Kryptos: a 29 Year Old Mystery Alfie Baines* — 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall

Kryptos: a 29 Year Old Mystery Alfie Baines* — 170180540 A.E.Baines@Newcastle.Ac.Uk School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall

Kryptos: A 29 year old mystery Alfie Baines* | 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall 1. Aims 3. Frequency analysis 5. Index of coincidence 6. Transposition Cipher H I To automate a majority of the cryptanalysis that has already The index of coincidence (IC) is the I A transposition cipher takes the original been carried out on Kryptos probability that two randomly chosen letters text and creates an anagram of it based on a I To use computing to decipher the final section of Kryptos, known in a block of text are identical. We know regular system or algorithm. as K4 IC ≈ 0:067, and IC ≈ 0:0385 I By taking the text in the green section and english random reversing the order, you can use the following n 1 X key, 1526374, based on the word KRYPTOS, 2. Transcript of Kryptos ciphertext IC = F (F − 1) (3) N(N − 1) i i to decipher the message. i=1 EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJ I The key is obtained as follows: YQTQUXQBQVYUVLLTREVJYQTMKYRDMFD I N is the length of the text K T 1 5 R O 2 6 VFPJUDEEHZWETZYVGWHKKQETGFQJNCE I n is the length of the alphabet = = 1526374 Y S 3 7 I Fi is the frequency of the ith letter in the alphabet GGWHKK?DQMCPFQZDQMMIAGPFXHQRLG P 4 TIMVMZJANQLVKQEDAGDVFRPJUNGEUNA (When read horizontally) QZGZLECGYUXUEENJTBJLBQCRTBJDFHRR I The same method of using columns YIZETKZEMVDUFKSJHKFWHKUWQLSZFTI containing 4 letters and 3 letters is used in HHDDDUVH?DWKBFUFPWNTDFIYCUQZERE the rearrangement of the green section EVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDX during decryption. FLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKF I The similarity between generating a key, and FHQNTGPUAECNUVPDJMQCLQUMUNEDFQ deciphering the text leads to the belief that this may be the intended method of ELZZVRRGKFFVOEEXBDMVPNFQXEZLGRE decryption by the author. DNQFMPNZGLFLPMRJQYALMGNUVPDXVKP DQUMEBEDMHDAFMJGZNUPLGEWJLLAETG 7. K4 Discussion H ENDYAHROHNLSRHEOCPTEOIBIDYSHNAIA CHTNREYULDSLLSLLNOHSNOSMRWXMNE I Frequency analysis of K4, with comparison to TPRNGATIHNRARPESLNNELEBLPIIACAE the English language, shows that the use of a WMTWNDITEENRAHCTENEUDRETNHAEOE poly-alphabetic cipher for encryption is plausible. TFOLSEDTIWENHAEIOYTEYQHEENCTAYCR By analysing how often letters appear in each row, it became obvious that the I I IC calculations give a flat graph with no peaks EIFTBRSPAMHHEWENATAMATEGYEERLB majority of rows 15-28 were written in English, but had been reordered - typical of a near the IC of the English language. This TEEFOASFIOTUETUAEOTOARMAEERTNRTI Transposition Cipher contradicts the point above but allows the BSEDDNIAAHTTMSTEWPIEROAGRIEWFEB I When comparing the frequency of letters in the green section to the typical letter possibility of multiple encryption AECTDDHILCEIHSITEGOEAOSDDRYDLORIT frequencies of the English alphabet, it was almost identical methods being used for K4. RKLMLEHAGTDHARDPNEOHMGFMFEUHE I Using a clue given by Jim Sanborn, the ECDMRIPFEIMEHNLSSTTRTVDOHW? OBKR 4. Vigen´erecipher H H sculpture creator, that NYPVTTMZFPK decrypts to BERLINCLOCK, possible shifts UOXOGHULBSOLIFBBWFLRVQQPRNGKSSO The alphanumeric ordering of the Kryptos alphabet which is used for a polyalphabetic cipher are: 11, 17, 2, 5, TWTQSJQSSEKZZWATJKLUDIAWINFBNYP 15, 9, 8, 7, 20, 0 VTTMZFPKWGDKZXTJCDIGKUHUAUEKCAR when deciphering K1 and K2. I In the first plot, there are peaks at 5, 10, 13 and 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 alphabets. This indicates that the length of the 8. Future work HEL K1 - Solved using Vigen´ere cipher: Keyword - Palimpsest KRYPTOSABCDEFGHIJLMNQUVWXZ keyword for the Vigen´eredeciphering is a multiple of HEL K2 - Solved using Vigen´ere cipher: Keyword - Abscissa 5. Starting with a keyword of length 10, as it has the I Research how Hamiltonian cycles can be HEL K3 - Solved using Transposition cipher If Σ is the alphabet of length l, with m being the length of the key, highest peak, lead to `PALIMPSEST' being used to solve a large Transposition cipher H HEL K4 - UNSOLVED Vigen´ereencryption and decryption can be written; identified as the key word. and normal anagrams. Similar observations for the second plot lead to Research how to use a combination of a Ci = EK (Mi) = (Mi + K(i mod m)) mod l (1) I I English alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ `ABSCISSA' eventually being identified as the Transposition cipher H and a Vigen´erecipher Di = DK (Ci) = (Ci − K(i mod m)) mod l (2) Kryptos alphabet: KRYPTOSABCDEFGHIJLMNQUVWXZ keyword. H H to solve the final part of Kryptos. References: 1. National Security Agency. 1993, June 9. CIA KRYPTOS sculpture - Challenge and resolution. United States Government - Memorandum. https://docs.google.com/file/d/0B7G1aFZQuZtXRmRkcmhkNGtqQ2c/edit. 2. Stein, D. 1999. Cracking the Courtyard Crypto. https://nsarchive2.gwu.edu//NSAEBB/NSAEBB431/docs/intell ebb 010.PDF.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us