Mathematical Perspectives: Secret Codes: Dr. Morton. Ch 2: Substitution Ciphers
|
|
- Julia Smith
- 5 years ago
- Views:
Transcription
1 Mathematical Perspectives: Secret Codes: Dr. Morton Ch 2: Substitution Ciphers 1. Definition: In a simple substitution ciphers, users agree upon a rearrangement, or permutation (meaning, each possible plaintext letter in the original alphabet is paired with one and only one possible ciphertext letter, and vice versa), of the alphabet letters, yielding a collection of correspondences to be used for converting plaintext letters into ciphertext letters. One could include numbers, punctuation marks, and other characters too, if one wanted. These are easy to break, but have a rich history. 1
2 2.1 Keyword Substitution Ciphers 1. Definition: A random cipher alphabet is one in which the permutation is chosen randomly. 2. Example: Use the simple substitution cipher below to encrypt hello. Plaintext a b c d e f g h i j k l m Z A M B C Q W T E G H I J Plaintext n o p q r s t u v w x y z D F R N O X V K P S L Y U Simple Keyword Substitution Ciphers 3. Definition: In a simple keyword substitution cipher, Alice and Bob agree on a keyword. Delete spaces and duplicate letters and then use the remaining letters of the alphabet in order. 4. Example: Use the simple keyword substitution with keyword DARTH VADER to encrypt the message star wars. The keyword to be used is: Then the cipher alphabet is: Plaintext a b c d e f g h i j k l m Plaintext n o p q r s t u v w x y z Keyword Columnar Substitution Ciphers 5. Definition: In a keyword columnar substitution cipher, we start the same as before, using a keyword with spaces and duplicate letters deleted. These are the headings of an array. Then use the columns of the array to give the cipher text alphabet. 2
3 6. Example: Use the columnar substation cipher with keyword DARTH VADER to again encrypt the message star wars: Plaintext a b c d e f g h i j k l m Plaintext n o p q r s t u v w x y z 7. Example: Use the keyword columnar substation cipher with keyword BAG to encrypt the message star shopping: Plaintext a b c d e f g h i j k l m Plaintext n o p q r s t u v w x y z 3
4 2.2 A Maplet for Substitution Ciphers 1. Almost every topic in this bookis completely covered in onesection, with one or more Maplets for the topic introduced in the following section. Maplets are like applets, but use (and require) the engine of the software package Maple, a computer algebra system first developed at the University of Waterloo in Ontario, Canada. All Maplets demonstrated in this book will work in both PC and Mac environments with versions of Maple going back through at least 13, and are available for download at After downloading a Maplet onto a computer on which Maple is available, doubleclicking the filename or icon of the Maplet should cause a Maplet Launcher to open the Maplet. 