Vigenére Cipher Kimberly Chiffens & Maria Jannelli.

Slides:



Advertisements
Similar presentations
CAP Cryptographic Analysis Program
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Codes, Ciphers, and Cryptography-Ch 2.3 Michael A. Karls Ball State University.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptanalysis. The Speaker  Chuck Easttom  
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
Monkeys and Coincidences
Section 2.7 The Friedman and Kasiski Tests
Classical Polygraphic Ciphers
Taehyung Kim HPC Lab. POSTECH
Classical Cryptography
Classical Polyalphabetic Ciphers
Cryptanalysis of Vigenere Cipher
Traditional Symmetric-Key Ciphers
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Vigenére Cipher Kimberly Chiffens & Maria Jannelli

Progress Report Implementation of Vigenere encryption and decryption Applet design Implementation of Friedman attack to find key length Apply cryptanalysis algorithms

Friedman Attack Key Length Uses frequencies to count the amount of each letter in the ciphertext We multiply the count of each letter by count minus 1 and then add up the sum. It computes the sum of the frequencies as follows: for(int k = 0; k < 26; k++) sum = sum + Fcount[k]*(Fcount[k]-1); }

Friedman Attack Index of Coincidence To find this we divide the entire sum of the frequencies with the length of the cipher times the length minus 1. index= sum/(length*(length-1)); Then we must calculate the key length. To do so we use this equation: keyword= ((0.0265*length)/((0.065- index)+(length*(index-0.0385)))); The probability of choosing an identical pair of letters from a pool in which there are equal numbers of the respective letters The probability that a letter selected at random is an “A” The probability that two randomly selected letter in the English alphabet letters are identical

Friedman Example Ciphertext: KSMEHZBBL KSMEMPOGA JXSEJCSFL ZSY Frequencies: Length = 30 letters Key: RELATIONS Plaintext: TOBEORNOT TOBETHATIST HEQUEST ION A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 5 ((0.0265*length)/((0.065- index)+(length*(index -0.0385)))); keyword=

Cryptanalysis Step One: Find the key length Step Two: Generate possible keys C T M Y R D O I B S R E S R R R I J Y R E K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3   B Y L D I Y M L C C Y Q X S R R M L Q F S K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 D X F O W F K T C Y J R R I Q Z S M X K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1 K2 K3 K1

Cryptanalysis Set 1: Red Letters Frequency Set 2: Green Letters Set 3: Blue Letters C 2 T M Y 3 R 4 D 1 O I B S E L J F X Q W K Z

Cryptanalysis Most frequent letters of the English alphabet: E, T, N, O, R, I, A, S Ciphertext letter Possible plaintext letter Corresponded key-word letter Possible first letter of the keyword Y E U T F N L O K R H I Q A S G

Cryptanalysis Ciphertext letter Possible plaintext letter Corresponded key-word letter Possible second letter of the keyword R E N T Y O D A I J S Z

Cryptanalysis Corresponded key-word letter Possible first letter of the keyword Possible second letter of the keyword Possible third letter of the keyword U N F Y L E K D H A Q J R G Z Create all possible three-letter words by choosing first letter from the first column, second from second column and third from third column. Possible keywords: FED, FEE, FEN, LEA, KEN, KEY, HER….

Cryptanalysis The answer: Deciphering the ciphertext with keyword KEY will give a plaintext: SPOON FEEDING IN THE LONG RUN TEACHES US NOTHING BUT THE SHAPE OF SPOON.

Kasiski Attack The goal is to find the key length Count the gaps between repeated trigrams in the ciphertext The key is a divisor of the GCDs of the gaps

Kasiski Attack Example Ciphertext: IVE VYGARMLMY IVE KFD IVE FRL

References Principles of Operating Systems: Design and Application, Brian L. Stuart. Course Technology. 2009. Invitation to Cryptology, Thomas H. Barr. Prentice Hall. 2002.