Autokey Ciphers. History The Autokey Cipher is almost identical to the Vigenère Cipher – only it’s more secure It was first invented by Girolamo Cardano.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CAP Cryptographic Analysis Program
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Cryptography Programming Lab
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
The Internet. A Little About Me I’m a UNM graduate student As well as an UNM alumni and UNM employee Born and raised in Albuquerque I have a house and.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
1 Cryptanalysis With thanks to Professor Sheridan Houghten.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
CAP Cryptographic Analysis Program Homophonic Cipher Help Presentation Press Enter or click on your mouse button to continue.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Substitution Ciphers.
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
History and Background Part 4: Transposition Ciphers
Classical Polygraphic Ciphers
Computer and Data Security 4th Class
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
Topic 3: Data Encryption.
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Fun with Cryptography The Science of Secrecy.
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Autokey Ciphers

History The Autokey Cipher is almost identical to the Vigenère Cipher – only it’s more secure It was first invented by Girolamo Cardano and was made more secure by Vigenère

Encryption Start by choosing plain text and a keyword of any length Write the keyword over the plain text, and then immediately after the keyword, begin writing the plain text Key: RESTAURANTMEET Plaintext: MEETMEFORLUNCH

Encryption II After you assign a keyword to all of the plain text, you are going to need a tabula recta.

Encryption III In order to encrypt plain text, you locate the row with the first letter to be encrypted, and the column with the first letter of the key. The letter where the line and column cross is the ciphertext letter

Example Key: RESTAURANTMEET Plaintext: MEETMEFORLUNCH Cipher letter = D Continue this for the rest of the message.

Example, cont. You should now have this encrypted text: Key: RESTAURANTMEET Plaintext: MEETMEFORLUNCH Ciphertext: DIWMMYWOEEGRGA Now, if someone gave you the message “DIWMMYWOEEGRGA”, would you know how to decrypt it?

Decryption secret messageAssuming the buddy who sent you the secret message likes you, he probably sent you the keyword, too. With a key of RESTAURANT and ciphertext DIWMMYWOEEGRGA, find the key characters in the top-column header and the ciphertext characters in the table

Example, Cont. Key: R ESTAURANTMEET Ciphertext: D IWMMYWOEEGRGA Plaintext = M Repeat! The secret message: “Meet me for lunch”.

Cryptanalysis secret messagesecret passwordNow, say your buddy sent you the secret message, but didn’t give you the secret password - you now have a wonderful problem!

How to solve it Choose common trigrams or bigrams in all possible positions for the key. Here, we use “the”. Try it in all possible positions for the key

Example Ciphertext: WMP MMX XAE YHB RYO CA Key: THE THE THE THE THE.. Plaintext: DFL TFT ETA FAX YRK.. Ciphertext: W MPM MXX AEY HBR YOC A Key:. THE THE THE THE THE. Plaintext:. TII TQT HXU OUN FHY. Ciphertext: WM PMM XXA EYH BRY OCA Key:.. THE THE THE THE THE Plaintext:.. WFI EQW LRD IKU VVW Promising!

Example Cont. We also know that some of the plain text is also in the key, to the right of the keyword In the previous slide, we marked the possible plain text fragments “ETA”, “OUN” and “FAX” as promising Now we will use these, plus “THE” to try and guess the keyword length

Example Cont. Shift by 4: Ciphertext: WMPM M XXA E YHB R YOC A Key: ETA. THE. OUN. Plaintext:......THE. OUN. AIN. Shift by 5: Ciphertext: WMPMMXXAEYHBRYOCA Key:.....EQW..THE..OU Plaintext:.....THE..OUN..OG Unlikely to have a “Q” in the keyword. Plain text looks good!

Example Cont. Now we have to use our brains The four letter shift looks good, so we can guess that the keyword is probably about 4 characters long Through the “guess-and-check” method, we can fill in some blanks

Almost done! You should now have something like this: ciphertext: WMPMM X XAE YHB R YOC A key:.. LTM. ETA. THE. OUN. Plaintext:..ETA. THE. OUN. AIN.

The secret message? “Meet at the fountain”. …and no, Mr. Evans, that wasn’t “relatively pain-free.”

Sources tokey.htmlhttp://realmoftwelve.kryptos.info/toolbox/au tokey.html