2. Example: Use the Maplets to redo the following examples from the previous section: (a) Use the simple keyword substitution with keyword DARTH VADER to encrypt the message star wars. (b) Use the columnar substation cipher with keyword DARTH VADER to again encrypt the message star wars. (c) Use the columnar substation cipher with keyword DARTH VADER to encrypt the message: Episode IV A New Hope It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first victory against the evil Galactic Empire. During the battle, Rebel spies managed to steal secret plans to the Empire s ultimate weapon, the DEATH STAR, an armored space station with enough power to destroy an entire planet. Pursued by the Empire s sinister agents, Princess Leia races home aboard her starship, custodian of the stolen plans that can save her people and restore freedom to the galaxy... 4
5 2.3 Cryptanalysis of Substitution Ciphers 1. It seems like substitution ciphers would be impossible to break. How many possible keys are there? 2. Here are the frequencies of letters in the English language: a b c d e f g h i 8.17% 1.49% 2.78 % 4.25% 12.7 % 2.23% 2.02% 6.09 % 6.97 % j k l m n o p q r 0.15% 0.77% 4.03% 2.41 % 6.75 % 7.51 % 1.93 % 0.10 % 5.99 % s t u v w x y z 6.33 % 9.06 % 2.76 % 0.98 % 2.36 % 0.15 % 1.97 % 0.07 % 3. The most common bigrams (as measured by Cornell University: th he in er an re nd at on nt 1.52% 1.28% 0.94% 0.94% 0.82% 0.68% 0.63% 0.59% 0.57% 0.56% ha es st en ed to it ou ea hi 0.56% 0.56% 0.55% 0.55% 0.53%.0.52% 0.50% 0.50% 0.47% 0.46% is or ti as te et ng of al de 0.46% 0.43% 0.34% 0.33% 0.27% 0.19% 0.18% 0.16% 0.09% 0.09% se le sa si ar ve ra ld ur 0.08% 0.08% 0.06% 0.05% 0.04% 0.04% 0.04% 0.02% 0.02% 4. Most common trigraphs are the, and, tha, ent, ion, tio, for, nde, has, nce. 5. Most common repeated letters are ll, ee, ss, tt, oo, mm, ff. 5
6 2.4 A Maplet for Cryptanalysis of Substitution Ciphers 1. Example: Let s cryptanalyze the following cipher text, which is from a random cipher alphabet, using the substitution cipher cryptanalysis maplet: QMOAAOVTDCJXOQMAANGATPVTDCSTLAOQMACPFCAGATJX OQMALYKOJNXOLCVTQMAVOMKNNCXJCQXTATVTAJXOBXOQKNB ATLXXBALQXLVAXTAJXOQMALKOPNXOLXTMVCLKOPQMOXTAVTQ MANKTLXJBXOLXOYMAOAQMACMKLXYCNVAXTAOVTDQXOSNAQM ABKNNXTAOVTDQXJVTLQMABXTAOVTDQXROVTDQMABKNNKTLVT QMALKOPTACCVTLQMABVTQMANKTLXJBXOLXOYMAOAQMACMKL XYCNVA 2. Now taking the most common single, bigrams, and trigraphs gives: (a) single letter gives: 1 graph A occurs 39 times 1 graph X occurs 29 times 1 graph T occurs 29 times 1 graph O occurs 27 times 1 graph M occurs 22 times 1 graph Q occurs 22 times 1 graph L occurs 19 times 1 graph V occurs 18 times 1 graph N occurs 15 times 1 graph C occurs 14 times 1 graph K occurs 13 times 1 graph B occurs 9 times 1 graph J occurs 9 times 1 graph D occurs 6 times (b) digraph gives: 2 graph MA occurs 16 times 2 graph QM occurs 16 times 2 graph VT occurs 13 times 2 graph XO occurs 12 times 2 graph LX occurs 8 times 2 graph TA occurs 8 times 2 graph XT occurs 7 times 2 graph TL occurs 7 times 2 graph AO occurs 7 times 2 graph TD occurs 6 times 2 graph QX occurs 5 times 2 graph OQ occurs 5 times 2 graph OV occurs 5 times 2 graph AB occurs 4 times 2 graph DQ occurs 4 times 2 graph BX occurs 4 times 2 graph XJ occurs 4 times 2 graph KN occurs 4 times 2 graph TQ occurs 4 times 2 graph OL occurs 4 times 6
