Code Making/Breaking. What methods have you seen for encoding secret messages?

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Navajo Code Talkers. The Code Talkers took part in every assault the US Marines conducted in the Pacific
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Confederate Cipher Disk
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Go to READ the DIRECTIONS Try Path 1 and Path 2
a connection between language and mathematics
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Secret Codes.  A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers to send messages or store.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
© A+ Computer Science - Codes and ciphers have existed for hundreds of years. People have always had the need to hide secrets.
© A+ Computer Science mixlplik igpay atinlay.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
CRYPTOLOGY IN WWII ByJOE&SEAN. SIGABA SIGABA was similar to the Enigma in basic theory A series of rotors enciphered every character of the plaintext.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune into.
CS 150 – Computing: From Ada to the Web Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CRYPTOGRAPHY. DEFINITION Cryptography is the science of writing in secret code The earliest documented use began around 2,000 B.C in Egypt (Hieroglyphics)
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Week 3. Day 1 – Meet the Word Part “Divide and Conquer” Day 1.
An NCTM Illuminations Lesson. Please cut out the two circles on the Caesar Shifter Activity Sheet in your packet.
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Encryption with Keys and Passwords
Key words: Intercept | Decipher | Translate
CRYTOGRAPHY PIGPEN CIPHER.
Chapter 2 Basic Encryption and Decryption
Key words: Cryptography | Binary | Cipher
Encryption.
Forensic Science Questioned Documents: Part 3
World War II During WWII the primary method of communication was the Radio. The problem with radios was that anyone with a radio receiver could tune.
Cryptography CS Principles January 19, 2017.
In this lesson we will understand:
Topic 3: Data Encryption.
Lesson 5: Simple Encryption
Cryptography Survey.
History of Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Lesson 7: Simple Encryption
Cryptography : Introduction
Digital Communications
Traditional Symmetric-Key Ciphers
By Sean O’Mahoney from the Computing Society at Futures Friday
Presentation transcript:

Code Making/Breaking

What methods have you seen for encoding secret messages?

Morse code Letter Jumble Decoder rings Binary code Video Game Cheat Codes Bar Codes

Codes vs. Ciphers Codes – symbols or groups of letters to represent words or phrases Ciphers – where one letter is replaced with another by a either simple or a complex scheme. –PLLX XLP= Good Dog (if L=O,P=G,X=D)

Morse Code

Binary Code

Translate this code:

Hint A = 1, B = 2, C = 3,..., Z = 26

What about this? TFNRIUJ UZV DREP KZDVJ SVWFIV KYVZI UVRKYJ; KYV MRCZREK EVMVI KRJKV FW UVRKY SLK FETV. Comes from William Shakespeare’s play Julius Caesar

This table shows the percent frequency of each letter in the English alphabet. LETTER FREQUENCY (%) LETTER FREQUENCY (%) A 7.3 N 7.8 B 0.9 O 7.4 C 3.0 P 2.7 D 4.4 Q 0.3 E 13.0 ***R 7.7 F 2.8 S 6.3 G 1.6 T 9.3 *** H 3.5 U 2.7 I 7.4 V 1.3 J 0.2 W 1.6 K 0.3 X 0.5 L 3.5 Y 1.9 M 2.5 Z 1.0 Use Letter Frequency Analysis

Hint The letter V occurs the most times (13) in the ciphertext. The letter K occurs the second most times (9) in the ciphertext. The letter R occurs the third most times (7) in the ciphertext. This is an example of a 17 letter shift, Caesar cipher

Solution Cowards die many times before their deaths; the valiant never taste of death but once.

Codes in History A Caesar cipher Caesar, Emperor of Rome B.C. letters are replaced by letters a certain distance ahead in the alphabet. (25 possible shifts) method to communicate with Roman army. generals knew the shift so they would be the only ones who could read the encrypted message

Make a Caesar Cipher “ROME IS THE GREATEST EMPIRE” Use letter wheels Make it a 7 letter shift Cipher

In Cipher form: YVTL PZ AOL NYLHALZA LTWPYL

Decode this Caesar 7 Cipher YVTL DHZ UVA IBPSA PU H KHF

Solution Rome was not built in a day

Codes in History World War II German Enigma Cipher: Machine used to encrypt and decrypt secret messages. electro-mechanical rotor machine Machine had changeable settings The total number of combinations of settings was of the order of 15,000,000,000,000,000,000, and then there is the ring-setting complication on top of this. The task facing anyone trying to decipher a particular message is to find which one of these 15 billion billion settings has been used. Enigma Demo

Codes in History Navajo Code-Talkers WW2: Syntax, tonal qualities, dialects make it unintelligible to anyone without extensive exposure and training. no alphabet or symbols spoken only on the Navajo lands of the American Southwest. less than 30 non-Navajos, none of them Japanese, could understand the language at the outbreak of World War II. Each “talker” had a body guard

Footnote on Code Talkers The U.S. Army used Choctaw code talkers to relay communications on the battlefields in France in World War I. So effective were these code talkers that after the war ended, Germany sent people to the United States to learn the languages of the American tribes. In particular, Adolf Hitler pursued experts in American Indian dialects in preparation for conquering Europe

Vigenere cipher Form of a shift code but harder to crack Based on code words Used by Confederates during the Civil War

Let’s code this: Let keyword be: “Math” MATH MA THM ATHMATHM ATHMAT. ROME IS THE GREATEST EMPIRE.

Vigenere cipher Continuing in this manner, the encoded message would be: DOFL US MOQ GKLMTXZF EFWURX.

Vigenere cipher Vigenere cipher difficult to decode, because the length of the keyword is unknown If a keyword had two letters, the number of possibilities a code breaker would have to try would be 26 2 = 576

Do Now Create a coded message for another group Supply them with keyword Exchange and decode.