3-D Vigenere Cipher using a “Vigenere Cube”

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CAP Cryptographic Analysis Program
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
Classical Encryption Techniques
CSE 651: Introduction to Network Security
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Introduction to Cryptography
Section 3.6: An Introduction to Cryptography
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CS110: Computers and the Internet Encryption and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Introduction to Cryptography
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Symmetric-Key Cryptography
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Mixed Alphabets with Words And Mixed Alphabets with Columnar Transposition Team Members: Mike, Peter, Lakhbir, Joe Fijalkowski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Classical Polygraphic Ciphers
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Outline Some Basic Terminology Symmetric Encryption
Topic 3: Data Encryption.
Cryptography Survey.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Cryptography Survey.
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Double Transpositions
Types of Cryptanalysis attacks
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

3-D Vigenere Cipher using a “Vigenere Cube” Intro to Cryptography July 2003 Daniel Paluch Micah Acinapura

Extension of Vigenere Cipher Original Vigenere cipher: poly-alphabetic Uses Vigenere Squre One keyword Keyword letters pair up plaintext letters to choose Cipher alphabet. i.e. with a plaintext “hello” and a Key of “bye”: H E L O Plain B Y Key I C P M Cipher

3-D Vigenere Cipher H E L O G D B Y CharAt (H,G,B) (E,O,Y) (L,O,E) Instead of 2-D Vigenere table, 3-D Vigenere cube is used. Two Keywords. As in Vigenere the effective key is made out of the keyword with the plaintext concatonated on the end. A plaintext letter combines with a letter from each keyword to make a 3-D coordinate in space, or a position in our cube. I.e. Plaintext of “hello” and keys of “good” and “bye” H E L O Plain G D Key1 B Y Key2 CharAt (H,G,B) (E,O,Y) (L,O,E) (L,D,B) (O,G,Y) Cipher

Added Security Against Cryptanalysis One face of the cube will originally look like the Vigenere table, however the cube is primed using the keyword to increase security. Priming the cube consists of rotating specific columns, chosen based on the keyword. Columns are rotated after encryption of each letter, each column is rotated up or down, depending on the specific coordinates that selected that column. The plaintext that is concatenated onto the end of the keyword is transposed to eliminated ordered repetition in choosing cipher alphabets.. i.e. Plaintext of “helloworldhello” and a key of “bye” woul encode with “byehelloworldhe”, however with key transposition, “byeolwrhelodelo”, is now used to encode the plaintext, giving a much more random usage of cipher alphabets.

Sample Encryption Here we will use a smaller cube/alphabet of abc as an example. Our keys will be “bb” and “ac”. Our plaintext will be “abc”. Our Effective keys will be “bba” and “acb”. Here we select “a”from the coordinate {a,b,a} and Rotate. Cube primed with keys “bb” & “ac” Initial cube Cube after first rotation. Now we select “b” from the coordinate {b,b,c} and rotate again. Now we select “a” from the coordinate {c,a,b} and rotate again. Finally our plaintext of “abc” has been encoded to “aba”. Cube after Second rotation.

Sample Decryption Now we will decrypt “abb” with “bba” and “acb”. We will decrypt Starting at the end of our plaintext and encrypt backwards. Here we know that we find a “b” in column b, slice c, and we find it in row b, and unrotate again. Then we unrotate. Knowing that we have a “a” in column a, slice b, we can find it in row c. Again with our “a” in column b, slice a, we can find it in row a. Putting each row letter together we get cba, ou r plaintext backwards.

Recap Poly-alphabetic 3-D Vigenere cipher, using Vigenere cube. Two Keywords are used. Cube is “primed” (rotated) using keywords. Pi, K1i and K2i denote location in cube of Ci. Repeated keys are transposed to avoid ordered repetition. Cube is rotated after encryption of each letter.