Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 Basic Encryption and Decryption (part B)
Introduction to Cryptography
Cryptography Week-6.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
CIS 5371 Cryptography Introduction.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Lecture 3 Page 1 CS 136, Fall 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Lecture 4 Page 1 CS 136, Spring 2009 Introduction to Cryptography CS 136 Computer Security Peter Reiher April 9, 2009.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Row Transposition Ciphers
Columnar Transposition
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Classical Polygraphic Ciphers
Cryptography and Network Security
CS4780 Cryptography and Information Security
Basic Encryption Methods
Taehyung Kim HPC Lab. POSTECH
Cryptography.
Outline What is data encryption? Cryptanalysis
Chapter 3:Cryptography (16M)
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Outline What is data encryption? Cryptanalysis
Outline What is data encryption? Cryptanalysis
Outline What is data encryption? Cryptanalysis
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Basic Encryption Methods
Types of Cryptanalysis attacks
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Presentation transcript:

Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re scrambled Decryption uses key to unscramble

Characteristics of Permutation Ciphers Doesn’t change the characters in the message Just where they occur Thus, character frequency analysis doesn’t help cryptanalyst

Columnar Transpositions Write the message characters in a series of columns Copy from top to bottom of first column, then second, etc.

Example of Columnar Substitution How did this transformation happen? T r a n s f T e y n c T r a n s f e r $ 1 0 0 t o m y s a v i n g s a c c o u n t T e 0 y n c r r g o a t s s u n $ o a n s 1 v a t f 0 m i c e r $ l r r g o t o m a t s s u y s a v i n $ o a n n g s a c s l v a t c o u n t f m i c Looks a lot more cryptic written this way: Te0yncrr goa tssun$oa ns1 vatf0mic

Attacking Columnar Transformations The trick is figuring out how many columns were used Use information about digrams, trigrams, and other patterns Digrams are pairs of letters that frequently occur together (“re”, “th”, “en”, e.g.) For each possibility, check digram frequency

For Example, 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 Te0yncrr goa tssun$oa ns1 vatf0mic $ 1 In our case, the presence of dollar signs and numerals in the text is suspicious Maybe they belong together? Umm, maybe there’s 6 columns?

Double Transpositions Do it twice Using different numbers of columns How do you break it? Find pairs of letters that probably appeared together in the plaintext Figure out what transformations would put them in their positions in the ciphertext Can transform more than twice, if you want

Generalized Transpositions Any algorithm can be used to scramble the text Usually somehow controlled by a key Generality of possible transpositions makes cryptanalysis harder

Which Is Better, Transposition or Substitution? Well, neither, really Strong modern ciphers tend to use both Transposition scrambles text patterns Substitution hides underlying text characters/bits Combining them can achieve both effects If you do it right . . .

Quantum Cryptography Using quantum mechanics to perform crypto Mostly for key exchange Rely on quantum indeterminacy or quantum entanglement Existing implementations rely on assumptions Quantum hacks have attacked those assumptions Not ready for real-world use, yet Quantum computing (to attack crypto) even further off