Expert System for Analyzing Simple Ciphers: Properties of Cipher Texts Carolyn Rucci Advisor: Ralph Morelli 1 year project.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
An Expert System for Solving Simple Cryptograms Carolyn Rucci Dr. Ralph Morelli 1 year project.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Section 3.6: An Introduction to Cryptography
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Crypto Laboratory Winter Alexander Grechin and Zohar Rogel Under supervision of Zvika Berkovich.
Introduction to Cryptography
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Encryption on the Internet Eirik Albrigtsen. Encryption & Decryption Text Unreadable Text key + encryption method Unreadable Text Text key + decryption.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Security in Computing Cryptography (Traditional Ciphers)
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Information and Computer Security CPIS 312 Lab 1
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Teaching with Python Lukasz Ziarek SUNY Buffalo
Monkeys and Coincidences
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Section 2.7 The Friedman and Kasiski Tests
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Classical Polygraphic Ciphers
Cryptography and Network Security
Outline Some Basic Terminology Symmetric Encryption
Topic 3: Data Encryption.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Five-minute starter task
Encryption on the Internet
Classical Polyalphabetic Ciphers
2016 REPORT.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Homophonic Substitution Cipher
2016 REPORT.
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Expert System for Analyzing Simple Ciphers: Properties of Cipher Texts Carolyn Rucci Advisor: Ralph Morelli 1 year project

Overview What are letter frequencies and index of coincidence. What are letter frequencies and index of coincidence. What index of coincidence and patterns of letter frequencies does each cipher follow? What index of coincidence and patterns of letter frequencies does each cipher follow? Transposition Transposition Caesar Caesar Affine Affine Vigenère Vigenère Playfair Playfair Summary Summary What next? What next?

Review of Letter Frequencies and Index of Coincidence Letter Frequencies Letter Frequencies a b c d e f g h i j k l m n o p q r s t u v w x y z monographic frequency distribution of normal alphabet Index of Coincidence Index of Coincidence thisisatestoftheindexofcoincidenceinmessages thisisatestoftheindexofcoincidenceinmessages thisisatestoftheindexofcoincidenceinmessagesthi 5matches / 44letters ~ 11%

Transposition Cipher Simply rearranges the letters  same letters present in cipher text as plain text Reverse text: there once was a cat named fred derf deman tac a saw ecno ereht Conclusion: Frequency distribution will be the same.

Caesar Each cipher letter corresponds to the plain text letter three after it. Each cipher letter corresponds to the plain text letter three after it. Plain Alphabet: a b c d e f g h i j k l m n o p q r s t u v w x y z Plain Alphabet: a b c d e f g h i j k l m n o p q r s t u v w x y z Caesar Alphabet: d e f g h i j k l m n o p q r s t u v w x y z a b c Caesar Alphabet: d e f g h i j k l m n o p q r s t u v w x y z a b c Conclusion: Frequency distribution will match when shifted three spots. Conclusion: Frequency distribution will match when shifted three spots. the quick fox jumped over the lazy dog wkh txlfn ira mxpshg ryhu wkh odcb grj Shift 3

Affine Each cipher letter corresponds to exactly one plain text letter. Each cipher letter corresponds to exactly one plain text letter. Conclusion: Same frequencies will be present but in a random order. Conclusion: Same frequencies will be present but in a random order.  Ex: a=4 and b=5:  A = (4*1 + 5) mod 26 = 9  I C = (aP + b) mod 26 PlainremainderCipher B13M C17Q D21U E25Y F3C

Vigenère Many cipher alphabets created based on keyword. Many cipher alphabets created based on keyword. A B C D E F … X Y Z B C D E F G … Y Z A C D E F GH … Z A B : Y Z A B C D... V W X Z A B C D E … W X Y CIPHERCIPHER KEYWORDKEYWORD A B C D E F … X Y Z K L M N O P … H I J E F G H I J K … B C D Y Z A B C D … V W X W X Y Z A B … U V W O P Q R S T … L M N R S T U V W … O P Q D E F G H I … A B C  Conclusion: No pattern to letter frequencies.  Find identical sequences of letters.  the frog jumping the fence…  dlc bffj tyklwej dlc bsefo…  Calculate interval bt/w sequences  If interval between two occurrences has common factor  length of keyword

Playfair Mixed alphabetic sequence of 25 letters is written into a 5x5 square (J normally omitted). Mixed alphabetic sequence of 25 letters is written into a 5x5 square (J normally omitted). DBMWI COXGE QYRFS ZAKTP LUHMV Case1: 2corners  replace w/other corners Case2: same row  replace w/letters to right Case3: same column  replace w/letters below Conclusion: No pattern of letter frequencies. Conclusion: No pattern of letter frequencies.

Summary of Findings Index of Coincidence Frequency Distribution (compared to normal) Transposition~6.6%Same Caesar~6.6% Will match if shifted 3 to right Affine~6.6% Same frequencies present but in different orders Vigenère~3.8% Flat distribution Playfair~3.8%

Review of Letter Frequencies and Index of Coincidence Letter Frequencies Letter Frequencies a b c d e f g h i j k l m n o p q r s t u v w x y z monographic frequency distribution of normal alphabet Index of Coincidence Index of Coincidence thisisatestoftheindexofcoincidenceinmessages thisisatestoftheindexofcoincidenceinmessages thisisatestoftheindexofcoincidenceinmessagesthi 5matches / 44letters ~ 11%

What Next? Finalize criteria for distinguishing between Vigenère and Playfair ciphers. Finalize criteria for distinguishing between Vigenère and Playfair ciphers. Create a Java program that: Create a Java program that: 1) Examines index of coincidence and patterns of frequencies 2) Uses this information to determine which cipher was used