Handout 1 I. Historical Overview Steganography Code Secret Writing Substitution Cryptography Cipher Transposition

Total Page:16

File Type:pdf, Size:1020Kb

Handout 1 I. Historical Overview Steganography Code Secret Writing Substitution Cryptography Cipher Transposition 06-20008 Cryptography The University of Birmingham Autumn Semester 2012 School of Computer Science Eike Ritter 24 September, 2012 Handout 1 Summary of this handout: Overview of historical cryptographic techniques — Definition of some im- portant cryptographic concepts — Math: Permutations and Residue Classes I. Historical Overview 1. Secret Writing Communicating secretly in writing is probably as old as writing itself. Already the Egyptians are known to have included secret hieroglyphs in their writing. In ancient times secret writing has mainly been used for religious purposes and mysticism. In the classical antiquity are the first accounts of secret writing being used for military purposes by the ancient Greeks. From there on the ability to secretly pass messages was a major factor for military and diplomatic communication. It is therefore little surprising that many of the techniques for secret communication known today have been developed by government agencies and often only made known to the public long after their invention. Since the ancient Greeks many methods of exchanging secret messages have been developed (and successfully broken). This handout gives an overview over some of the historical techniques and also introduces some basic and simple mathematical concepts used. The Science of Secret Writing can be roughly divided into the following branches: Steganography Code Secret Writing Substitution Cryptography Cipher Transposition 2. Hiding Messages The best form of sending a secret message is by concealing that a message has been sent. The study of how to effectively hide messages such that only the intended receiver can find them is called Steganog- raphy. Traditionally secret messages used to be hidden physically, for instance by using invisible ink, or within unobtrusive communications. Nowadays there are many more ways of sending concealed mes- sages, for instance by hiding them in unsuspicious file formats, such as pictures or sound files, or in propaganda videos. In this course we will be not concerned with techniques to hide messages but only with hiding the information contained in a message. 3. Scrambling Messages In many situations it is obvious that messages are sent. For instance, it is clear that during a phone conversation some information is communicated, thus “hiding the message” is essentially impossible. To guard against interception or eavesdropping, messages can be scrambled in a way that they only make sense to the receiver but not to an uninitiated eavesdropper. The scientific study of scrambling messages is the mathematical discipline of Cryptography. In this handout I will give a short overview over some historical cryptographic techniques and their underlying mathematics. 4. Cryptography can be divided into two main branches: Transposition techniques encrypt messages by permuting the components of a message within itself. Substitution techniques encrypt messages by replacing the components of a message. There are two main branches for substitution techniques: 4 Codes are algorithms that substitute entire words or phrases of a message, i.e. they work on a level of meaning. Ciphers are algorithms that substitute the single letters or characters of a message, i.e. they work on a level of individual letters, small groups of letters, or individual bits. 5. Some basic definitions Let’s first define some more concepts that will be useful throughout the lecture. Encrypt The process of scrambling a message. Decrypt The process of unscrambling a message. Encode The process of encrypting a message with respect to some code. Decode The process of decrypting a message with respect to some code. Encipher The process of encrypting a message with respect to some cipher. Decipher The process of decrypting a message with respect to some cipher. Plaintext A message before it is encrypted. Codetext An encoded message. Since we will concentrate on ciphers in this lecture we will rarely use this term. Ciphertext An enciphered message. Cryptography The science of keeping messages secure. Cryptographer A practitioner of cryptography. Cryptanalysis The science of breaking ciphertexts. While we will mainly concentrate on cryptography in this course I will also discuss some cryptanalytic techniques. Cryptanalyst A practitioner of cryptanalysis. Cryptology The branch of mathematics encompassing both cryptography and cryptanalysis Cryptologist A practitioner of cryptology. 