Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
1 Codes, Ciphers, and Cryptography-Ch 2.3 Michael A. Karls Ball State University.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
Section 2.9 The Hill Cipher; Matrices
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
CIS 5371 Cryptography Introduction.
MAT 1000 Mathematics in Today's World Winter 2015.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Affine Cipher.
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
Section 2.7 The Friedman and Kasiski Tests
Cryptography and Network Security
Computer and Data Security 4th Class
Taehyung Kim HPC Lab. POSTECH
Outline Some Basic Terminology Symmetric Encryption
Cryptography Lecture 2.
Classical Polyalphabetic Ciphers
Kasiski Method Reference
Cryptanalysis of Vigenere Cipher
Presentation transcript:

Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman tests give keyword lengths, but not the keyword. – The method described here not only estimates the keyword length but also allows the determination of the keyword. The method was described by Charles Babbage 1854…

Mathematical Description of the Vigenere Cipher and Cosets Fact: When a plaintext letter is enciphered using a keyword letter, the result is equivalent to adding the two characters together mod 26. Example 1: Encipher with Vigenere Example 1 The first step in decrypting a Vigenere cipher is to know the length of the keyword. Definition: A coset are all the letters of the Vigenere ciphertext that are enciphered by the same letter of the keyword. – Note: A coset of the Vigenere ciphertext has the same encipherment as a shift cipher…

Mathematical Description of the Vigenere Cipher and Cosets Example 2: Keyword PET Example 2 Fact: The number of cosets is the length of the keyword. Note: If the length of the keyword is n, then there are 26^n possible ways the Vigenere cipher can be constructed. Note: Because a coset is formed from a shift cipher, we can perform a frequency analysis on that coset, which frequency is the same as the regular alphabet only shifted according to the letter of the keyword.frequency Example 3 – Three letter keyword decipher… Example 3

Mathematical Description of the Vigenere Cipher and Cosets The method described in Example 3 describes how to break the Vigenere Cipher. Let’s now describe the method in more detail: – Definition: English Signature Graph– the plot of the probabilities of printed standard English plotted in increasing sorted order (from smallest to largest).English Signature – Definition: English Sample Signature Graph– The signature plot of the probability frequencies of a sample of letters (small set). Note:English Sample Signature Some letters may not appear in the sample. Some letters will have probability zero. Other letters will have probability greater than in the English Signature The sum of all the probabilities is 1. The sample signature curve should be lower than the English Signature initially, then become higher then the English Signature for the higher occurring frequencies. The sample signature of the plaintext message should have the same sample signature as the ciphertext, when the shift on the cosets is correct…

Mathematical Description of the Vigenere Cipher and Cosets Example 3A: Sample SignatureSample Signature – The Table of frequency of lettersTable of frequency – The Sample and Signature GraphsSample and Signature – Notice that for the graphs the Sample signature probabilities start out below the English Signature but end up above. As mentioned before this is to be expected. (This behavior is typical of small sample signatures)…

Mathematical Description of the Vigenere Cipher and Cosets How can we use the concept of a signature to determine the length of the keyword used in a Vigenere cipher (Each letter of the keyword performs a simple shift cipher and forms a coset) – Each coset should perform like a simple shift cipher. Since there are few letters in each coset we would expect the first few letters to be below the English Signature, and those at the end to be above the English Signature. – The number of cosets is the same as the number of letters in the keyword. – Example 5 Comparing Coset Signatures… Example 5 Comparing Coset Signatures

Determining The Keyword Using Scrawls Scrawl – The graph of the probability distribution of letters in alphabetical order. English Scrawl – The scrawl of the entire English Language. English Scrawl Sample Scrawl – The scrawl of a sample of English (for example a ciphertext message) Sample Scrawl Facts about Scrawls: – For a shift cipher, the scrawl of the ciphertext will be roughly the shape of the English Scrawl except it is shifted to the right. For the Vigenere this means each coset – For each coset produced by a keyword letter in the Vigenere cipher, we will draw successive shifts (from 0 to 25) until we find the sample coset scrawl with the closest match to the English Scrawl. – The alphabet letter in our MOD 26 alphabet assignment corresponding to the shift amount number found in step 2 is the shift amount when ciphering the text. The inverse of the number will be the keyword letter needed in the Vigenere encipherment. – Repat steps 2 and 3 for each coset. Example 6: Continuation of Example 5…! Example 6