Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

CAP Cryptographic Analysis Program
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Public Key Encryption Algorithm
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Computer Security CS 426 Lecture 3
Section 2.9 The Hill Cipher; Matrices
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Information Systems Security
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
CSCI 5857: Encoding and Encryption
DES Attacks and Triple DES
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
CAP Cryptographic Analysis Program Homophonic Cipher Help Presentation Press Enter or click on your mouse button to continue.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in.
A Java implemented key collision attack on the Data Encryption Standard (DES) John Loughran, Tom Dowling NUI, Maynooth, Co. Kildare, Ireland PPPJ ‘03.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
Genetic Algorithms and Evolutionary Programming A Brief Overview.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
Substitution Ciphers.
Symmetric Algorithm of Cryptography
CAP Cryptographic Analysis Program
History and Background Part 4: Transposition Ciphers
Classical Polygraphic Ciphers
CS4780 Cryptography and Information Security
Chapter 3:Cryptography (16M)
Cryptography II Jagdish S. Gangolly School of Business
Traditional Symmetric-Key Ciphers
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew

Where We are Going... What is the problem? Why use an Evolutionary Algorithm? The basics of cryptanalysis The workings of the Playfair cipher Implementing the concept Future goals Conclusion

The Problem Cryptography is necessary Data Protection Message Encryption Cryptanalysis is the “other side of the coin” What is it? Why is it needed? Use of the Playfair Cipher Admittedly simple, used for a proof-of-concept

Why use an Evolutionary Algorithm? EAs are able to solve difficult problems with less information about the problems than other methods Automation of the cryptanalysis process will help in making stronger cryptographic systems, and it is hoped that the EA will be better than current methods

The Basics of Cryptanalysis Several different types of attacks Ciphertext only Known plaintext Chosen plaintext Less common methods Chosen ciphertext Chosen text Brute force can be used, but domain knowledge is usually applied to make cryptanalysis easier.

The Workings of the Playfair Cipher Write a message, e.g. This is a message. Create a 5 x 5 matrix using some keyword with no repeating letters, e.g. MONARCHIST Write out the plaintext in digram form, e.g. TH IS IS AM ES SA G E Break up double letters with X or Z, if needed. MORNA CHTI/JS BDGEF KLUPQ VWZXY

The Workings of the Playfair Cipher Encrypt the message using the following: If the digram pair is in the same row, replace by the digram to the right, with wraparound right to left. e.g. ON becomes NA. If the digram pair is in the same column, replace with digram one space below with wraparound. e.g. OH becomes HD. MORNA CHTI/JS BDGEF KLUPQ VWZXY

The Workings of the Playfair Cipher For all other combinations, start with the first letter and move across until lined up with the second letter. Repeat with the second letter. e.g. ET becomes GJ and HE becomes JD MORNA CHTI/JS BDGEF KLUPQ VWZXY

Implementing the Concept Individuals will be based on possible keys for the algorithm – MONARCHJSTBDEFGKLP QUVWXYZ, for example Crossover will take random characters from one parent, keep them in the same position, and use the other parent to fill in the rest. Mutation will swap characters in the possible key. MORNA CHTI/JS BDGEF KLUPQ VWZXY

Implementing the Concept Fitness function is the most difficult to implement Take the possible key, decrypt the ciphertext Use a dictionary look-up on the plaintext generated Fitness increases as the number of real words increases MORNA CHTI/JS BDGEF KLUPQ VWZXY

Future Goals Obtain results Compare method to existing methods Expand the Playfair Cipher concept to larger matrices and compare the EA method to existing methods Use the concepts learned to try to solve more complicated cryptographic systems

Conclusion Cryptanalysis is just as necessary as cryptography The basic idea: cryptanalyze the Playfair Cipher using an Evolutionary Algorithm as a stepping-stone to more difficult problems The most difficult portion to implement is the fitness function Compare results obtained from the EA method to other methods in existence

Questions?