Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Cryptography Programming Lab
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Introduction to Cryptography
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
© A+ Computer Science mixlplik igpay atinlay.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Chapter Two: Classic Cryptography
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
•□♎♏• ♋■♎ •♓•♒♏❒• (Codes and Ciphers)
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Columnar Transposition
Basic Encryption Methods
Chapter-2 Classical Encryption Techniques.
Cryptography.
Lesson 4-5 AP Computer Science Principles
Lesson 5: Simple Encryption
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Pigpen Cipher A = Q = T = Z = A B C D E F G H I J K L M N O P Q R S T
Substitution Codes By Sarah Bonnell.
Lesson 7: Simple Encryption
Information Security IT423
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Presentation transcript:

Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall the same. Transposition ciphers - keep all of the original letters intact, but mix up their order. Use both methods, one after the other, to further confuse an unintended receiver as well.

Substitution Ciphers Substitution ciphers could properly be called codes in most cases Standard Public Codes Morse code, shorthand, ASCII code Secret Codes Captain Midnight Decoder Ring Julius Caesar’s secret code

"encoder" ring/ Caesar’s code Uses two concentric wheels of letters, A to Z. Rotate outside ring and substitute the letters in your message found on the outside ring with the letters directly below on the inside ring. Algorithm - offset the alphabet using a key (number of characters to offset it). Julius Caesar used this simple scheme, offsetting by 3 characters Example: "EXPLORATORIUM" Answer: "HASORUDWRULXP"

Another Substitution Code Little tougher to decode: Randomly assign a code to each letter. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Q W E R T Y U I O P A S D F G H J K L Z X C V B N M Example: “MEET ME AFTER SCHOOL BEHIND THE GYM.” Answer: “DTTZ DT QYZTK LEIGGS WTIOFR ZIT UND.”

Tricks to breaking code Word lengths - especially the short words - give great clues as to the nature of the code (see frequency charts). Example: Cryptoquip puzzles To help conceal your message, ignore the spaces and break the message up into equal-sized chunks. Five letters are customary in the spy biz Example: DTTZD TQYZT KLEIG GSWTI OFRZI TUNDM

diagrammatic cipher Used by many children in school, substitutes symbols for letters instead of other letters. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z abcdef ghijklmnopqr stuvwxyz Easier to remember than 26 randomly picked letters. Example: Meet me after school behind the gym

Frequencies An arm-chair cryptologist would take less than 10 minutes to figure out the outer-space alien text. Why? Given enough ciphertext, certain patterns become obvious. Notice how often eappears: 6 times out of 29 characters (about 20% of the time). The eis almost certainly the symbol for "E," the most frequently used letter in English.

Francis Bacon’s secret code Uses two different type faces slightly differing in weight (boldness). Break up ciphertext into 5 character groups, each of which would represent one character in plaintext. Depending on which characters of the group were bold, one could determine the plaintext character using the following table (* stands for a plain character and B for a bold character)

Francis Bacon’s code Secret Code A=***** G=**BB* M=*BB** S=B**B* Y=BB*** B=****B H=**BBB N=*BB*B T=B**BB Z=BB**B C=***B* I=*B*** O=*BBB* U=B*B** D=***BB J=*B**B P=*BBBB V=B*B*B E=**B** K=*B*B* Q=B**** W=B*BB* F=**B*B L=*B*BB R=B***B X=B*BBB

Francis Bacon’s code Secret Message: To be or not to be that is the question. Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles and by opposing end them? Decoded: M E E T M E B E H I N Tobeo rnott obeth atist heque stion Wheth ertis noble rinth emind D T H E G Y M A F T E tosuf ferth eslin gsand arrow sofou trage ousfo rtune ortot akear R S C H O O L msaga insta seaof troub lesan dbyop posin gendt hem

Transposition ciphers Original letters are kept intact, but rearranged in some way. oo-day oo-yay ow-knay ig-pay atin-lay? Scytale : Spartans in 5th century B.C Uses a cylinder with a ribbon wrapped helically around it from one end to the other. The message was written across the ribbons, and then unwrapped from the cylinder. Someone with an identical diameter cylinder could re-wrap and read the message.

The scytale depended on a piece of hardware, the cylinder, which could be stolen or broken. It would be better if the method were completely "intellectual" and could be remembered and used without resorting to a physical device. Both the sender and receiver must use this algorithm for enciphering and deciphering. Geometrical figures serve as the basis for a whole class of transposition ciphers.

Transcription Code M E E T M E MACEH EFHHE ETOIG TEONY MRLDM ESBTO We can now transcribe the message by moving down the columns instead of across the rows. MACEH EFHHE ETOIG TEONY MRLDM ESBTO You don't have to write your plaintext into the box row by row Let's put our message into the shape of a box. Since there are 29 characters, we'll add a dummy ("O") to make 30 and write the message in a six by five box. M E E T M E A F T E R S C H O O L B E H I N D T H E G Y M O

columnar transposition Think of a secret key word. Example: “SECRET”. Write it above the columns of letters in the square. Number the letters of the key word in alphabetical order. (If there are duplicate letters, like the "E", they are numbered from left to right.) 5 2 1 4 3 6 S E C R E T M E E T M E A F T E R S C H O O L B E H I N D T H E G Y M O Now write the columns down in the order indicated by the numbers. The result: ETOIG EFHHE MRLDM TEONY MACEH ESBTO