Shahram Khazaei Siavash Ahmadi Fall 2015
Outline Introduction The Hill Cipher Cryptanalysis of Hill Preliminaries COA on Hill using monograms Brute-force attack on Hill Divide-and-conquer attack on Hill CRT based divide-and-conquer attack on Hill Experimental Results Main References End
Classical Cipher –Substitution –Transposition Examples: –Caesar –Vigenere square –Great –Morse Code –Pigpen –Columnar –Chinese cipher Introduction
most of them are broken not only with Known Plaintext Attacks (KPA) but also with Ciphertext Only Attacks (COA) (with existence of some redundancy in the messages) Hill is one of the classical cipher which is not broken by COA.
The Hill Cipher Invertible
Cryptanalysis of Hill
Preliminaries
: For English
Preliminaries For English
Preliminaries : For English
Preliminaries
COA on Hill using monograms Brute-force attack on Hill using monograms only A divide-and-conquer attack on Hill A CRT based divide-and-conquer attack They will find the key matrix up to an unknown permutation of its columns Improve
COA on Hill using monograms Brute-force attack on Hill using monograms only A divide-and-conquer attack on Hill A CRT based divide-and-conquer attack They will find the key matrix up to an unknown permutation of its columns The correct order of the columns can then be determined using diagram frequencies Improve
Brute-force attack on Hill
Unicity distance
Divide-and-conquer attack on Hill
CRT based divide-and-conquer attack on Hill The same procedure can be done in order to find the columns of the decryption key matrix modulo 2 and 13. Unicity distances: Now, to find a representative key modulo 26, the attack can be devised in two different ways using the CRT.
CRT based divide-and-conquer attack on Hill
Experimental Results
The Second Strategy
Experimental Results The Second Strategy Unicity distance:
Experimental Results Blue scenario: –Meaningful text Red scenario: –Real text
Main References 1. C. Christensen. Polygraphic Substitution Ciphers: The Hill Cipher, II. 20part%20II.pdf, Accessed Summer O. Grosek and P. Zajac. Automated cryptanalysis of classical ciphers. In Encyclopedia of Artificial Intelligence (3 Volumes), pages 186– L. S. Hill. Cryptography in an algebraic alphabet. In American Mathematical Monthly, pages 306– B. Hu. Introduction to Cryptology: Hill Cipher Remarks. Accessed Summer J. Overbey, W. Traves, and J. Wojdylo. On the keyspace of the hill cipher. Cryptologia, 29(1):59–72, D. E. Robling Denning. Cryptography and data security. Addison- Wesley Longman Publishing Co., Inc., 1982.
End Siavash Ahmadi