Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.

Slides:



Advertisements
Similar presentations
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Advertisements

CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.

Introduction to Cryptography
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Introduction to Cryptography
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Traditional Symmetric-Key Ciphers
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Asad Gondal Ali Haider Mansoor
Communication Security
Classical Polygraphic Ciphers
CS4780 Cryptography and Information Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Classical Polyalphabetic Ciphers
Digital Communications
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6

In the monoalphabetic ciphers (shift, affine, substitution) we have looked at so far, we have always replaced a single plaintext letter with the same ciphertext letter. This makes this cipher highly vulnerable to frequency analysis. To increase security, we can change the cipher alphabet as we are enciphering the message. The following example illustrates an elementary method for doing this:

Example 1: Suppose we use the substitution PlainABCDEFGHIJKLMNOPQRSTUVWXYZ CipherEFGHIJKLMNOPQRSTUVWXTZABCD to encipher the odd letters of a message (first, third, fifth, etc. ) and PlainABCDEFGHIJKLMNOPQRSTUVWXYZ CipherHIJKLMNOPQRSTUVWXYZABCDEFG to encipher the even letters of a message (second, fourth, sixth, etc.). Use this scheme to encipher the message “HELLO THERE HENRY” and comment on why this cipher is no longer monoalphabetic.

Solution: Using the first table for odd letters and the second table for even letters, we obtain HELLOTHEREHENRY LLPSSALLVLLLRYC

Definition A polyalphabetic cipher is a cipher where different substitution alphabets are used for various parts of the plaintext message.

Examples of Polyalphabetic Ciphers 1.Alberti Cipher Disk – p. 7 of the Barr text.Alberti Cipher Disk

2. Thomas Jefferson Cipher Wheel – p. 15, p. 115 of the Barr text.Thomas Jefferson Cipher Wheel

3. German Enigma cipher machine used in World War II – p of the Barr text.German Enigma cipher machine

4. Vigenere Cipher - a polyalphabetic cipher invented by the Frenchman Blaise de Vigenere Cipher in 1585.Vigenere Cipher The value of this cipher was not known until frequency analysis was used to break monoaphabetic ciphers. As a result, this cipher was not used widely until the 1800’s.

Enciphering Messages with the Vigenere Cipher Correspondents agree on a keyword. The sender repeatedly writes the keyword below the plaintext, one keyletter beneath each plaintext letter. The cipher letter is found by finding the letter in the Vigenere cipher square where the column headed by the plaintext letter intersects the row labeled by the keyletter.Vigenere cipher square

Example 2: Use the keyword “TRIXIE” to encipher “HAVING A PET CAN MAKE YOU MORE HAPPY” using the Vigenere cipher. Solution: Using the cipher square gives the following:

Plaintext Keyword Ciphertext Plaintext Keyword Ciphertext

Deciphering Messages with the Vigenere Cipher Recipient first writes the keyword repeatedly above the ciphertext. For each key-ciphertext pair, find the row in the Vigenere cipher square labeled with the keyletter and then the ciphertext letter in that row. The plaintext letter appears at the head of the column in which the ciphertext letter sits.

Example 3: Suppose the keyword “SYLVESTER” was used to encipher the message “VMRNG SMWSA PONEF WIMWL ADKKV EEEYV ZRAVI GWR D”. Decipher this message. Solution: Writing the keyword above the ciphertext yields the following table:

Keyword Ciphertext Plaintext Keyword Ciphertext Plaintext Keyword Ciphertext Plaintext

Note If you know the plaintext and ciphertext of a message, you can recover the keyword by finding the ciphertext letter under the column of the corresponding plaintext letter. The keyword letter will be the one that sits in the row of the ciphertext letter.

Example 4: Determine the six-letter keyword that will decipher “EVVGOW” as “TVDOGS”. Solution: Using the cipher square after writing down the plaintext and ciphertext yields: Plaintext Ciphertext Keyword