History and Background Part 3: Polyalphabetic Ciphers

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Chapter 2 Basic Encryption and Decryption (part B)
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Attacks on Public Key Encryption Algorithms
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Row Transposition Ciphers
Asad Gondal Ali Haider Mansoor
Introduction to Modern Symmetric-key Ciphers
6b. Practical Constructions of Symmetric-Key Primitives.
History and Background Part 4: Transposition Ciphers
Communication Security
Cryptography and Network Security
Basic Encryption Methods
Computer and Data Security 4th Class
Outline Some Basic Terminology Symmetric Encryption
Computer and Network Security
Lecture 3: Symmetric Key Encryption
Cryptography and Network Security Chapter 3
Cis 4930 Introduction to cryptography
Introduction to Modern Symmetric-key Ciphers
Block Ciphers and the Data Encryption Standard (DES)
Block Ciphers (Crypto 2)
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Traditional Symmetric-Key Ciphers
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Feistel Cipher Structure
Presentation transcript:

History and Background Part 3: Polyalphabetic Ciphers CSCI 5857: Encoding and Encryption

Outline The Vigenére polyalpabetic cipher Enigma One-time pads

Polyalphabetic Substitution Single plaintext character may map to multiple possible ciphertext characters Character mapped to depends on position in plaintext Ci = f(pi, i) Frequency analysis attacks much harder

Vigenére cipher Key = some word or phrase of length n ci = (pi + ki mod n) mod 26 Example: Key: “python” Plaintext: “rabbitwithbigpointyteeth”

Vigenére Cipher Example Create table with plaintext in one row, key in next row If size of key < plaintext, repeat as necessary “Add” values in corresponding column to get ciphertext r+p = 17+15 = 6 = G a+y = 0+24 = 24 = Y b+t = 1+19 = 20 = U b+h = 1+7 = 8 = I (note difference!)

Frequency Analysis Vigenére cipher still vulnerable to frequency-based cryptanalysis Guess key size n Treat like n different monoalphabetic substitutions General principle: Larger n  more secure (that is, number of characters before repetition)

Enigma Developed by Germany in WW2 Arguably most complex pre-computer substitution cipher Flash simulation at http://enigmaco.de/enigma/enigma.html

Enigma Structure Consists of 3 to 5 rotors Each rotor is a monoalphabetic mapping of a plaintext character to a ciphertext character Output of one rotor fed into input of next rotor so final output the result of 3 to 5 monoalphabetic substitutions Rotors turn after each character! Fast rotor: every character Middle rotor: every 26 characters Slow rotor: every 26 x 26 = 676 characters

Enigma Diagram

Enigma Analysis 26 x 26 x 26 = 17,576 characters entered before repetition Essentially invulnerable to frequency-based cryptanalysis (particularly if rotors changed at regular intervals) Required Alan Turing’s Bletchley Group to crack Captured machines to understand patterns Large numbers of known plaintexts Exhaustive searches using primitive computers

One-Time Pad Idea: Make key as long as the message itself! (Joseph Mauborgne) Unconditionally secure since inherently ambiguous for attacker Only example of an unconditionally secure encryption algorithm

One-Time Pad Example Example ciphertext: NZAKBMK Ciphertext: NZAKBMK NZAKBMK Possible keys: nlvwker wtnkxmm Plaintext: goforit runaway Which key is correct? We have no way of knowing since both are plausible plaintext!

One-Time Pad Weakness Only get to use a key for one message Unlikely that different possible keys would still both result in plausible plaintext for more than one message Adversary could find correct key by process of elimination Ciphertext: WMGKZX WMGKZX Possible keys: nlvwke wtnkxm Plaintext: jblopt attack Would need to securely distribute a new key for each message! “This is the one!”

What’s Next Let me know if you have any questions Continue on to the next lecture on transposition ciphers