Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Section 2.9 The Hill Cipher; Matrices
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Section 3.6: An Introduction to Cryptography
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Lesson 4-5 AP Computer Science Principles
PART VII Security.
Encryption with Keys and Passwords
Encryption and Decryption
Encryption with Keys and Passwords
Fun with Cryptography The Science of Secrecy.
Traditional Symmetric-Key Ciphers
Presentation transcript:

Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis). Professor Lesh of the math department teaches a general education math class on cryptology, during which the first several weeks focus on classical cryptology (early techniques for encoding a message). I have created a set of web based tools that will act as an aid for the students helping them to break the codes they will see in their homework. Solving these homework problems is very time consuming but with the web based tools I have created students will be able to solve these problems faster allowing them to do more as well as having another means to study. Professor Lesh will also see theses advantages since she solves the problems for the class as well. Additionally, it will allow her to use more complicated examples since students can now backtrack more easily. Since these tools are web based it will allow students to use them without any downloading or installation. It will also make them easier to access since they can be used from almost any computer with an internet connection. By being easy to use and accessible to everyone, the tools I created should greatly benefit the students and the professor of a classical cryptology course. MonoAlphabetic Cipher: This is the next cipher students learn. The Caesar Cipher is a form of the Monoalphabetic cipher, both have a 1-1 mapping between ciphertext letters and plaintext letters. However, while knowing the decryption of one letter in the Caesar Cipher helps you decrypt the rest of the code, knowing one letter here does not help decrypt the rest. In this area of the page students can enter the plaintext value of each of the ciphertext letters. By comparing the frequency analysis of the typical English language to the frequency analysis of the ciphertext, students will have a guide to help them decrypt the code. They can see the progress of their decryptions in two places. The first is in the plaintext box located at the top, the second is located directly below that. Caesar Cipher: The first Cipher (a specific method of encoding and decoding a message) the students learn is the Caesar Cipher. In this cipher every letter is shifted some value forward or backwards. For example A with a Caesar shift of 3 would result in D. One severe downfall to this Cipher is that once you know one letter you know them all since all letters hold their relative positions. Also since there are only 26 values, this Cipher is very vulnerable to a brute force attack. For this tool, students can enter the value that they want to shift the text by. When they click shift, the result of this shift is displayed in the plaintext box. Vigenére Cipher: The Vigenére Cipher is the most complex classical cryptology cipher the students will work with. Unlike the Monoalphabetic cipher, this is not a 1-1 mapping, instead it is based on a keyword. Each letter of the keyword corresponds to a different Caesar shift (a=0, b=1…). The first part of the tool finds the repeated segments in the text. An example of this can be seen below. This is how the student finds the length of the keyword. Once they have the length of the keyword they enter it here and are given a place to input the keyword and can choose which group of letters they want to look at. By looking at the frequency analysis of a group of letters, students can figure out the keyword one letter at a time, decrypting the ciphertext. Repeated Strings: The figure to the left is what the student will see when they create the graph of repeats in the cipher text. By printing this out the student will be able to check off the factors of the distance between these segments. In order to do this as quickly as possible I used a version of a longest common sub-string algorithm. By creating a two dimensional array you can see the length of all repeats in two strings. In this case the two strings are the same. Rows are filled out one at a time. If the letter of the column matches the letter of the row the value of the upper-left cell is increased by 1, otherwise a 0 is entered (pseudo code to the right). Once the table is filled out you can examine it and find all of the repeats as well as how long it is and where it is located. This algorithm has a runtime of O(nm). Since it uses the same string it has a runtime of O(n 2 ). Here is one example below, with the string THBZTHBT. T H B Z T H B T T H B Z T H B T Future Work: If enough time is saved new Ciphers could be introduced to the class and new tools could be added accordingly. In the most extreme case a class could focus on classical cryptology and this tool could expand to accommodate that. Another feature that would be helpful if added would be the ability to encrypt as well as decrypt. This will allow students to create some examples of their own allowing them to more easily do additional studying. for(i=0; i<the length of the string; i++) { for(j=0; j<the length of the string; j++) { if (the ith letter is equal to the jth letter) cell [i, j] = cell [i-1, j-1] +1; else cell [i, j] = 0; } if (any repeated strings ended) (add the string and its locations to a binary search tree with the string as its value) } Senior Project – Computer Science – 2007 WebTools for Classical Cryptology Tristan Beeble Advisor: Chris Fernandes Typical English FrequencyCiphertext Frequency Analysis