Classical Polygraphic Ciphers

Slides:



Advertisements
Similar presentations
390 Codes, Ciphers, and Cryptography
Advertisements

Chapter 4 Systems of Linear Equations; Matrices
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Section 2.9 The Hill Cipher; Matrices
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Section 3.6: An Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
2.4 Inverse of Linear Transformations For an animation of this topic visit: Is the transformation.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Classical Transposition Ciphers Day 13. Objectives Students will be able to… …understand what transposition ciphers are and how they are implemented.
Day 13 Classical Transposition Ciphers. Objectives Students will be able to…  …understand what transposition ciphers are and how they are implemented.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Introduction to Cryptography
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
CAP Cryptographic Analysis Program Homophonic Cipher Help Presentation Press Enter or click on your mouse button to continue.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in.
Mathematical Concepts in Cryptography 355 Brian Tafel, Mark Shippy Raymond Fuller, and Mireya.
Section 2.3: Substitution Ciphers
How To Find The Reduced Row Echelon Form. Reduced Row Echelon Form A matrix is said to be in reduced row echelon form provided it satisfies the following.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CS480 Cryptography and Information Security
Math 8H Algebra 1 Glencoe McGraw-Hill JoAnn Evans 8-4 Factoring Trinomials ax 2 + bx + c.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Classical Cryptography
12-4: Matrix Methods for Square Systems
Substitution Ciphers.
Network Security Unit-1
Group 04: Yiyang Zhongyang Tan Xiao
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Substitution Ciphers.
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
AES Objectives ❏ To review a short history of AES
Use Inverse Matrices to Solve Linear Systems
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Information Security IT423
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Chapter 4 Systems of Linear Equations; Matrices
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Classical Polygraphic Ciphers Day 10

Playfair cipher Named after Lord Playfair. Invented by Wheatstone in 1854. Encrypts digrams Used in Second Boer War, WWI, WWII Solution to breaking the cipher was in 1914.

Playfair cipher Encryption Choose a keyword and write in a 5 x 5 square then fill in remaining, omitting “j” for “i”

Playfair cipher encryption If both letters are the same (or only one letter is left), add an "X" after the first letter. Encrypt the new pair and continue. Some variants of Playfair use "Q" instead of "X", but any uncommon monograph will do. If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row). If the letters appear on the same column of your table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column). If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important – the first encrypted letter of the pair is the one that lies on the same row as the first plaintext letter. http://en.wikipedia.org/wiki/Playfair_cipher

Playfair cipher decryption To decrypt, use the inverse of these 4 rules (dropping any extra "X"s (or "Q"s) that don't make sense in the final message when you finish). http://en.wikipedia.org/wiki/Playfair_cipher

Playfair example Plaintext:_______________________________________________ Keyword:________________________

Playfair cryptanalysis For very large ciphertext samples, vulnerable to frequency analysis. Vulnerable to know plaintext attach.

Hill cipher Invented by Lester S. Hill in 1929 Able to encrypt digrams, trigrams, tetragrams, etc. Uses elementary linear algebra Patent 1,845,947 in 1929 for a 6 x 6 implementation

Hill cipher encryption Each letter is treated as a letter in base 26: A = 0, B = 1,… The key is a random invertible matrix a in Place blocks of n letters of the plaintext into a vector v Multiply the key matrix by the vector (a.v)

Hill cipher decryption Each letter is treated as a letter in base 26: A = 0, B = 1,… Multiply the inverse of key matrix by the vector (a-1.v)

Hill cipher cryptanalysis Each letter is treated as a letter in base 26: A = 0, B = 1,… Multiply the inverse of key matrix by the vector (a-1.v)

Hill cipher assignment