Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Programming exam next Thursday on breaking codes from chapter 2 Programming exam next Thursday on breaking codes from chapter 2 Written.
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
Announcements: Pass in Assignment 1 now Pass in Assignment 1 now Meet my assistant Kevin Reed Meet my assistant Kevin Reed Assignment 2 (tentative) posted.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Network Management and Security
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Lecture 2 Overview.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Computer Security coursework 2 Dr Alexei Vernitski.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Intro to Cryptography Lesson Introduction
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Chapter 2 Basic Encryption and Decryption
Introduction CS 303 Algorithmic Number Theory and Cryptography
Asad Gondal Ali Haider Mansoor
Section 2.7 The Friedman and Kasiski Tests
Cryptography and Network Security
Outline Some Basic Terminology Symmetric Encryption
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Traditional Symmetric-Key Ciphers
Presentation transcript:

Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479: DszquphsbqizDay 5

Idea: the key is a vector of shifts Ex. Use a word like hidden ( ). Ex. Use a word like hidden ( ). Example: Example: The recent development of various methods of aph uiplvw giiltrsqrub ri znyqrxw zlbkrhf vnEncryption: Repeat the vector as many times as needed to get the same length as the plaintext Repeat the vector as many times as needed to get the same length as the plaintext Add this repeated vector to the plaintext. Add this repeated vector to the plaintext. Demo Demo Vigenere Ciphers

The recent development of various methods of modulation such as PCM and PPM which exchange bandwidth for signal-to-noise ratio has intensified the interest in a general theory of communication. A basis for such a theory is contained in the important papers of Nyquist and Hartley on this subject. In the present paper we will extend the theory to include a number of new factors, in particular the effect of noise in the channel, and the savings possible due to the statistical structure of the original message and due to the nature of the final destination of the information. (Claude Shannon’s A Mathematical Theory Of Communication) Source

The vector isn’t known It’s length isn’t even known! With shift cipher, most frequent cipher letter is probably e. But here, e maps to H, I, L, … (spread out!) But here, e maps to H, I, L, … (spread out!) Consider 4 attacks: Known plaintext? Known plaintext? Chosen plaintext? Chosen plaintext? Chosen ciphertext? Chosen ciphertext? Ciphertext only? Ciphertext only? Security

Cryptanalysis What would you do to simplify the problem? You can even assume that you know how long the key is… 3-4 min with a partner

English letter frequencies A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Graph:

Exceptions Consider Gadsby by Ernest Vincent Wright, February 1939: What do you notice about it?

Cryptanalysis Assume we know the key length, L, … We’ll see how to find it shortly We’ll see how to find it shortly Method 1: Parse out the characters at positions p = 1 (mod L) Parse out the characters at positions p = 1 (mod L) These have all been shifted the same amount Do a frequency analysis to find shift The most frequent letter should be e, given enough text. Can verify to see how shift affects other letters. The most frequent letter should be e, given enough text. Can verify to see how shift affects other letters. This gives the first letter of the key This gives the first letter of the key Repeat for positions p = 2, p = 3, … p = L Repeat for positions p = 2, p = 3, … p = L Problem: involves some trial and error. Problem: involves some trial and error. For brute force to work, would need to brute force all letters of key simultaneously: _____ possibilities For brute force to work, would need to brute force all letters of key simultaneously: _____ possibilities

Dot products Consider A = ( ) A i = A displaced i positions to the right A 0.* A 0 = ? A 0.* A 1 = ? A i.* A j depends on _____ only. Max occurs when _____. 3 reasons why:

Finding the key length What if the frequency of letters in the plaintext approximates A? Then for each k, frequency of each group of letters in position p = k (mod L) in the ciphertext approximates A. Then loop, displacing the ciphertext by i, and counting the number of coincidences. Get max when displace by correct key length Get max when displace by correct key length So just look for the max! So just look for the max!shift APHUIPLVWGIILTRSQRUBRIZNYQRXWZLBKRHFVN (0) NAPHUIPLVWGIILTRSQRUBRIZNYQRXWZLBKRHFV (1) VNAPHUIPLVWGIILTRSQRUBRIZNYQRXWZLBKRHF (2) … KRHFVNAPHUIPLVWGIILTRSQRUBRIZNYQRXWZLB (6) 5 matches

Key length: an example Take any random pair in the ciphertext: The letter in the top row is shifted by i (say 0) The letter in the bottom row is shifted by j (say 2) Prob(both ‘A’) = P(‘a’)*P(‘y’) = * Prob they are the same (any letter) is ______ When i=j, get max # of coincidences Occurs when we shift by the correct key length Demo

Another method Method 1 Parse out the characters at positions p = 1 (mod L) Parse out the characters at positions p = 1 (mod L) These have all been shifted the same amount Do a frequency analysis to find shift The most frequent letter should be e, given enough text. Can verify to see how shift affects other letters. The most frequent letter should be e, given enough text. Can verify to see how shift affects other letters. This gives the first letter of the key This gives the first letter of the key Repeat for positions p = 2, p = 3, … p = L Repeat for positions p = 2, p = 3, … p = L

Another method Method 2 Parse out the characters at positions p = 1 (mod L) Parse out the characters at positions p = 1 (mod L) These have all been shifted the same amount Get the whole freq. distribution W = (0.05, 0.002, …) W approximates A. Calculate W approximates A. Calculate Max occurs when we got the shift correct. Max occurs when we got the shift correct. Note we use the distribution of all 26 letters…more robust than just using 1 (‘e’). Note we use the distribution of all 26 letters…more robust than just using 1 (‘e’). This gives the first letter of the key This gives the first letter of the key Repeat for positions p = 2, p = 3, … p = L Repeat for positions p = 2, p = 3, … p = L

Summary of both methods Method 1 Pros? Pros? Method 2 Pros? Pros?

Demo Of my code…

Visualization /Vigenere.html /Vigenere.html Play with now and for homework Thanks to Dr. Dino Schweitzer, USAFA, who I met last Friday, for pointing me to his demo! Aren’t you glad I was at SIGCSE?

Closing Thought What if we modified the Vigenere cipher so that each individual letter was not simply shifted, but the result of an affine function?