Meghan Emilio Professor Ralph Morelli February 18, 2004

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Codes, Ciphers, and Cryptography-Ch 2.3 Michael A. Karls Ball State University.
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Chapter 7 Introduction to Sampling Distributions
The Enigma Encryption System Andrew Regan CSC 290.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Chapter 11: Random Sampling and Sampling Distributions
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introductory Statistics for Laboratorians dealing with High Throughput Data sets Centers for Disease Control.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cracking the Code: Foundations of Cryptology A brief introduction to the underlying terms and concepts of cryptography and cryptanalysis Martina Weber.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
a connection between language and mathematics
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
The Mean : A measure of centre The mean (often referred to as the average). Mean = sum of values total number of values.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Unit 2 Modular Arithmetic and Cryptography IT Disicipline ITD1111 Discrete Mathematics & Statistics STDTLP 1 Unit 2 Modular Arithmetic and Cryptography.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Chapter 2 Basic Encryption and Decryption
Affine Cipher.
Asad Gondal Ali Haider Mansoor
Monkeys and Coincidences
Section 2.7 The Friedman and Kasiski Tests
Cryptography and Network Security
Introduction Of System Security
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
Classical Cryptography
Kasiski Method Reference
Peanuts (a) Since averages are less variable than individual measurements, I would expect the sample mean of 10 jars to be closer, on average, to the.
Calculating Probabilities for Any Normal Variable
Fun with Cryptography The Science of Secrecy.
Confusion and Diffusion
Cryptography: Cesar Cipher
LORENZ, COLOSSUS.ccawa
. Columnar Transposition
Presentation transcript:

Meghan Emilio Professor Ralph Morelli February 18, 2004 Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004

Introduction Index of Coincidence (IC) is a statistical measure of text which distinguishes text encrypted with a substitution cipher from plain text. IC was introduced by William Friedman in The Index of Coincidence and its Applications in Cryptography (1920) It has been called "the most important single publication in cryptology”.

The Idea IC is defined to be the probability that two randomly selected letters will be identical. Imagine a hat filled with the 26 letters of the alphabet. The chance of pulling out an A is 1/26. If we had two such hats. The probability of pulling out two As simultaneously is (1/26)*(1/26). The chance of drawing any pair of letters is 26*(1/26)*(1/26) = (1/26) = 0.0385 So the IC of an evenly distributed set of letters is 0.0385

The Idea (cont.) Suppose we fill the hats with 100 letters, and had the number of each letter correspond to the average frequency of that letter in the English language. (i.e. 8 As, 3 Cs, 13 Es, etc.) The chance of drawing any pair of identical letters is (8/100)*(8/100) + (3/100)(3/100) + (13/100)(13/100) + … = 0.0667 This is the IC for English. Every language has such an IC, for example: Russian: 0.0529 German: 0.0762 Spanish: 0.0775

Σ(fi * (fi-1)) Calculating the IC N(N-1) The formula used to calculate IC: Σ(fi * (fi-1)) N(N-1) where 0 > i > 25, fi is the frequency of the ith letter of the alphabet in the sample, and N is the number of letters in the sample

Example The IC of the text THE INDEX OF COINCIDENCE would be given by: c(3*2)+ d(2*1)+ e(4*3)+ f(1*0)+ h(1*0)+ i(3*2)+ n(3*2)+ o(2*1)+ t(1*0)+ x(1*0) = 34 divided by N*(N-1) = 21*20 = 420 which gives us an IC of 34/420 = 0.0809 The IC of the text BMQVSZFPJTCSSWGWVJLIO would be given by: b(1*0)+ c(1*0)+ f(1*0)+ g(1*0)+ i(1*0)+ j(2*1)+ l(1*0)+ m(1*0)+ o(1*0) + p(1*0)+ q(1*0)+ s(3*2)+ t(1*0)+ v(2*1)+ w(2*1)+ z(1*0) = 12 which gives us an IC of 12/420 = 0.0286

How is this helpful? IC can be used to test if text is plain text or cipher text. Text encrypted with a substitution cipher would have an IC closer to 0.0385, since the frequencies would be closer to random. English plaintext would have an IC closer to 0.0667. This measure allows computers to score possible decryptions effectively.

References Kahn, David. The Codebreakers. The MacMillan Company, New York: 1967. http://raphael.math.uic.edu/~jeremy/crypt/coincidence.html http://codebook.org/node26.html http://members.fortunecity.com/jpeschel/gillog1.htm http://mywebpages.comcast.net/erfarmer201/vigenere/

Questions?