7 2 graph KO occurs 4 times 2 graph AL occurs 4 times 2 graph AC occurs 4 times 2 graph AT occurs 4 times 2 graph JX occurs 4 times (c) trigraph gives: 3 graph QMA occurs 14 times 3 graph XTA occurs 6 times 3 graph VTD occurs 6 times 3 graph OVT occurs 5 times 3 graph MAB occurs 4 times 3 graph TDQ occurs 4 times 3 graph TQM occurs 4 times 3 graph VTQ occurs 4 times 3 graph XOL occurs 4 times 3 graph OQM occurs 4 times 3 graph XOQ occurs 4 times 3 graph JXO occurs 4 times 3 graph AOV occurs 4 times 3 graph DQX occurs 3 times 3 graph TAO occurs 3 times 3 graph AQM occurs 3 times 3 graph KTL occurs 3 times 3 graph NKT occurs 3 times 3 graph OLX occurs 3 times 3 graph KOP occurs 3 times 3 graph LKO occurs 3 times 3 graph TLX occurs 3 times 3 graph BXO occurs 3 times 3 graph KNN occurs 3 times 3 graph MAL occurs 3 times 3 graph MAC occurs 3 times (d) double Double letter sequence NN occurs 3 times Double letter sequence AA occurs 2 times (e) Example: Break the random substitution cipher M RHBCQGBPBH GYKGU NXCR QXG GYBKLDU AZ HXQJBQHBQO BGR XDDXQCQGR MQN LMWBQO GUCL RCC GUC EBOUG, AKG YMGUCY ACHMKRC BGR XDDXQCQGR CJCQGKMEEZ NBC MQN M QCT OCQ- CYMGBXQ OYXTR KD GUMG BR PMLBEBMY TBGU BG (f) Example: Break the random substitution cipher URTLT EAPP HT PAU- UPT LWHK MJQ QAKMCCYAJUSTJUK TVTLXERTLT MJQ ET MLT MPP MCU UY TOCTBU UYY SWBR HWU URTJ AG YJT KBRTST YG RMCCAJTKK GMAPK RWSMJ JMUWLT UWLJK UY MJYURTL AG URT GALKU BMPBWPMUAYJ AK ELYJZ ET SMFT M KTBYJQ HTUUTL ET GAJQ BYSGYLU KYSTERTLT 7
8 2.5 Playfair Ciphers 1. Definition: Playfair ciphers use one or more keywords. Spaces and duplicate letters in the keyword(s) are removed, and the resulting letters are then used to form an array of letters, similar to the array used in keyword columnar substitution ciphers, except that for Playfair ciphers this array must always have exactly five letters per row. Also, I and J are considered to be the same letter in Playfair arrays, so J is not included. 2. Example: Encypt Strive not to be a success, but rather to be of value using keyword Albert Einstein. First, fill in the 5x5 key matrix with i and j being treated as one letter: Now prepare the plaintext: Remove the spaces and divide the text into groups of two letters. If any letter is doubled in a group, insert an x and regroup. Add an extra x at the end to complete the last group if needed. Now to encrypt each digraph: (a) If the two letters are in the same row, replace each letter with the letter immediately to its right, with the matrix wrapping around from the last column to the first. (b) If the two letters are in the same column, replace each letter with the letter immediately below it, with the matrix wrapping around from the last row to the first. (c) If the two letters are not in the same row or column, replace each letter by the letter that is in its row and is in the column of the other letter. 3. To decrypt, instead of going right and down, go left and up. The third rule remains the same. 4. Example: Decipher CQBZARTGRATDPISR using the same keyword. 8
9 5. Example: Use a Playfair cipher with keyword spies to encrypt the plaintext message cloak and dagger and then to decrypt the cipher text message MSRIHROMI- TIY. 2.6 A Maplet for Playfair Ciphers 9
Lesson07-Arrays-Part4. Program class. namespace Lesson07ArraysPart4Prep { class Program { static double METER_TO_INCHES = 100 / 2.
