Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Data Encryption Standard (DES)
Encryption and Encoding
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Section 2.9 The Hill Cipher; Matrices
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Introduction to Cryptography
Encryption: A Brief History Author: Margery Waldron.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
Mixed Alphabets with Words And Mixed Alphabets with Columnar Transposition Team Members: Mike, Peter, Lakhbir, Joe Fijalkowski.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Combination of MonoAlphabetic &Transposition Cipher
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
CAP Cryptographic Analysis Program
Classical Polygraphic Ciphers
Computer and Data Security 4th Class
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Jerry Cain and Eric Roberts
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Cryptography II Jagdish S. Gangolly School of Business
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Cryptanalysis of Vigenere Cipher
Cryptography: Cesar Cipher
slides courtesy of Eric Roberts
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site

A substitution cipher is a cipher in which correspondents agree on a rearrangement (permutation) of the alphabet in which messages are written.

Examples 1. Ciphers given in newspapers. 2. Atbash cipher – p. 3 of textbook.Atbash cipher 3. The Gold Bug short story by Edgar Allan Poe:The Gold BugEdgar Allan Poe 4. Beale Cipher (contained in the Beale Papers) Bedford, Virginia.Beale CipherBeale Papers

Shift ciphers and affine ciphers are special examples of substitution ciphers where mathematical formulas are used to rearrange the alphabet. There are other ways to create a more random arrangement of the letters which we describe next.

Techniques For Creating Simple Substitution Ciphers 1.Mixed Alphabets with Simple Keyword Substitution Cipher. 2.Mixed Alphabets with Keyword Columnar Substitution Cipher.

1.Mixed Alphabets with a Simple Keyword Substitution Cipher We write the letters of a keyword without repetitions in order of appearance below the plaintext alphabet. We then list the remaining letters of the alphabet below the plaintext in the usual order.

Example 1: Suppose we want the use the keyword “NEILSIGMON” to create a simple keyword substitution cipher. a. Use the keyword to create the cipher alphabet. b. Encipher “BURIED TREASURE” c. Decipher “TQAXAS AR N HAIS LJM”.

Solution:

Example 1 illustrates a flaw that can occur in a simple substitution keyword cipher. Normally, the last several letters of the plain and ciphertext in a simple substitution cipher are the same. These “collisions” can make this type of cipher more vulnerable to cryptanalysis. The next method for creating a substitution cipher attempts to alleviate this problem.

2.Mixed Alphabets with Keyword Columnar Substitution Cipher We write the letters of a keyword without repetitions in order of appearance. The remaining letters of the alphabet are written in successive rows below the keyword. The mixed ciphertext alphabet is obtained by writing the letters of the resulting array column by column (starting with column 1) below the plaintext alphabet.

Example 2: Suppose we want to use the keyword “RADFORDVA” to create a keyword columnar substitution cipher. a. Create the cipher alphabet. b. Encipher “THOMAS BARR” c. Decipher “VFUDO RH UKFQYO JFEEYCY”

Solution:

Cryptanalysis of Substitution Ciphers To break a ciphertext that is encrypted using a substitution cipher, we use frequency analysis on single letters, digraphs (highly occurring two letter sequences), and trigraphs (highly occurring three letter sequences). The following tables given on the last page of this section list the most common occurring frequencies of single letters, digraphs, and trigraphs.

Example 3: Suppose the following message RI YMU ABK EQCBF THC ECBGC ARNHCQ, YMU JBY ECAMJC B VCQY QRAH NCQSMK was enciphered using a substitution cipher. Decipher this message.

Solution: Using the Internet SiteInternet Site

Example 4: Suppose the following message IBSM JEOJFE UZDSQ UZE CEBFE NDJZER DK B ZOBA. WE IBM SELER QSOW GOR KVRE. was enciphered using a substitution cipher. Decipher this message.

Solution: Using the Internet SiteInternet Site