Keyword Mixed Alphabet Form ciphertext alphabet by: – pick a keyword – spell it without duplicates – then, fill in the rest of the alphabet in order Example,

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Mod arithmetic.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Python Programming in Context Chapter 3. Objectives To introduce the string data type To demonstrate the use of string methods and operators To introduce.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Substitution Ciphers.
Introduction CS 303 Algorithmic Number Theory and Cryptography
Affine Cipher.
Asad Gondal Ali Haider Mansoor
Introduction to Cryptography
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
CAP Cryptographic Analysis Program
History and Background Part 4: Transposition Ciphers
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Taehyung Kim HPC Lab. POSTECH
Outline Some Basic Terminology Symmetric Encryption
Cryptography Survey.
PART VII Security.
ICS 454: Principles of Cryptography
Cryptography Survey.
Classical Polyalphabetic Ciphers
Simple Encryption- Lesson 5
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Cryptography: Cesar Cipher
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Introduction to Cryptography I
Mixed Alphabet Keyword
Double Transpositions
Homophonic Substitution Cipher
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Symmetric Encryption or conventional / private-key / single-key
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

Keyword Mixed Alphabet Form ciphertext alphabet by: – pick a keyword – spell it without duplicates – then, fill in the rest of the alphabet in order Example, keyword VACATION A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C V A C T I O N B DE F G H J K L M P Q R S U W X Y Z Encrypt “I should be sailing” as: – DQBK SGTA IQVD GDJN

Another Substitution Shift plaintext chars. three characters A: A B C D E F G H I J K L M C: D E F G H I J K L M N O P A: N O P Q R S T U V W X Y Z C: Q R S T U V W X Y Z A B C Example: – P = “Old School cracked me up” – C = ROG VFKRRO FUDFNHG PH XS

Another Substitution Shift plaintext chars. three characters A: A B C D E F G H I J K L M C: D E F G H I J K L M N O P A: N O P Q R S T U V W X Y Z C: Q R S T U V W X Y Z A B C Example:notice wrap – P = “Old School cracked me up” – C = ROG VFKRRO FUDFNHG PH XS

Another Substitution Shift plaintext chars. three characters A: A B C D E F G H I J K L M C: D E F G H I J K L M N O P A: N O P Q R S T U V W X Y Z C: Q R S T U V W X Y Z A B C notice wrap Algorithm called Caesar Cipher

Caesar Example A A B C D E F G H I J K L M N O P Q R S T U V W X Y C D E F G H I J K L M N O P Q R S T U V W X Y Z A B What is: VFUXEV LV D IXQQB VKRZ ?

Caesar Cipher (more formal def) encryption: – EK(m) = m + 3 mod 26 decryption: – DK(c) = c – 3 mod 26 review: – if a and m are positive integers, a mod m is the remainder when a is divided by m Caesar cipher special case of shift cipher

Shift Cipher encryption: – EK(m) = m + K mod 26 decryption: – DK(c) = c – K mod 26 example: k=5 A: A B C D E F G H I J K L M N O P Q R S T U VWX Y Z C: F G H I J K L M N O P Q R S T U VWX Y Z A B C D E “summer vacation was too short” encrypts to – XZRR JWAF HFYN TSBF XYTT XMTW Y

Breaking Shift Ciphers How difficult? How many possibilities? Example: – AKZC JAQA IZMI TTGN CVVG APWE

First 13 Possibilities 0 A K Z C J A Q A I Z M I T T G N C V V G A P W 1 B L A D K B R B J A N J U U H O D W W H B Q X 2 C M B E L C S C K B O K V V I P E X X I C R Y 3 D N C F M D T D L C P L W W J Q F Y Y J D S Z 4 E O D G N E U E M D Q M X X K R G Z Z K E T A 5 F P E H O F V F N E R N Y Y L S H A A L F U B 6 G Q F I P G W G O F S O Z Z M T I B B M G V C 7 H R G J Q H X H P G T P A A N U J C C N H W D 8 I S H K R I Y I Q H U Q B B O V K D D O I X E 9 J T I L S J Z J R I V R C C P W L E E P J Y F 10 K U J M T K A K S J W S D D Q X M F F Q K Z G 11 L V K N U L B L T K X T E E R Y N G G R L A H 12 M W L O V M C M U L Y U F F S Z O H H S M B I

Last 13 Possibilities 13 N X M P W N D N V M Z V G G T A P I I T N C J R 14 O Y N Q X O E O W N A W H H U B Q J J U O D K S 15 P Z O R Y P F P X O B X I I V C R K K V P E L T 16 Q A P S Z Q G Q Y P C Y J J W D S L L W Q F M U 17 R B Q T A R H R Z Q D Z K K X E T M M X R G N V 18 S C R U B S I S A R E A L L Y F U N N Y S H O W 19 T D S V C T J T B S F B M M Z G V O O Z T I P X 20 U E T W D U K U C T G C N N A H W P P A U J Q Y 21 V F U X E V L V D U H D O O B I X Q Q B V K R Z 22 W G V Y F W M W E V I E P P C J Y R R C W L S A 23 X H W Z G X N X F W J F Q Q D K Z S S D X M T B 24 Y I X A H Y O Y G X K G R R E L A T T E Y N U C 25 Z J Y B I Z P Z H Y L H S S F M B U U F Z O V D