6. Sending Secret Messages We can describe the process of sending encrypted messages with the following schematic view: Plaintext Encryption Cipher-/Codetext Decryption Orig. Plaintext From a practical point of view, codes are relatively useless as they require far too much overhead to be effective. In theory, one would have to design an entire dictionary of code words before commencing communication. Obviously, this makes it not only difficult to work with a code, but also insecure as a code book can not easily be hidden or memorised, as well as very costly to change a code. While codes have a certain usefulness for ad hoc communication, they are not relevant for the type of efficient cryptography we are interested in. With ciphers on the other hand one only has to know how to encipher and decipher the basic set of symbols, for example the 26 letters of the alphabet. Therefore, ciphers are far easier to apply, to keep secret and to change in order to guarantee prolonged secure communication. In this lecture we will therefore discuss cryptographic methods based on ciphers and will start with a look at some of the classical ciphers. 5 I.1 Transposition Ciphers The basic idea of a transposition cipher is to scramble a message by transposing the single letters of a message in a particular order that is only known to the sender and receiver. Transposition ciphers are the oldest form of enciphering messages. They can be traced back to the ancient Egyptians where they were mainly used for religious purposes. The order of hieroglyphs of single words would be changed probably for mystical purposes. Similarly the Jewish mystics used temurah to rearrange words and sentences to find hidden meanings in the Bible. 7. Rail Fence Cipher The first known military use of a transposition cipher was by the Spartans. They invented the rail fence cipher to send messages between troops. We write the plain text message in columns of a particular height and then compose the ciphertext from the resulting rows. To decipher we divide the length of the overall message by the height of the columns and break the ciphertext into rows whose length corresponds to the quotient. Writing the rows again one upon the other, we can read off the original plaintext. Example: We take the plaintext: When shall we three meet again in thunder lightning or in rain We then write it as a rail fence of height 5: WHEEAINIIIN HATMGNDGNNE ELHEATEHGRU NLREIHRTOAK SWETNULNRIE Observe that the original message had 51 characters. In order to complete the rail fence I added four nonsense characters. These characters are meaningless and can be discarded after deciphering. We call meaningless characters added to the ciphertext nulls. Reading off row by row gives the following ciphertext: WHEEAINIIINHATMGNDGNNEELHEAREHGRUNLREIHRTOAKSWETNUL NRIE In order to decrypt the message the receiver, who knows the height of the rail fence, divides the length of the message by the height and thus gets the length of the single rows. In our case we get 55/5 = 11: WHEEAINIIINHATMGNDGNNEELHEAREHGRUNLREIHRTOAKSWETNULNRIE Adding nulls is not strictly necessary, we could have just combined the rows of different lengths and nevertheless could have decrypted the message without problems. In fact not adding nulls can make the work for a cryptanalyst more difficult. But in either case the rail fence cipher is very easy to break as we only have to test all possible divisors up to half the length of the text. 8. Permutation Cipher We can obtain a more elaborate cipher by transposing the characters in the plaintext in a less regular fashion using permutations. Suppose we take a permutation s ∈ Sn, we then divide the plaintext into chunks of length n and permute the letters in each chunk according to our chosen s, which results in the −1 ciphertext. To decipher the text we simply take the inverse of s, s ∈ Sn and apply it to the ciphertext divided into chunks of length n. 123456 Example: We take s = = (1 2 3)(5 6) ∈ S6 as permutation. 231465 We divide our plaintext from above into chunks of length 6. WHENSHALLWETHREEMEETAGAININTHUNDERLIGHTNINGORINRAINEUK Applying the permutation yields EWHNHSLALWTEEHREEMAETGIANNITUHENDRILTGHNNIRGOIRNNAIEKU and thus the ciphertext EWHNHSLALWTEEHREEMAETGIANNITUHENDRILTGHNNIRGOIRNNAIEKU In order to decrypt the message we use the inverse of s, which is (1 3 2)(5 6). 6 I.2 Substitution Ciphers A substitution cipher is a method to replace units of the plaintext with parts of the ciphertext. Substitution ciphers are nearly as old as transposition ciphers. One of the earliest examples is the Atbash, used in Jewish mysticism, a cipher that substitutes the first letter of the Hebrew alphabet with the last, the second letter with the one before last, and so on. For simplicity, we will for now assume that the units of our plaintext are always the 26 letters of the alphabet only, without spaces, punctuation, etc. 9. Shift Cipher and Caesar’s Cipher The oldest form of substitution ciphers is the shift cipher. Its idea is to shift every letter in the message by a set number of places in the alphabet. For example a shift cipher with a shift of 1 simply replaces every letter by its successor and Z by A. More mathematically, if we enumerate all letters of the alphabet from 0 to 25 then we can express the shift cipher as an operation in modular arithmetic as c ≡ p + s(mod 26), where p is the plaintext letter, s is the shift, and c is the enciphered letter. Decryption can be performed similarly with the reverse operation: p ≡ c − s(mod 26).
