An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Graohics CSC 171 FALL 2001 LECTURE 16. History: COBOL Conference on Data System Languages (CODASYL) - led by Joe Wegstein of NBS developed the.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project.
Expert System for Analyzing Simple Ciphers: Properties of Cipher Texts Carolyn Rucci Advisor: Ralph Morelli 1 year project.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Computer Security coursework 2 Dr Alexei Vernitski.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Python Programming in Context Chapter 3. Objectives To introduce the string data type To demonstrate the use of string methods and operators To introduce.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Cryptology Tim Cahill Ryan Church.
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
Cryptography.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Computer Security (CS4800)
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
Genetic Algorithms and Evolutionary Programming A Brief Overview.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Chapter 2 Basic Encryption and Decryption
Asad Gondal Ali Haider Mansoor
Identity Theft uses of Cryptography
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Outline Some Basic Terminology Symmetric Encryption
Chapter 3:Cryptography (16M)
Simple Encryption- Lesson 5
Cryptography: Cesar Cipher
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project

Overview Goal Background information What is an Expert System My Expert System - CipherExpert How does CipherExpert Work? Extensibility Results from testing Caesar Cipher

What? How? Goal Cryptanalysis techniques

Background Information dqdobvlv dqg ghflskhuph qw ri hqfubswhg phvvdjhv Cryptography Cryptanalysis Analysis and decipherm ent of encrypted messages

What is an Expert System? Reasons! CipherExpert

Hcrypto Analyzer classes (Java) Jess Expert System Main Java Class Hcrypto Decryption Classes (Java) Computer Science department libraries Prototype that uses a limited set of historical ciphers: Transposition, Caesar, Affine, Vigenere and Playfair Cipher Expert

How Does the Expert System Work? Distribution of Letter Frequencies Index of Coincidence

Easily Extensible Ciphers Substitution Simple- CaesarAffine Poly- PlayfairVigenere Transposition Rail FenceNew Cipher Add new classifications to family tree New rules New Cipher New Rules

Testing Tested CipherExpert 36 times, using 3 texts of varying length Determined CipherDecrypted Text Short Text (36 chars ) 10 / 12 Medium Text (500 chars) 11 / 1210 / 12 Long Text (1500 chars) 12 / 12 Overall 33 / 3632 / 36

Caesar Cipher abcdefghijklmnopqrstuvwxyz Ocdn dn v ozno oj nzz da ncjmo hznnvbzn rjmf. This is a test to see if short messages work. vwxyzabcdefghijklmnopqrstu Key = shift by 5 decipher

Advantages of an Expert System 1. More Efficient and accurate than other methods  Do not have to try all ciphers to find a decryption  No false positive decryptions 2. Analysis based on the frequencies of letters in the message  Distribution of letter frequencies  Index of coincidence

Java Main Class IndexOfCoincidence IOC(String) getIOC() : double Cipher Cipher(String) getShift() : int setCipher(String) getCipher() : String wkdwlvkr zlizrunv Text file Originally “unknown” IndexOfCoincidence IOC(String) getIOC() : double Cipher Cipher(String) getShift(): int setCipher(String) getCipher() : String Rete Java Main Class

Jess: Getting Started Search depth - 1 parent - no-parent ic - call getIOC() on object shift - call getShift() on object type - unknown last-move - no-move Create a template for initial position Fetch IndexOf Coincidence Object from rete

Jess: Example of Move to Substitution Rule Test shift <> 0 Search depth - 1 parent - no-parent ic shift - 4 type - unknown last-move - no-move Current_node true Matches node Creates new node Search depth - 2 parent - current_node ic shift - 4 type - unknown last-move - Substitution New_node

Jess: The Jess Path After each new node is created: 1) If type = knownRecognize cipher Return “last-move” of current node to Java 2) Else type unknownFurther solution Attempt to match another node