Polyalphabetic Ciphers History. Alberti Rennaisance Architect –First fountains of Trevi, Rome –Churches 1467 essay on cryptology –Frequency analysis –Cipher.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CRYPTOGRAPHY Lecture 5. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Confederate Cipher Disk
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
CS110: Computers and the Internet Encryption and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.

Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Introduction to Cryptography
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Section 2.5 Polyaphabetic Substitutions
MAT 1000 Mathematics in Today's World Winter 2015.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Some of these PowerPoint pages were created by my friend Shawna Haider.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
@Yuan Xue Quick Review.
Vigenère’s Cryptosystem
A cipher that was secure for 300 years
Substitution Ciphers.
Asad Gondal Ali Haider Mansoor
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Polyalphabetic Ciphers
History of Cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Digital Communications
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Polyalphabetic Ciphers History

Alberti Rennaisance Architect –First fountains of Trevi, Rome –Churches 1467 essay on cryptology –Frequency analysis –Cipher disk for polyalphabetic cipher Scrambled alphabet Changed key letter only after 3 or 4 words

Alberti’s cipher disk F E D C B A T R A P E M Z J

Johanne Trithemius German Monk Known for magic Wrote Polygraphia in 1518 –Introduced tableaux of shifted alphabets –But just went from one alphabet to the next First letter with first alphabet, second with second, etc.

Tritemius Tableaux a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z A B C D E F G H I J K L M N O P Q R S T U V W X Y

Giovan Battista Belaso Otherwise unknown Small booklet in 1553 Used Trithemius’ tableaux of shifted alphabets Added the idea of a key word or phrase –The longer the better

Giovanni Battista Porta Wrote several books –Scientific subject –Magic Book on cryptology: De Furtivis Literarum –1563 –Included classification of methods –Cryptanalysis How to solve monoalphabetic with no word breaks Likely word method –Digram cipher (using non-letter symbols)

Giovanni Battista Porta Polyalphabetic cipher –Combined elements of Alberti – scrambled alphabet Trithemius - letter-by-letter change of alphabet Belaso – key word/phrase –Scrambled alphabet could be from Alberti style disk or from table

Blaise de Vigenere From age of 24 served the Duke of Nevers (France) in Court and as Diplomat –2 years in Rome as diplomat introduced him to cryptology Quit the court in 1570 (age 47) and wrote on many subjects Wrote Traicte de Chiffres in 1585 –Collected much previous work (with credit)

Vigenere Polyalphabetic cipher –Tableaux like Trithemius –But scrambled alphabet on borders Makes it like Alberti’s disk –Discussed several key methods Words, phrase, poetry Date of dispatch Ordered, like Trithemius –New contribution! –Autokey Text itself is the key! Key letter or word to start, then each letter in message is key for the next.

Practice of Cryptography Polyalphabetic not used until 19 th century Era of “Black Chambers” –Government agencies for cryptanalysis –French, Italian, German, Austrian –Encryption typically used ciphers and nomenclators (combined code and cipher) Introduction of telegraph (1840s) led to use of better methods, polyalphabetic

Vigenere Ironically has name attached to easy version of polyalphabetic, as done by Porta, not his better autokey system. We will look at this method and how to break it.