Recommended publications
  • COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere a Long & Rich History
    COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Cryptography Is Everywhere A Long & Rich History Examples: • ~50 B.C. – Caesar Cipher • 1587 – Babington Plot • WWI – Zimmermann Telegram • WWII – Enigma • 1976/77 – Public Key Cryptography • 1990’s – Widespread adoption on the Internet Increasingly Important COS 433 Practice Theory Inherent to the study of crypto • Working knowledge of fundamentals is crucial • Cannot discern security by experimentation • Proofs, reductions, probability are necessary COS 433 What you should expect to learn: • Foundations and principles of modern cryptography • Core building blocks • Applications Bonus: • Debunking some Hollywood crypto • Better understanding of crypto news COS 433 What you will not learn: • Hacking • Crypto implementations • How to design secure systems • Viruses, worms, buffer overflows, etc Administrivia Course Information Instructor: Mark Zhandry (mzhandry@p) TA: Fermi Ma (fermima1@g) Lectures: MW 1:30-2:50pm Webpage: cs.princeton.edu/~mzhandry/2017-Spring-COS433/ Office Hours: please fill out Doodle poll Piazza piaZZa.com/princeton/spring2017/cos433mat473_s2017 Main channel of communication • Course announcements • Discuss homework problems with other students • Find study groups • Ask content questions to instructors, other students Prerequisites • Ability to read and write mathematical proofs • Familiarity with algorithms, analyZing running time, proving correctness, O notation • Basic probability (random variables, expectation) Helpful: • Familiarity with NP-Completeness, reductions • Basic number theory (modular arithmetic, etc) Reading No required text Computer Science/Mathematics Chapman & Hall/CRC If you want a text to follow along with: Second CRYPTOGRAPHY AND NETWORK SECURITY Cryptography is ubiquitous and plays a key role in ensuring data secrecy and Edition integrity as well as in securing computer systems more broadly.
    [Show full text]
  • Simple Substitution and Caesar Ciphers
    Spring 2015 Chris Christensen MAT/CSC 483 Simple Substitution Ciphers The art of writing secret messages – intelligible to those who are in possession of the key and unintelligible to all others – has been studied for centuries. The usefulness of such messages, especially in time of war, is obvious; on the other hand, their solution may be a matter of great importance to those from whom the key is concealed. But the romance connected with the subject, the not uncommon desire to discover a secret, and the implied challenge to the ingenuity of all from who it is hidden have attracted to the subject the attention of many to whom its utility is a matter of indifference. Abraham Sinkov In Mathematical Recreations & Essays By W.W. Rouse Ball and H.S.M. Coxeter, c. 1938 We begin our study of cryptology from the romantic point of view – the point of view of someone who has the “not uncommon desire to discover a secret” and someone who takes up the “implied challenged to the ingenuity” that is tossed down by secret writing. We begin with one of the most common classical ciphers: simple substitution. A simple substitution cipher is a method of concealment that replaces each letter of a plaintext message with another letter. Here is the key to a simple substitution cipher: Plaintext letters: abcdefghijklmnopqrstuvwxyz Ciphertext letters: EKMFLGDQVZNTOWYHXUSPAIBRCJ The key gives the correspondence between a plaintext letter and its replacement ciphertext letter. (It is traditional to use small letters for plaintext and capital letters, or small capital letters, for ciphertext. We will not use small capital letters for ciphertext so that plaintext and ciphertext letters will line up vertically.) Using this key, every plaintext letter a would be replaced by ciphertext E, every plaintext letter e by L, etc.
