Download presentation
Presentation is loading. Please wait.
Published byCecilia Duxbury Modified over 9 years ago
1
Kyle Johnson
2
Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication in the presence of third parties Cryptanalysis - which is the art of defeating cryptographic security systems, and gaining access to the contents of encrypted messages or obtaining the key itself.
3
History Fialka Cipher machine Used by the Soviet in the cold war era. Uses 10 rotors each with 30 contacts and also makes use of a punch card mechanism. http://en.wikipedia.org/wiki/File:FIALKA-rotors-in-machine.jpg
4
Cryptanalysis Tools Scytale(rhymes with Italy) Ancient Greek device used to implement a cipher. Vigenere square used for the Vigenere Cipher. http://www.braingle.com/brainteasers/codes/images/scytale.gif http://en.wikipedia.org/wiki/File:Vigen%C3%A8re_square_shading.svg
5
Classical Ciphers Term given by William Friedman in 1920 First recorded explanation in the 9 th century by Al- Kindi A manuscript Blaise de Vigenere used a repeating key cipher
6
Significance in History Mary, Queen of Scots World War I, Zimmerman Telegram World War II, German Enigma Machine
7
Cryptanalysis Results (Breaks) Total Break Global deduction Instance (local) deduction Information Deduction Distinguishing algorithm
8
Types of Attacks Ciphertext-only Known-plaintext Chosen-plaintext Chosen-Ciphertext
9
Ciphertext-only Also known as the known-ciphertext attack Attacker only has a set of Ciphertexts Successful, plaintext or key obtained Used in Frequency Analysis
10
Known-plaintext Attacker has both the plaintext and ciphertext. Goal: get the key WWII: German Enigma Machine Length, patterns, frequency
11
Known-Plaintext Example Plaintext: “THIS IS AN EXAMPLE OF A CIPHER” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Try Caesar Cipher: word length pattern noticed. Shift-1 Plaintext: “UIJT JT BO FYBNQMF PG B DJQIFS” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Not the same. Repeat for all possible shifts(25 times) Shift -4 Plaintext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Same! Caesar cipher: key is shift of 4.
12
Chosen-Plaintext Choose Plaintext to get random ciphertext Goal: Weaken the security, get key Plaintext injections Types of chosen-plaintext Batch chosen-plaintext Adaptive chosen-plaintext
13
Batch Chosen-plaintext Attack Chooses all of the plaintexts before they are encrypted This is the means of an unqualified use of this type of attack on encrypted data.
14
Adaptive Chosen-plaintext Attack Attacker will make a series of interactive queries Choosing subsequent plaintexts based on the information from the previous encryptions
15
Chosen Ciphertext Choose ciphertext, decrypt unknown key Enter multiple ciphertexts May be both adaptive and non-adaptive Types of chosen-ciphertext Lunchtime Attack Adaptive chosen ciphertext
16
Lunchtime Attack Also known as the midnight or indifferent attack Attacker makes adaptive chosen-ciphertext queries up to a certain point Can attack computer while user at lunch.
17
Adaptive chosen-ciphertext Attack in which ciphertexts may be chosen adaptively and after a challenge ciphertext is given to the attacker Ciphertext can’t be used itself Stronger attack than lunchtime but few practical attacks are of this form
18
Tests and Analysis Frequency Analysis Index of Coincidence Kasiski Test
19
Frequency Analysis Frequency of letters Used to solve classical ciphers Substitution Caesar Natural Langauge properties and patterns
20
Example of Frequency Analysis Consider this ciphertext : “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”
21
Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI” A: 0 B: 2 C: 1 So on down the alphabet…
22
Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”
23
Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”
24
Example of Frequency Analysis “XEJE WI RN EDCQLSE MO R OJEKGENYB RNRSBIWI”
25
Example of Frequency Analysis Encrypted: “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI” Decrypted: “HERE IS AN EXAMPLE OF A FREQUENCY ANALYSIS”
26
Kasiski Test Method of attacking polyalphabetic substitution ciphers Deduce length of Keyword ‘m’ number of rows Identical Segments of Ciphertext, length >= 3
27
Kasiski Test Consider the following text: KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST
28
Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV
29
Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV : differences (δ) = 18, 138, 54, 12
30
Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV : differences (δ) = 18, 138, 54, 12 Greatest common denominator: m = 6, length of the keyword is 6.
31
Index of Coincidence Comparing 2 partials of same ciphertext Ciphertext coincidences same in Plain Text Used to help solve Vigenere cipher. Check if two texts are in the same language, dialect
32
Index of Coincidence Consider the text from the Kasiski Test: KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDKOTFMBPVGEGLT GCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKYVXCHKFTPONCQQRHJVAJUWET MCMSPKQDYHJVDAHCTRLSVSKCGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJ UMVGKMITZHFPDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVYC GAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACNVRWBBIREPBBVFE XOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJVNPIST And the length of the keyword m = 6
33
Index of Coincidence KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDKOTFMBPVGEGLT GCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKYVXCHKFTPONCQQRHJVAJUWET MCMSPKQDYHJVDAHCTRLSVSKCGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJ UMVGKMITZHFPDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVYC GAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACNVRWBBIREPBBVFE XOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJVNPIST And the length of the keyword m = 6 Index of coincidence requires one to break the ciphertext up into the m number of rows. Each with as similar number of letters as possible.
34
Index of Coincidence
35
Smaller example: IoC
37
Index of Coincidence For English text the index of coincidences is approximately.o66 The index of coincidence for the previous example: m = 1: 0.041 m = 2: 0.038, 0.047 m = 3: 0.056, 0.048, 0.048 m = 4: 0.037, 0.042, 0.037, 0.050 m = 5: 0.043, 0.043, 0.031, 0.035, 0.043 m = 6: 0.063, 0.084, 0.049, 0.065, 0.042, 0.071 m = 7: 0.031, 0.044, 0.043, 0.038, 0.044, 0.044, 0.041 Since the values are closest to.066 where m = 6 it is the appropriate choice for the keyword length.
38
Other attacks Brute-Force Attack Boomerang Attack Linear cryptanalysis Brute-Force Attack Boomerang Attack Linear cryptanalysis
39
Attack runtimes
40
Today’s Cryptanalysis The NSA has developed, due to an enormous breakthrough, the ability to cryptanalyze unfathomably complex encryption systems This includes those developed by other governments but as well as average computer users in the US The NSA is known for its mathematical breakthroughs in cryptanalysis especially differential cryptanalysis
41
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.