Lesson07-Arrays-Part4 Program class namespace Lesson07ArraysPart4Prep class Program static double METER_TO_INCHES = 100 / 2.54; static void Main(string[] args) Experiment01(); //Tuples Experiment02();
More informationCSE 484 / CSE M 584 Computer Security. TA: Jared Moore
CSE 484 / CSE M 584 Computer Security TA: Jared Moore jlcmoore@cs Logistics Lab #1 due next Friday Today: Lab 1 questions. Authentication grab bag. (if time) Cryptography Password Salting Servers shouldn
More informationSubstitution Ciphers
crypttext 2018/1/9 13:06 page 7 #11 Chapter 2 Substitution Ciphers One common and popular type of cipher for newspaper games and puzzle books is a substitution cipher. In simple substitution ciphers, users
More informationComputer Security Sec4on Week 4: Cryptography
CSE 484 / CSE M 584 Computer Security Sec4on Week 4: Cryptography TA: Thomas Crosley tcrosley@cs Thanks to Franzi Roesner and Adrian Sham for previous slides [Examples/Images thanks to Wikipedia.] Administrivia
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More informationUSING MAPLETS IN TEACHING CRYPTOLOGY
USING MAPLETS IN TEACHING CRYPTOLOGY Rick Klima Neil Sigmon Department of Mathematical Sciences Department of Mathematics Appalachian State University Radford University 342 Walker Hall 212 Walker Hall
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationcrypttext 2018/1/9 13:06 page 18 #22
crypttext 2018/1/9 13:06 page 18 #22 18 CHAPTER 2. SUBSTITUTION CIPHERS 5. Find some information about the encrypted messages sent by the Zodiac killer to the San Francisco Bay area press in 1969 70, and
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview
Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationSubstitution Ciphers
crypttext 2018/8/23 14:23 page 7 #17 Chapter 2 Substitution Ciphers One common and popular type of cipher for newspaper games and puzzle books is a substitution cipher. In simple substitution ciphers,
More informationEnhanced 3-D PLAYFAIR Cipher
Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationExploring Cryptography Using CrypTool
NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information
More informationCIS 3362 Final Exam. Date: 12/9/2015. Name:
CIS 3362 Final Exam Date: 12/9/2015 Name: 1) (7 pts) Consider an adjusted shift cipher on an alphabet with 36 characters, the letters 'A' through 'Z', followed by the digits '0' through '9', where the
More informationCSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology
CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition
More informationJava Applets for a Cryptology Course. Ulrich A. Hoensch Rocky Mountain College Billings, Montana
Java Applets for a Cryptology Course Ulrich A. Hoensch Rocky Mountain College Billings, Montana www.rocky.edu/~hoenschu San Antonio, Texas January 2006 1 Plaintext + Can be any keyboard-entered or cut-and-paste
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationCryptosystems. Truong Tuan Anh CSE-HCMUT
Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography
More informationModule 1: Classical Symmetric Ciphers
Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More information3D (6 X 4 X 4) - Playfair Cipher
3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital
More informationChapter 2: Classical Encryption Techniques
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationClassic Cryptography: From Caesar to the Hot Line
Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical
More informationA Tour of Classical and Modern Cryptography
A Tour of Classical and Modern Cryptography Evan P. Dummit University of Rochester May 25, 2016 Outline Contents of this talk: Overview of cryptography (what cryptography is) Historical cryptography (how
More informationChapter 4: Application Protocols 4.1: Layer : Internet Phonebook : DNS 4.3: The WWW and s
Chapter 4: Application Protocols 4.1: Layer 5-7 4.2: Internet Phonebook : DNS 4.3: The WWW and E-Mails OSI Reference Model Application Layer Presentation Layer Session Layer Application Protocols Chapter
More informationOverview of Conventional Encryption Techniques
Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption
More informationCLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment
CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which
More informationEncryption Algorithms
Encryption Algorithms 1. Transposition Ciphers 2. Substitution Ciphers 3. Product Ciphers 4. Exponentiation Ciphers 5. Cryptography based on Discrete Logarithms 6. Advanced Encryption Standard (AES) 1.
