National Cipher Challenge

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Introduction to Cryptography
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Programming Lab
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
MAT 1000 Mathematics in Today's World Winter 2015.
CS110: Computers and the Internet Encryption and Certificates.
Introduction to Cryptography
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Encryption CS110: Computer Science and the Internet.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Encryption with Keys and Passwords
Using a Growth Mindset to Help Our Students Succeed
Substitution Ciphers.
Lesson 2-18 AP Computer Science Principles
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Introduction To Cryptography
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
Monkeys and Coincidences
Accsess 2013 Creating Database.
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Computer and Data Security 4th Class
Basic Encryption Methods
Polyalphabetic Ciphers
Outline Some Basic Terminology Symmetric Encryption
Topic 3: Data Encryption.
Lesson 5: Simple Encryption
Cracking the Coding Interview
Cryptography Survey.
Campbell R. Harvey Duke University and NBER
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
User access levels, Passwords, Encryption, Cipher, Key
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Creativity in Algorithms
Codename: ULTRA Can your mathematical skills save the United Kingdom from defeat and invasion?
Encryption with Keys and Passwords
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Encryption and Decryption
Cryptography Survey.
LO: Use logic and frequency analysis to read and write in code.
National Cipher Challenge
Fundamentals of Data Representation
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Encryption with Keys and Passwords
Lesson 7: Simple Encryption
Build the first 5 odd numbers – each one with different colored blocks
Skip Counting is Fun! By Mrs Oste.
Mr Watson’s Introduction to Spreadsheets
Traditional Symmetric-Key Ciphers
National Cipher Challenge
Picture This! Reducing Fractions
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Basic Encryption Methods
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Presentation transcript:

National Cipher Challenge A beginner’s guide to codes and ciphers Part 5, the keyword cipher

While mathematics can provide some very powerful ciphers, the two we have seen are not very strong. The problem is the keyspace. There are only 26 keys for the Caesar shift cipher and only 312 keys for the affine shift. A modern cipher has two components, an algorithm and a key. For the Caesar shift the algorithm is “rotate the alphabet” and the key is the amount of rotation, measured by where the letter A moves to. For the affine shift x -> ax +b, the key has two parts a, b. We saw in the last lesson that a has to be an odd number other than 13 and between 1 and 25, so there are only 12 choices. This gives a keyspace of size 12*26 = 312.

A long time ago the spies invented a much better system. It had to be: Strong – there had to be a lot of different keys. Memorable and easy to use – spies work under pressure and they don’t want to make mistakes.

The keyword cipher The key can be any word or name, or even phrase that you choose. You write it down, missing out repeated letters. Then complete the alphabet in order starting with the first missing letter. The keyword here is EXAMPLE. Note that for keyword substitution and column transposition ciphers we omit repeated letters from the keyword to avoid ambiguity, so here we have omitted the second E. In Vigenere ciphers this is not necessary. See the Beginner’s Guide to Codebreaking notes for more details. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Now we just encrypt the message one letter at a time. The submarine will pick up the agent on Friday dop cfxuebqvp hqtt yqas fy dop enpvd wv lbqmej Do an example with the group. Let them choose the keyword – best to be around 7 letters long without repeats, but if there is a repeat miss it out the second time it appears etc. If the keyword was Example then the cipher alphabet would be E X A M P L N O Q R S T U V W Y Z B C D F G H I J K

Leaving the word structure intact like this does weaken the cipher as we saw in the earlier lessons. We can try guessing that DOP stands for THE. dop cfxuebqvp hqtt yqas fy dop enpvT wv lbqmej A B C D E F G H I J K L M P O N Q R S T U V W X Y Z

But that really doesn’t get us very far! THE cfxuebqvE hqtt yqas fy THE enEvT wv lbqmej A B C D E F G H I J K L M ? P O N Q R S T U V W X Y Z

A CRIB can be enormous help. THE cfxuebqvE hqtt yqas fy THE enEvT wv lbqmej A B C D E F G H I J K L M ? P O N Q R S T U V W X Y Z If we are expecting a message about a submarine for example we might look for that.

Submarine hunter THE cfxuebqvE hqtt yqas fy SUBMARINE? THE enEvT wv lbqmej A B C D E F G H I J K L M X P O Q U N R S T V W Y Z

Submarine hunter DOP cfxuebqvP hqtt yqas fy THE SUBMARINE I I U DOP enPvD wv lbqmej THE A ENT N RI A A B C D E F G H I J K L M X P O Q U N R S T V W Y Z

This is looking good! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE I I U DOP enPvD wv lbqmej THE A ENT N RI A Now think like a crossword addict! Five letter word, something about spycraft, A_ENT. It has to be agent. A B C D E F G H I J K L M X P O Q U N R S T V W Y Z

This is looking better than good! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE I I U DOP enPvD wv lbqmej THE AGENT N RI A A B C D E F G H I J K L M X P N O Q U R S T V W Y Z

This is looking excellent! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE I I U DOP enPvD wv lbqmej THE AGENT N RI A The way the cipher works we should have RST in the three blanks between Q and U. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Wow we are good at this! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE ILL I K U DOP enPvD wv lbqmej THE AGENT N RI A The way the cipher works we should have RST in the three blanks between Q and U. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

This agent is as good as caught! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE ILL I K U DOP enPvD wv lbqmej THE AGENT N RI A THE SUBMARINE _ILL? Maybe H stands for W? In which case G must go in the gap between F and H so G stands for V. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Hmm, getting trickier now! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE WILL I K U DOP enPvD wv lbqmej THE AGENT N RI A THE SUBMARINE WILL _i__ U_ THE AGENT? What do submarines do to agents? Drop them off and pick them up! So YQAS =PICK? A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Ah that’s better! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE WILL PICK UP DOP enPvD wv lbqmej THE AGENT N RI A THE SUBMARINE WILL PICK UP THE AGENT _N? IN? or ON? It can’t be IN because Q (and not W) stands for I. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Got you now! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE WILL PICK UP DOP enPvD wv lbqmej THE AGENT ON RI A THE SUBMARINE WILL PICK UP THE AGENT _N? IN? or ON? It can’t be IN because Q (and not W) stands for I. And we could have spotted that the single gap between V and Y in the table can’t have X in it as that is under B, so it must be W! A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

In the bag! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE WILL PICK UP DOP enPvD wv lbqmej THE AGENT ON FRIDAY THE SUBMARINE WILL PICK UP THE AGENT ON _RI_AY? It must be FRIDAY! So now we can complete our table and crack any other messages encrypted with the same cipher. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

We are the best! DOP cfxuebqvP hqtt yqas fy THE SUBMARINE WILL PICK UP DOP enPvD wv lbqmej THE AGENT ON FRIDAY THE SUBMARINE WILL PICK UP THE AGENT ON _RI_AY? It must be FRIDAY! So now we can complete our table and crack any other messages encrypted with the same cipher. A B C D E F G H I J K L M X P N O Q R S T U V W Y Z

Uh oh!