    [Show full text]
  • Cryptography in Modern World
    Cryptography in Modern World Julius O. Olwenyi, Aby Tino Thomas, Ayad Barsoum* St. Mary’s University, San Antonio, TX (USA) Emails: [email protected], [email protected], [email protected] Abstract — Cryptography and Encryption have been where a letter in plaintext is simply shifted 3 places down used for secure communication. In the modern world, the alphabet [4,5]. cryptography is a very important tool for protecting information in computer systems. With the invention ABCDEFGHIJKLMNOPQRSTUVWXYZ of the World Wide Web or Internet, computer systems are highly interconnected and accessible from DEFGHIJKLMNOPQRSTUVWXYZABC any part of the world. As more systems get interconnected, more threat actors try to gain access The ciphertext of the plaintext “CRYPTOGRAPHY” will to critical information stored on the network. It is the be “FUBSWRJUASLB” in a Caesar cipher. responsibility of data owners or organizations to keep More recent derivative of Caesar cipher is Rot13 this data securely and encryption is the main tool used which shifts 13 places down the alphabet instead of 3. to secure information. In this paper, we will focus on Rot13 was not all about data protection but it was used on different techniques and its modern application of online forums where members could share inappropriate cryptography. language or nasty jokes without necessarily being Keywords: Cryptography, Encryption, Decryption, Data offensive as it will take those interested in those “jokes’ security, Hybrid Encryption to shift characters 13 spaces to read the message and if not interested you do not need to go through the hassle of converting the cipher. I. INTRODUCTION In the 16th century, the French cryptographer Back in the days, cryptography was not all about Blaise de Vigenere [4,5], developed the first hiding messages or secret communication, but in ancient polyalphabetic substitution basically based on Caesar Egypt, where it began; it was carved into the walls of cipher, but more difficult to crack the cipher text.
    [Show full text]
  • Amy Bell Abilene, TX December 2005
    Compositional Cryptology Thesis Presented to the Honors Committee of McMurry University In partial fulfillment of the requirements for Undergraduate Honors in Math By Amy Bell Abilene, TX December 2005 i ii Acknowledgements I could not have completed this thesis without all the support of my professors, family, and friends. Dr. McCoun especially deserves many thanks for helping me to develop the idea of compositional cryptology and for all the countless hours spent discussing new ideas and ways to expand my thesis. Because of his persistence and dedication, I was able to learn and go deeper into the subject matter than I ever expected. My committee members, Dr. Rittenhouse and Dr. Thornburg were also extremely helpful in giving me great advice for presenting my thesis. I also want to thank my family for always supporting me through everything. Without their love and encouragement I would never have been able to complete my thesis. Thanks also should go to my wonderful roommates who helped to keep me motivated during the final stressful months of my thesis. I especially want to thank my fiancé, Gian Falco, who has always believed in me and given me so much love and support throughout my college career. There are many more professors, coaches, and friends that I want to thank not only for encouraging me with my thesis, but also for helping me through all my pursuits at school. Thank you to all of my McMurry family! iii Preface The goal of this research was to gain a deeper understanding of some existing cryptosystems, to implement these cryptosystems in a computer programming language of my choice, and to discover whether the composition of cryptosystems leads to greater security.
    [Show full text]
  • Secret Wri0ng Steganography
    Secret wring LIVITCSWPIYVEWHEVSRIQMXLEYVEOIEWHRXEXIP FEMVEWHKVSTYLXZIXLIKIIXPIJVSZEYPERRGERI MWQLMGLMXQERIWGPSRIHMXQEREKIETXMJTPRGEV EKEITREWHEXXLEXXMZITWAWSQWXSWEXTVEPMRXR SJGSTVRIEYVIEXCVMUIMWERGMIWXMJMGCSMWXSJ OMIQXLIVIQIVIXQSVSTWHKPEGARCSXRWIEVSWII BXVIZMXFSJXLIKEGAEWHEPSWYSWIWIEVXLISXLI VXLIRGEPIRQIVIIBGIIHMWYPFLEVHEWHYPSRRFQ MXLEPPXLIECCIEVEWGISJKTVWMRLIHYSPHXLIQI MYLXSJXLIMWRIGXQEROIVFVIZEVAEKPIEWHXEAM WYEPPXLMWYRMWXSGSWRMHIVEXMSWMGSTPHLEVHP FKPEZINTCMXIVJSVLMRSCMWMSWVIRCIGXMWYMX CSCI 470: Web Science • Keith Vertanen • Copyright © 2014 Overview • Secret wri+ng – Steganography – Cryptography • Keys, plaintext, ciphertext • Codes vs. Ciphers • Transposi+on ciphers • Subs+tu+on ciphers 2 Steganography vs. Cryptography • Steganography – "concealed wri+ng" – Hide messages to keep secret – Does not aract aen+on (iF not Found). • Cryptography – "hidden wring" – Scramble messages so unintelligible – Screams: "Please try and decode me!" • But not mutually exclusive: – e.g. Scrambled message in "invisible" ink 3 Physical hiding • Ancient Chinese – Write message on very thin silk sheet – Rolled up, covered in wax, and ingested by messenger • 480 BC – His+aeus wants Aristagoras oF Miletus to revolt against the Persian King • Shaves head oF messenger, taoos message on scalp • Wait For hair to grow back • Sends messenger to Aristagoras 4 Physical hiding • 480 BC – Demaratus, Greek ex-pat living in Persia – No+ces build up For aack on Greece – Sent secret messages: • Scraped wax oF tablet • Wrote on wood • Covered up with wax – Persian ships
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • FROM JULIUS CAESAR to the BLOCKCHAIN: a BRIEF HISTORY of CRYPTOGRAPHY by Côme JEAN JARRY & Romain ROUPHAEL, Cofounders of BELEM
    Corporate identity in the digital era #9 JANUARY 2017 FROM JULIUS CAESAR TO THE BLOCKCHAIN: A BRIEF HISTORY OF CRYPTOGRAPHY By Côme JEAN JARRY & Romain ROUPHAEL, cofounders of BELEM 22 The world’s most important asset is information. Now message was inscribed lengthwise. Once the parchment more than ever. With computer theft and hacking was unrolled, the letters of the message were mixed becoming a common threat, protecting information up and the message meaningless. The receiver would is crucial to ensure a trusted global economy. need an identical stick to decipher the text. The E-commerce, online banking, social networking or scytale transposition cipher relied on changing the emailing, online medical results checking, all our order of the letters, rather than the letters themselves. transactions made across digital networks and This cryptographic technique still prevails today. insecure channels of communication, such as the Internet, mobile phones or ATMs, are subjected to vulnerabilities. Our best answer is cryptography. And THE ART OF SUBSTITUTION it has always been. As a science and as an art, it is Julius Caesar was also known to use encryption to an essential way to protect communication. convey messages to his army generals posted in the Cryptography goes back to older times, as far back as war front. The Caesar cipher is a simple substitution the Ancient World. cipher in which each letter of the plaintext is rotated left or right by some number of positions down the alphabet. The receiver of the message would then Early cryptography was solely concerned with shift the letters back by the same number of positions concealing and protecting messages.
    [Show full text]
  • Slippery Hill-Climbing Technique for Ciphertext-Only Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers
    Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers Thomas Kaeding [email protected] 2019-06-17 to appear in Cryptologia We present a stochastic method for breaking general periodic polyalphabetic substitution ciphers using only the ciphertext and without using any additional constraints that might come from the cipher’s structure. The method employs a hill-climbing algorithm for individual key alphabets, with occasional slipping down the hill. We implement the method with a computer and achieve reliable results for a sufficiently long ciphertext (150 characters per key alphabet). Because no constraints among the key alphabets are used, this method applies to any periodic polyalphabetic substitution cipher. Keywords: periodic polyalphabetic substitution cipher, hill-climbing, slippery hill-climbing, cryptanalysis, Vigenère, Quagmire In a monoalphabetic substitution cipher, each character of the plaintext is encrypted by the same bijective mapping between the standard alphabet (A...Z) and the key alphabet. The key alphabet is simply a permutation of the standard one. A stochastic ciphertext-only attack on the monoalphabetic substitution cipher (Jakobsen 1995) generates a “child” key from a “parent” key by swapping randomly chosen elements. The child replaces the parent if the fitness of the decrypted text improves over its predecessor, where fitness is a measure of how close a text resembles a particular language. This continues until no improvement is seen for a large number of child candidates. The periodic polyalphabetic substitution cipher is a generalization of the monoalphabetic cipher in which there are several key alphabets. During encryption, the choice of key alphabet cycles through them, where the choice of key is given by the position in the text modulo the number of keys.
