CAP Cryptographic Analysis Program

Slides:



Advertisements
Similar presentations
CAP Cryptographic Analysis Program
Advertisements

CAP Cryptographic Analysis Program
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
Section 2.9 The Hill Cipher; Matrices
Chapter 2 – Classical Encryption Techniques
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSCI 5857: Encoding and Encryption
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
CAP Cryptographic Analysis Program Homophonic Cipher Help Presentation Press Enter or click on your mouse button to continue.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CAP Cryptographic Analysis Program General Help Presentation Press Enter or click on your mouse button to continue.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
THE MOUSE Left Click THE MOUSE Right Click.
1 Solve it with the Computer Rick Spillman CSCE 115 Spring 2012 Lecture 8.
Chapter 2 Basic Encryption and Decryption
Asad Gondal Ali Haider Mansoor
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Traditional Symmetric-Key Ciphers
Section 2.7 The Friedman and Kasiski Tests
CAP Cryptographic Analysis Program
History and Background Part 4: Transposition Ciphers
CS4780 Cryptography and Information Security
Basic Encryption Methods
History and Background Part 3: Polyalphabetic Ciphers
Polyalphabetic Ciphers
CSCI-235 Micro-Computer Applications
Cryptography Lecture 2.
Security through Encryption
Encryption and Decryption
Classical Cryptography
Classical Polyalphabetic Ciphers
Kasiski Method Reference
Cryptanalysis of Vigenere Cipher
Confusion and Diffusion
SYMMETRIC ENCRYPTION.
Cryptography and Cryptanalysis
Cryptography Lecture 2.
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Traditional Symmetric-Key Ciphers
Differential Cryptanalysis
EKRJGTU CTG CYGUQOG! Can you break the code?.
Cryptanalysis Network Security.
Elect. Codebook, Cipher Block Chaining
Stream Cipher Structure
Presentation transcript:

CAP Cryptographic Analysis Program Breaking Autokey-Plaintext Help Presentation Press Enter or click on your mouse button to continue

Breaking the Autokey-Plaintext This is not as easy to break as the autokey-ciphertext but . . . A Kasiski-like method exists to determine the “group length” The group-length is the actual keyword length but since the keyword is not repeated, the group-length describes the length of segments of the running key These segments define the distance between a plaintext letter being enciphered and becoming a key letter

Group Length For example, if the keyword is “alice” a possible cipher structure could be given by 5 a l i c e t h i s i s a n e x t t is a key letter t t is enciphered t h i s i s a n e x a m p l e

Finding the Group Length It is possible to discover the group length from the ciphertext Assume the group length is 5 then every plaintext letter will be enciphered by the letter 5 positions to its left and in turn will encipher the letter 5 positions to its right. Since plaintext has a lot of repeated characters there will be an unusually large number of identical letters separated by the group length Example R There is a good chance that this kind of event will occur Key: . . . R . . . S Plaintext: . . . S . . . R Ciphertext: . . . J . . . J S Group length

Procedure Find the distances between all letter repetitions The most common distances are strong candidates for the group-length CAP will automatically calculate these distances:

Using the Group Length a l i c e t h i s i s a n e x t Knowledge of the group length reveals how the plaintext is divided into segments. If the group length is 5, then the first segment consists of every 5th letter beginning with the first letter We know the encipher chain for this segment, for example: a l i c e t h i s i s a n e x t s t h i s i s a n e x a m p l e a t s q u m l h v w f s m c p b

Brute Force Attack We can use a brute force attack because each segment is defined by its beginning character (which is from the key word) For example: a Guess Ciphertext (known) Key character (unknown) plaintext (unknown) t ? ? t t Try all 26 guesses l ? ? t s s a s s ? ? Use a low frequency character test