Algebraic Solutions of Caesar and Multiplicative Ciphers

Size: px
Start display at page:

Download "Algebraic Solutions of Caesar and Multiplicative Ciphers"

Transcription

1 Spring 2015 Chris Christensen MAT/CSC 483 Algebraic Solutions of Caesar and Multiplicative Ciphers The Caesar cipher and the multiplicative cipher each involve one algebraic operation addition modulo 26 and multiplication modulo 26, respectively. The enciphering operations are (where CT is ciphertext and pt is plaintext): Caesar cipher enciphering CT = pt + key mod 26 Multiplicative cipher enciphering CT = pt key mod 26 To decipher, the operation is repeated using the key inverse in place of the key. Caesar cipher deciphering pt = CT + key inverse mod 26 Multiplicative cipher deciphering pt = CT key inverse mod 26 For Caesar ciphers there are 26 possible keys. The keys and their inverses are: Key Additive Inverse modulo Key Additive Inverse modulo

2 For multiplicative ciphers there are only 12 possible keys. The keys and their inverses are: Key Multiplicative Inverse modulo Algebraic Solution of Caesar Ciphers CT = pt + key mod 26 Caesar cipher enciphering is a linear relationship among cipher text (CT), plaintext (pt), and key. If CT and pt are known, the modular equation above can be solved for key. Consider the ciphertext: VXMNA WLAHY CXPAJ YQHRB JORNU MCQJC MAJFB QNJER UHXWV JCQNV JCRLB XVYDC NABLR NWLNJ WMLUN ENAWN BB

3 Frequency analysis of the ciphertext shows: Because e is the most frequent plaintext letter in English, we might believe that ciphertext N corresponds to plaintext e. If so, e(5) N(14) e + key = N mod26 5+key = 14 mod key = mod 26 key = 9 mod 26 key inverse = 17mod 26 This suggests that the key is 9 and the key inverse is 17. Try them.

4 Algebraic Solution of Multiplicative Ciphers CT = pt key mod 26 Multiplicative cipher enciphering is also a linear relationship among cipher text (CT), plaintext (pt), and key. If CT and pt are known, the modular equation above can be solved for key. Consider the ciphertext: XTSVI XCEVI DOSAG FCXQI KSVAQ COXTS DIFKS OXIVJ NEXSV XCIDD QMEOX CVXFG OCPSI MSFCA IVCVX SDDCK SVASI KSVAQ Frequency analysis of the ciphertext shows:

5 Because e is the most frequent plaintext letter in English, we might believe that ciphertext S corresponds to plaintext e. If so, e(5) S(19) e + key = N mod26 5 key = 19 mod key = mod 26 key = 9 mod 26 key inverse = 3mod 26 This suggests that the key is 9 and the key inverse is 3. Here is the deciphering of the first 5-letter block. X T S V I mod t h e n a

6 Simple Substitution Ciphers Because there is an algebraic relationship between plaintext and ciphertext letters for both Caesar ciphers and multiplicative ciphers, there is a pattern in the key that can be solved for algebraically. What about simple substitution ciphers for which the key is randomly generated? Like Plaintext letters: abcdefghijklmnopqrstuvwxyz Ciphertext letters: EKMFLGDQVZNTOWYHXUSPAIBRCJ It is possible that by using frequency analysis we might be able to spot that plaintext e was enciphered by ciphertext L, but because there is no algebraic relationship between plaintext and ciphertext knowing that e became L would not provide any information about the correspondences between the remaining plaintext-ciphertext pairs. There is no pattern in the key; the key has been randomly generated.

7 Exercises 1. A message is known to be encrypted with a Caesar cipher. We suspect that plaintext e corresponds to ciphertext R. What is the additive key? Repeat the exercise with plaintext e corresponding to ciphertext B. 2. A message is known to be encrypted with a Caesar cipher. If plaintext e corresponds to ciphertext T, what is the additive key? To what ciphertext letter would plaintext o correspond? 3. A message is known to be encrypted with a Caesar cipher. If plaintext e corresponds to ciphertext C, what is the additive key? To what ciphertext letter would plaintext m correspond? 4. A message is known to be encrypted with a multiplicative cipher. We suspect that plaintext e corresponds to ciphertext G. What is the multiplicative key? Repeat the exercise with plaintext e corresponding to ciphertext A. 5. A message is known to be encrypted with a multiplicative cipher. If plaintext e corresponds to ciphertext O, what is the multiplicative key? To what ciphertext letter would plaintext d correspond? 6. A message is known to be encrypted with a multiplicative cipher. If plaintext e corresponds to ciphertext G, what is the multiplicative key? To what ciphertext letter would plaintext l correspond? 7. A message is known to be encrypted with a multiplicative cipher. We believe that plaintext e corresponds to ciphertext N, what can we conclude?