More information10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of
More informationClassical Encryption Techniques
Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,
More informationCIS 3362 Final Exam 12/4/2013. Name:
CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationOVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,
More informationCryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building
Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationCryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals
Cryptography December 9, 2008 1 Intercepting Information Scenario 1 Wireless broadcasts information using radio signals Any computer on a wireless network CAN listen to any network traffic http://www.geeksquad.com/
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationCryptanalysis. Ed Crowley
Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption
More informationClassical Cryptography
Classical Cryptography Chester Rebeiro IIT Madras STINSON : chapter 1 Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT,
More informationS. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation
2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationL2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015
L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature
More informationCRYPTOGRAPHY Thursday, April 24,
CRYPTOGRAPHY 1 1. Really Big Numbers 2 One of the things I ve used on the Google is to pull up maps 3 You ve probably used the Google, too! Do you know where this company s strange name comes from? 4 Extract
More informationCS 332 Computer Networks Security
CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationPART THREE. PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS
PART THREE PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS CHAPTER 6 Section I Characteristics of Polygraphic Encipherment 6-1. Types of Polygraphic Systems As first
More informationChapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add,
More informationENGR/CS 101 CS Session Lecture 5
ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret
More informationJNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World
Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not
More informationCryptography ThreeB. Ed Crowley. Fall 08
Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationPART I Symmetric Ciphers
PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 13, 2012 CPSC 467b, Lecture 3 1/36 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine
More informationP2_L6 Symmetric Encryption Page 1
P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,
More informationCOMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4
COMM1003 Information Theory Dr. Wassim Alexan Spring 2018 Lecture 4 Cryptology Cryptology is the most general term and it splits into two parts: Cryptography and Cryptanalysis Cryptography is the science
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationCryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL
Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption
More informationCryptography Worksheet
Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private
More informationIntroduction to Cryptography
Introduction to Cryptography 1 2 Definition process data into unintelligible form, reversibly, without data loss typically digitally usually one-to-one in size $ compression analog cryptography: voice
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationEE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions
EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions Assigned: Tuesday, January 17, 2017, Due: Sunday, January 28, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering
More informationOne subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.
FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts
More informationCryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption
and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X
More informationShared Secret = Trust
Trust The fabric of life! Holds civilizations together Develops by a natural process Advancement of technology results in faster evolution of societies Weakening the natural bonds of trust From time to
More informationSenior Math Circles Cryptography and Number Theory Week 1
Senior Math Circles Cryptography and Number Theory Week 1 Dale Brydon Feb. 2, 2014 1 One-Time Pads Cryptography deals with the problem of encoding a message in such a way that only the intended recipient
More information2
1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More informationSymmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.
Symmetric Key Algorithms Definition A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. 1 Block cipher and stream cipher There are two main families
More informationLecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels
Lecture 2 Cryptography: History + Simple Encryption,Methods & Preliminaries 1 Cryptography can be used at different levels algorithms: encryption, signatures, hashing, RNG protocols (2 or more parties):
More informationOutline Basics of Data Encryption CS 239 Computer Security January 24, 2005
Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationDeciphering of Transposition Ciphers using Genetic Algorithm
41 Deciphering of Transposition Ciphers using Genetic Algorithm 1 Alok Singh Jadaun, 2 Vikas Chaudhary, 3 Lavkush Sharma, 4 Gajendra Pal Singh 1, 2 Department Of Computer Science & Engineering Bhagwant
More informationLAB: Public-Key Encryption
INTRODUCTION TO COMPUTER CONCEPTS CSIT 100 LAB: Public-Key Encryption Since this lab is experiential, you must complete it during the lab period. Save this exercise in your flash drive at the end of the
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More informationISA 562: Information Security, Theory and Practice. Lecture 1
ISA 562: Information Security, Theory and Practice Lecture 1 1 Encryption schemes 1.1 The semantics of an encryption scheme. A symmetric key encryption scheme allows two parties that share a secret key
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm
More informationICT 6541 Applied Cryptography. Hossen Asiful Mustafa
ICT 6541 Applied Cryptography Hossen Asiful Mustafa Basic Communication Alice talking to Bob Alice Bob 2 Eavesdropping Eve listening the conversation Alice Bob 3 Secure Communication Eve listening the
More informationSymmetric key cryptography
The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationIntroduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationChapter 7 Advanced Encryption Standard (AES) 7.1
Chapter 7 Advanced Encryption Standard (AES) 7.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Objectives To review a short history of AES To define
More informationIntroduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017
Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017 Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in
More informationPolyalphabetic cyphers
Unit 7 January 26, 2011 1 Polyalphabetic cyphers Let E 1, E 2,..., E n be distinct substitution cyphers. To encrypt a plaintext message P = p 1 p 2 p 3... apply the E i (i = 1,..., n) cyclically to the
More informationSecret-Key Encryption Lab
SEED Labs Secret-Key Encryption Lab 1 Secret-Key Encryption Lab Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More information