Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

CAP Cryptographic Analysis Program
CAP Cryptographic Analysis Program
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
 Introduction › What is Cryptology › Confusion and Diffusion › History  Methods › Single Key › Public Key  Cryptanalysis Overview  Ethics.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
FEAL FEAL 1.
CSCE 790G: Computer Network Security
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Classical Encryption Techniques
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Section 3.6: An Introduction to Cryptography
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Instructor: Dania Alomar
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
Group 04: Yiyang Zhongyang Tan Xiao
Part 2 By Dr. Shadi Masadeh
Communication Security
Classical Polygraphic Ciphers
Cryptography and Network Security
CS4780 Cryptography and Information Security
Substitution Ciphers.
Outline Some Basic Terminology Symmetric Encryption
Information Security IT423
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Basic Encryption Methods
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in with other letters of the alphabet, except I,J used interchangeably.

Playfair encryption 1.Break plaintext into letter pairs If a pair would contain double letters, split with x Pad end with x hellothere becomes… he lx lo th er ex 2.For each pair, If they are in the same row, replace each with the letter to its right (mod 5) he  KG If they are in the same column, replace each with the letter below it (mod 5) lo  RV Otherwise, replace each with letter we’d get if we swapped their column indices lx  YV He lx lo th er ex KG YV RV QM GI KU To decrypt, just reverse!

Weaknesses P is unknown, but structure of its bottom is predictable Can break using digram frequencies Example: If a digram and its reverse both appear often, it’s probably ER and RE. Each plaintext letter maps to how many possible ciphertext letters? He lx lo th er ex KG YV RV QM GI KU

Playfair ciphers Used in Dorothy L. Sayers’ 1932 mystery novel Have His Carcase Marketing beats technology? Invented by Charles Wheatstone Invented by Charles Wheatstone Lyon Playfair, a Scottish Baron, promoted it Lyon Playfair, a Scottish Baron, promoted it Who got the glory? Who got the glory?

ADFGX ciphers Why ADFGX? Morse code for these are very different Combined cryptography with error-correction Matrix 1: 25 letters (i and j merged again) randomly placed Each plaintext letter replaced by its row and column labels hello there  XA FA AA AA FF DG XA FA DF FA ADFGX Alkpbq Dmvrtz Fefodg Gxciyn Xhuwas

ADFGX ciphers (2) XA FA AA AA FF DG XA FA DF FA Matrix 2: pick a random keyword and write the previous result under it in scanline order. Shuffle the columns into alphabetical order Then read down the columns CRYPTU XAFAAA AAFFDG XAFADF FA

ADFGX ciphers (3) XA FA AA AA DG FF XA FA DF FA Matrix 2: pick a random keyword and write the previous result under it in scanline order. Shuffle the columns into alphabetical order Then read down the columns to get ciphertext: XAXFAFAAAAAADDAGFFFF CPRTUY XAAAAF AFADGF XAADFF FA

ADFGX Decryption easy… …if you know the original matrix and the keyword. Example? Example? Read about decryption ideas in text Variation: ADFGVX cipher allows 26 letters + 10 digits