Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.

Slides:



Advertisements
Similar presentations
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Advertisements

1 Codes, Ciphers, and Cryptography-Ch 2.3 Michael A. Karls Ball State University.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Introduction to Cryptography
Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CIS 5371 Cryptography Introduction.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Introduction to Cryptography
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Section 2.3: Substitution Ciphers
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
Monkeys and Coincidences
By: Mohsin Tahir waqas Akram Numan-Ul-Haq Ali Asghar Rao Arslan
Section 2.7 The Friedman and Kasiski Tests
Information and Computer Security CPIS 312 Lab 2
Computer and Data Security 4th Class
Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
Classical Polyalphabetic Ciphers
Kasiski Method Reference
Cryptanalysis of Vigenere Cipher
Traditional Symmetric-Key Ciphers
Symmetric Encryption or conventional / private-key / single-key
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Introduction to Cryptography Lecture 8

Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply. If the length of the message is longer than number of different ciphers, then repeat same ciphers in the same order.

Polyalphabetic Substitutions Example: Let the message be: Today is Tuesday. Let, where is a shift cipher with k=i. The message: UQGEZKUXVGVHBA. Two same letters encrypted to different letters Can not use English properties directly

Vigenere Square

Example: Let the message be: APRIL SHOWERS BRING MAY FLOWERS. Let the key word be: RHYME. Using the square we encrypt plaintext and get the message: RWPUPJOMIIIZZDMENKMCWSMIIIZ.

Vigenere Cipher Suppose the key word has n letters. Let the key letters be Let the plaintext be Let the cipher text be Then

Index of Coincidence Definition: The index of coincidence, I, is the probability that two randomly selected letters in ciphertext are identical. Formula: If I is close to 0.065, then most probably the cipher is monoalphabetic If I is close to , then most probably the cipher is polyalphabetic

Index of Coincidence Example: Let the message be: WSPGMHHEHMCMTGPNROVXWISCQ TXHKRVESQTIMMKWBMTKWCSTVLT GOPZXGTQMCXHCXHSMGXWMNIAX PLVYGROWXLILNFJXTJIRIRVEXRTAX WETUSBITJMCKMCOTWSGRHIRGKP VDNIHWOHLDAIVXJVNUSJX.

Index of Coincidence Example: Build a table of letter frequencies (there are 152 letters): ABCDEFGHIJKLM NOPQRSTUVWXYZ

Vigenere Cipher Vigenere cipher uses a keyword Let length of the keyword be k Assume the ciphertext is given We know message encrypted using Vigenere Cipher We can find estimated key size using:

Vegenere Cipher Example: For last example with n=152. The keyword may be about 4 letters.

The Kasiski Test The Kasiski test relies on the occasional coincidental alignment of letter groups in plaintext with the keyword Find groups of same letters of size 3 or more Calculate distance between those groups The greatest common divisor of those distances have a good chance to be the length of the key

The Kasiski Test Example: Let the message be: WCZOUQNAHYYEDBLWOSHMAUCER CELVELXSSUZLQWBSVYXARRMJFIA WFNAHBZOUQNAHULKHGYLWQISTB HWLJCYVEIYWVYJPFNTQQYYIRNPH SHZORWBSVYXARRMJFIAWF. For NAH distances: 48 and 8 For WBSVYXARRMJFIAWF: 72 The keyword can be of size: 2,4 or 8.

Homework Read pg Exercises: 1(a), 3(c) on pg.118. Read pg Exercises: 3, 8 on pg Those questions will be a part of your collected homework.