Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Encryption and Encoding
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Cryptography Kinder Garden Number theory and Classical Cryptosystems Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/10/2010 INCS.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
8. Cryptography1 ISA 562 Information Security Theory & Practice Introduction to Cryptography.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Classical Encryption Techniques
Cryptography Programming Lab
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
a connection between language and mathematics
Lec. 5 : History of Cryptologic Research II
Introduction to Cryptography
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSCI 5857: Encoding and Encryption
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.3: Substitution Ciphers
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Affine Cipher.
Asad Gondal Ali Haider Mansoor
Classical Polygraphic Ciphers
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Basic Encryption Methods
Outline Some Basic Terminology Symmetric Encryption
Mixed Alphabet Keyword
Symmetric Encryption or conventional / private-key / single-key
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Classical Monoalphabetic Ciphers Day 2

Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write the keyword below the alphabet and fill in the rest of the space with the remaining letters of the alphabet in their standard order. VBA Code Modification: Allow the keyword to start anywhere along the alphabet.

Keyword: cryptanalysis Dictionary attach using a computer. Every letter of a language has a personality of its own. Determine the personality of each character in the ciphertext and try to match them with the known personalities of corresponding plain text. This attach was used as early as the 9 th century, by Arab scientist and philosopher al-Kindi.

Frequency analysis Assignment: –Download “Frequency_Analysis.xls” from the SMA website. –Find a word section of common English writing. Copy and format it in Word. –Copy it. –Use it in the Excel spreadsheet to do a single, double, and triple letter frequency count.

Compile class data

Frequency analysis “r” forms digrams with more different letters more often than any other letter. The three vowles, “a”, “I”, and “o” avoid each other, except for “io”. “ea” is the most frequent digram involving vowels. Eight percent of the letters that procede “n” are vowels. “h” frequently appears before “e” and almost never after it.

Frequency analysis Be willing to give up on an assumption and try something else if it appears that you are on the wrong path.

Affine cipher Each letter is assigned a number. “a” = 0, “b” = 1, “c” = 2, … The key to an affine cipher is a pair of numbers (a, b). The greatest common divisor (GCD) of a and 26 must be 1. Let p be the number of the plaintext letter and c the number of the ciphertext letter. c = (a p + b) mod 26 p = (a -1 (c – b)) mod 26

Affine: example a = 3, b = 7 Find the equations for encryption and decryption. Encrypt the message “the dog” Decrypt the message “TIVUJWL” Note: a a -1 = 1 (mod n)

Affine: cryptanalysis Is an affine cipher easier or harder to break then a keyword cipher? How would we break an affine cipher?

Multiliteral cipher It replaces each plaintext letter with a pair of letters. Choose a 5 letter keyword with no repeating letters. “i” and “j” occupy the same cell. abcde fghik lmnop qrstu vwxyz

Multiliteral: cryptanalysis Is an multiliteral cipher easier or harder to break then a keyword cipher? How would we break an multiliteral cipher?

Monoalphabetic cipher history The Argentis worked for the Pope during the late 1500 and early 1600s. –Probably first to use keyword –Numbers were used instead of letters Used by the South during the Civil War.

Monoalphabetic cipher history Middle Ages – nomenclator –Monoalphabetic and some substitutions for words or phrases –Mary, Queen of Scots

Review