairs and talk things solving this cipher, as well as all the others over. It may be that your particular ques• in that issue, although he confesses that tion will not crop up. Btit in that event when he had finished the lot he was " not a you will find another case that covers the good Christian any more!" same ground more completely.
    [Show full text]
  • Crypyto Documentation Release 0.2.0
    crypyto Documentation Release 0.2.0 Yan Orestes Aug 22, 2018 API Documentation 1 Getting Started 3 1.1 Dependencies...............................................3 1.2 Installing.................................................3 2 Ciphers 5 2.1 Polybius Square.............................................5 2.2 Atbash..................................................6 2.3 Caesar Cipher..............................................7 2.4 ROT13..................................................8 2.5 Affine Cipher...............................................9 2.6 Rail Fence Cipher............................................9 2.7 Keyword Cipher............................................. 10 2.8 Vigenère Cipher............................................. 11 2.9 Beaufort Cipher............................................. 12 2.10 Gronsfeld Cipher............................................. 13 3 Substitution Alphabets 15 3.1 Morse Code............................................... 15 3.2 Binary Translation............................................ 16 3.3 Pigpen Cipher.............................................. 16 3.4 Templar Cipher.............................................. 18 3.5 Betamaze Alphabet............................................ 19 Python Module Index 21 i ii crypyto Documentation, Release 0.2.0 crypyto is a Python package that provides a set of cryptographic tools with simple use to your applications. API Documentation 1 crypyto Documentation, Release 0.2.0 2 API Documentation CHAPTER 1 Getting Started These instructions
    [Show full text]
  • Cryptography
    Cryptography Well, a gentle intro to cryptography. Actually, a fairly “hand-wavy” intro to crypto (we’ll discuss why) Fall 2018 CS 334: Computer Security 1 Special Thanks: to our friends at the Australian Defense Force Academy for providing the basis for these slides Fall 2018 CS 334: Computer Security 2 Definition • Cryptology is the study of secret writing • Concerned with developing algorithms which may be used: – To conceal the content of some message from all except the sender and recipient (privacy or secrecy), and/or – Verify the correctness of a message to the recipient (authentication or integrity) • The basis of many technological solutions to computer and communication security problems Fall 2018 CS 334: Computer Security 3 Terminology • Cryptography: The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form • Plaintext: The original intelligible message • Ciphertext: The transformed message • Cipher: An algorithm for transforming an intelligible message into one that is unintelligible Fall 2018 CS 334: Computer Security 4 Terminology (cont). • Key: Some critical information used by the cipher, known only to the sender & receiver – Or perhaps only known to one or the other • Encrypt: The process of converting plaintext to ciphertext using a cipher and a key • Decrypt: The process of converting ciphertext back into plaintext using a cipher and a key • Cryptanalysis: The study of principles
    [Show full text]
  • Lesson Plan: 1.1 Encryption Algorithms
    Course: Advanced Cybersecurity | Module: Advanced Cryptography Lesson 1.1: Encryption Algorithms https://codehs.com/course/7606/lesson/1.1 In this lesson, students will learn about the basics of symmetric encryption. Students will explore the advantages and disadvantages of various ciphers and consider how using multiple ciphers Description impacts the decryption process. Students will also learn about the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard). Students will be able to: Explain the characteristics of symmetric algorithms and use them to encode and decode text. Objective Specific ciphers include block, substitution, and transposition ciphers. Compare and contrast the strengths and weaknesses of symmetric ciphers. Compare and contrast the DES (Data Encryption Standard) and the AES (Advanced Encryption Standard). 1.1.1 Video: Encryption Algorithms 1.1.2 Quiz: Encryption Algorithms Quiz 1.1.3 Free Response: Enhanced Caesar Cipher Activities 1.1.4 Free Response: Mixed Alphabet Cipher 1.1.5 Example: Pigpen Encoder 1.1.6 Free Response: Pigpen Cipher 1.1.7 Free Response: Rail Fence Cipher This is an introductory lesson, so there is no prior knowledge necessary. However, students Prior Knowledge will be better equipped to discuss the advantages and disadvantages of ciphers if they are familiar with brute force attacks and letter frequency analysis. Students will be introduced to many new vocabulary words over the course of this lesson and throughout the unit. To help students keep track of and use new words, write new vocabulary on the board or on an anchor chart that hangs in your class. Due to the number of activities in this lesson, it is a longer lesson that can be spread across Planning Notes multiple days.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • SOLVING CIPHER SECRETS Edited by M
    SOLVING CIPHER SECRETS Edited by M. E. Oliaver PROBABLY FOR THE FIRST TIME IN MAGAZINE HISTORY, THERE IS OFFERED HERE A BOOK CIPHER WITHOUT NAMING THE KEY WELL-SEASONED cipher, One of the first to mention it is Giovanni if centuries of service count Battista della Porta, whose " De Furtivis for anything, and yet one Literarum Notis " was published at Naples that, though cumbersome in 1563. to use, is still worthy of And Blaise de Vigenere, the French writ• consideration by virtue of er, comments at some length on it in his its relative security, is the book cipher. " Traicte des Chiffres "—Paris, 1586. That Book cipher is of the substitution class, he was well aware of its inconveniences is the substitutes usually being numbers that evidenced by the following quotation from indicate certain letters or words in certain his work. lines, paragraphs, columns, or pages of the " Now," says Vigenere, " this plan is too article, pamphlet, book, or other publication laborious, and slow in operation for business used as a key. requiring to be described in detail; it will The ways of using this cipher are too not always provide the words sought for, at numerous to mention, this being merely up least, without an immense deal of pains, to the ingenuity of those contemplating perhaps after examining through some hun• the secret correspondence. A common dred pages; and unless a dictionary be used, method is to represent each word of the the names of persons, places, or professions, message by a group of three numbers. For can be found in no book whatever.
    [Show full text]