    [Show full text]
  • Enigma Cryptanalysis - Beginnings
    Enigma Cryptanalysis - Beginnings Gaurish Korpal∗ [email protected] July 15, 2015 Abstract Any message may be hidden in two basic ways. The methods of steganography conceal the very existence of the message, for example invisible inks and microdots. The methods of cryptography, on the other hand, do not conceal the presence of a secret message but render it unintelligible as ciphertext, to outsiders by various transformations of the plaintext. Breaking ciphers require ingenuity, creativity and a little math. In this article our focus will be on breaking Enigma ciphers. The skill involved in breaking ciphers is called cryptanalysis. Keywords. Enigma, cryptanalysis, cypher, Caesar, Vigen`ere,Rejewski, Zygalski, Bomba, Bombe 1 Cipher not Code A code is a mapping from some meaningful unit (word, sentence, phrase) into something else (usually a shorter group of symbols). A code requires a codebook, it is simply a list of these mappings. For example we could make up a code where the word Apple is written as 67, historical example of this is \Zimmermann Telegram Code" for more details refer [7]. Ciphers do not involve meaning. Instead they are mechanical operations (known as algorithms) which are performed on the individual or small chunks of letters. A code is stored as a mapping in a codebook, while ciphers transform individual symbols according to an algorithm. It was definitively stated in 1883 by the Dutch linguist Auguste Kerckhoffs von Nieuwenhof in his book La Cryptographie militaire: Kerckhoffs' Principle: The security of a cryptosystem must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key.
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • Grade 6 Math Circles Cryptography Solutions Atbash Cipher Caesar Cipher
    Faculty of Mathematics Centre for Education in Waterloo, Ontario N2L 3G1 Mathematics and Computing Grade 6 Math Circles November 5/6 2019 Cryptography Solutions Hello World Khoor Zruog Hello Zruog Khoor Khoor Zruog World 1. Person A encrypts plaintext 2. Person B receives ciphertext 3. Person B decrypts ciphertext back into ciphertext into plaintext Atbash Cipher Examples 1. Encrypt \Math Circles" using the Atbash cipher. Nzgs Xrixovh 2. Decrypt \ORLM PRMT" using the Atbash cipher. LION KING Caesar Cipher Examples: Encrypt or decrypt the following messages using the shift number given in parentheses: a) Welcome to Math Circles! (5) Bjqhtrj yt Rfym Hnwhqjx! plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext F G H I J K L M N O P Q R S T U V W X Y Z A B C D E 1 b) Ljw hxd anjm cqrb? (9) Can you read this? plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext J K L M N O P Q R S T U V W X Y Z A B C D E F G H I c) What if I did a Caesar Shift of 26 units on \Welcome to Math Circles!"? A Caesar shift of 26 would be shifting by the length of the alphabet. For example I would be shifting A 26 letters to the right.
    [Show full text]
  • Q.1 What Is Cryptography? Ans. Cryptographic
    WWW.UPTUNOTES.COM Q.1 What is cryptography? Ans. Cryptographic systems are generally classified along 3 independent dimensions: Type of operations used for transforming plain text to cipher text All the encryption algorithms are based on two general principles: substitution, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The number of keys used are: 1. If the sender and receiver uses same key then it is said to be symmetric key (or) single key (or) conventional encryption. 2. If the sender and receiver use different keys then it is said to be public key encryption. Q.2 Explain the Cryptanalysis? Ans. The process of attempting to discover X or K or both is known as cryptanalysis. The strategy used by the cryptanalysis depends on the nature of the encryption scheme and the information available to the cryptanalyst. Q.3 Write down the various types of cryptanalytic attacks? Ans. There are various types of cryptanalytic attacks based on the amount of information known to the cryptanalyst. 1. Cipher Text Only – A copy of cipher text alone is known to the cryptanalyst. 2. Known Plaintext – The cryptanalyst has a copy of the cipher text and the corresponding plaintext. 3. Chosen Plaintext – The cryptanalysts gains temporary access to the encryption machine. They cannot open it to find the key, however; they can encrypt a large number of suitably chosen plaintexts and try to use the resulting cipher texts to deduce the key. 4. Chosen Cipher Text – The cryptanalyst obtains temporary access to the decryption machine, uses it to decrypt several string of symbols, and tries to use the results to deduce the key.
    [Show full text]