Classical Transposition Ciphers Day 13. Objectives Students will be able to… …understand what transposition ciphers are and how they are implemented.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CAP Cryptographic Analysis Program
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Introduction to Cryptography
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
8. Cryptography1 ISA 562 Information Security Theory & Practice Introduction to Cryptography.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Day 13 Classical Transposition Ciphers. Objectives Students will be able to…  …understand what transposition ciphers are and how they are implemented.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Data Security and Encryption (CSE348) 1. Lecture # 5 2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
CAP Cryptographic Analysis Program Anagram Help Presentation Press Enter or click on your mouse button to continue.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CAP Cryptographic Analysis Program
Row Transposition Ciphers
Columnar Transposition
CAP Cryptographic Analysis Program
History and Background Part 4: Transposition Ciphers
Classical Polygraphic Ciphers
Transposition Ciphers
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Symmetric Encryption or conventional / private-key / single-key
Information and Computer Security CPIS 312 Lab 3
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Classical Transposition Ciphers Day 13

Objectives Students will be able to… …understand what transposition ciphers are and how they are implemented. …create a transposition cipher of their own.

Transposition ciphers Rearrange the existing letters in the plaintext.

Rail-Fence cipher

Permutation cipher Key (d, f) d is a fixed length f is a permutation function Break the plaintext up into blocks of length d. Shuffle each block according to d.

Permutation: Example d = _________ f = ____________________ Plaintext ________________________________________ Ciphertext ________________________________________

Column permutation cipher Select keyword –Determines the number of columns –Determines the order of the columns

Column permutation cipher: Example

Column permutation cipher: cryptanalysis Determine possible underlying rectangles Discover which of the possible rectangles is correct (Note: vowels account for about 40% of characters.) Determine the column order

Column permutation cipher: cryptanalysis – centiban weight U.S. government studied a collection of 5000 digrams Calculated a value called a centiban weight Columns that produced a sum total of centiban values from the digrams that are greater then other columns have a higher probability of being the correct column.

Column Cipher: Example NETEF LTDSR TSSTF MDCET DRHXS WHOHO EEADU OUUFI RRRRS NEROT CFIEM EDSHA RTCPJ AOEGE WNLHO EPMWA WERUV AAINA TSDDS OEOAC EHNTL HFLAU RAEEN OTOTS SOSYS TNNCG EMETT YDYRR NEOOE RESTH INR (Spillman, 2005, p. 91)

Double-Transposition Cipher Perform a column transposition cipher twice. You can use the same keyword. Makes it more difficult for cryptanalysis. Can be broken when you have multiple ciphertext documents.

History of Transposition Ciphers Used by Greeks Used by the U.S. during the Civil war Used by the Germans in WWI (Turning grille)