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard

More information

ENGR/CS 101 CS Session Lecture 5

ENGR/CS 101 CS Session Lecture 5 ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret

More information

The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3

The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3 The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3 Heijltjes, Wadler Due: The tutorial of week 5 (23/24 Oct.) Reading assignment: Chapters 8 and 9 (pp. 135-166) Please attempt the entire

More information

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64. belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the

More information

Modern Cryptography Activity 1: Caesar Ciphers

Modern Cryptography Activity 1: Caesar Ciphers Activity 1: Caesar Ciphers Preliminaries: The Caesar cipher is one of the oldest codes in existence. It is an example of a substitution cipher, where each letter in the alphabet is replaced by another

More information

Lecture IV : Cryptography, Fundamentals

Lecture IV : Cryptography, Fundamentals Lecture IV : Cryptography, Fundamentals Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University Spring 2012 Basic Principles

More information

2.3 SUBTITUTION CIPHERS.

2.3 SUBTITUTION CIPHERS. Lec 5 : Data Security Substitution Cipher Systems 1 2.3 SUBTITUTION CIPHERS. 2.3.1 SIMPLE SUBTTTUION CIPHERS: In simple substitution (or monoalphabetic) ciphers, each character of the plaintext is replaced

More information

Recap. Definition (Encryption: Caesar Cipher)

Recap. Definition (Encryption: Caesar Cipher) Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Recap Definition (Encryption: Caesar Cipher) + 3 = mod 26 Definition (Encryption: Shift Cipher) + d = mod 26, d anumber Recap Definition (Encryption:

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

Cryptography Part II Introduction to Computer Security. Chapter 8

Cryptography Part II Introduction to Computer Security. Chapter 8 Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:

More information

Cryptography. What is Cryptography?

Cryptography. What is Cryptography? Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used

More information

Encryption à la Mod Name

Encryption à la Mod Name Rock Around the Clock Part Encryption à la Mod Let s call the integers,, 3,, 5, and the mod 7 encryption numbers and define a new mod 7 multiplication operation, denoted by, in the following manner: a

More information

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation 2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Classic Cryptography: From Caesar to the Hot Line

Classic Cryptography: From Caesar to the Hot Line Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical

More information

Math236 Discrete Maths with Applications

Math236 Discrete Maths with Applications Math236 Discrete Maths with Applications P. Ittmann UKZN, Pietermaritzburg Semester 1, 2012 Ittmann (UKZN PMB) Math236 2012 1 / 1 Block Ciphers A block cipher is an encryption scheme in which the plaintext

More information

A nice outline of the RSA algorithm and implementation can be found at:

A nice outline of the RSA algorithm and implementation can be found at: Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.

More information

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American Danielle Curran Dr. Derek Bruff Math 115F: Cryptography October 26, 2010 The Hill Cipher In 1929 Lester Hill, a professor at Hunter College, published an article in the American Mathematical Monthly called

More information

Cryptosystems. Truong Tuan Anh CSE-HCMUT

Cryptosystems. Truong Tuan Anh CSE-HCMUT Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography

More information

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,

More information

Introduction to cryptography

Introduction to cryptography Chapter 1 Introduction to cryptography 1.1 From caesar cipher to public key cryptography Cryptography: is the practical means for protecting information transmitted through public communications networks,

More information

Cryptography Worksheet

Cryptography Worksheet Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015 L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift

More information

2

2 1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver

More information

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not

More information

CIS 3362 Final Exam 12/4/2013. Name:

CIS 3362 Final Exam 12/4/2013. Name: CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution

More information

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System) Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n) Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence

More information

Classical Encryption Techniques

Classical Encryption Techniques Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Senior Math Circles Cryptography and Number Theory Week 1

Senior Math Circles Cryptography and Number Theory Week 1 Senior Math Circles Cryptography and Number Theory Week 1 Dale Brydon Feb. 2, 2014 1 One-Time Pads Cryptography deals with the problem of encoding a message in such a way that only the intended recipient

More information

ECE 646 Fall 2008 Multiple-choice test

ECE 646 Fall 2008 Multiple-choice test ECE 646 Fall 2008 Multiple-choice test 1. (1 pt) Arrange the following ciphers in the order of the increasing measure of roughness for the ciphertext obtained by encrypting 1000-letter message with a given

More information

ENGR/CS 101 CS Session Lecture 9

ENGR/CS 101 CS Session Lecture 9 ENGR/CS 101 CS Session Lecture 9 Log into Windows/ACENET (reboot if in Linux) Start Python, open program from last time. Has everyone finished the program from last class so that it can encipher and decipher

More information

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E

More information

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

Information Systems Security

Information Systems Security Information Systems Security Dr. Ayman Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Chapter 2 Classical Encryption Techniques

More information

B) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers

B) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers 1 B) Symmetric Ciphers B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers B.a) Fundamentals 2 B.1 Definition 3 A mapping Enc: P K C for which ϕ k := Enc(,k): P C is bijective for each k K is called

More information

Java Applets for a Cryptology Course. Ulrich A. Hoensch Rocky Mountain College Billings, Montana

Java Applets for a Cryptology Course. Ulrich A. Hoensch Rocky Mountain College Billings, Montana Java Applets for a Cryptology Course Ulrich A. Hoensch Rocky Mountain College Billings, Montana www.rocky.edu/~hoenschu San Antonio, Texas January 2006 1 Plaintext + Can be any keyboard-entered or cut-and-paste

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Module 1: Classical Symmetric Ciphers

Module 1: Classical Symmetric Ciphers Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts

More information

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

Exploring Cryptography Using CrypTool

Exploring Cryptography Using CrypTool NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information

More information

EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions

EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions Assigned: Tuesday, January 17, 2017, Due: Sunday, January 28, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering

More information

Chapter 2: Classical Encryption Techniques

Chapter 2: Classical Encryption Techniques CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic

More information

Security Analysis and Modification of Classical Encryption Scheme

Security Analysis and Modification of Classical Encryption Scheme Indian Journal of Science and Technology, Vol 8(S8), 542 548, April 205 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 0.7485/ijst/205/v8iS8/7506 Security Analysis and Modification of Classical

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

Shared Secret = Trust

Shared Secret = Trust Trust The fabric of life! Holds civilizations together Develops by a natural process Advancement of technology results in faster evolution of societies Weakening the natural bonds of trust From time to

More information

Information Security CS526

Information Security CS526 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream CIphers 1 Announcements HW1 is out, due on Sept 11 Start early, late policy is 3 total late days

More information

Public Key Cryptography

Public Key Cryptography graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,

More information

Instructor: Abbas Naderi Afooshteh (aka AbiusX) Cryptography. Chapter 1: Early Classic Ciphers

Instructor: Abbas Naderi Afooshteh (aka AbiusX) Cryptography. Chapter 1: Early Classic Ciphers Instructor: Abbas Naderi Afooshteh (aka AbiusX) Cryptography Chapter 1: Early Classic Ciphers July 13 2013 Cryptography Usages Sending Encrypted Messages (e.g Attack At Dawn) Storing Sensitive Data (e.g

More information

Fundamentals of Computer Security

Fundamentals of Computer Security Fundamentals of Computer Security Spring 2015 Radu Sion Ciphers 2005-15 Portions copyright by Matt Bishop and Wikipedia. Used with permission Overview m 3 m 2 m 1 cipher c i Bob Alice cipher -1 m 1 m 2

More information

Channel Coding and Cryptography Part II: Introduction to Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de

More information

ENGR/CS 101 CS Session Lecture 13

ENGR/CS 101 CS Session Lecture 13 ENGR/CS 101 CS Session Lecture 13 Log into Windows/ACENET (reboot if in Linux) Start Microsoft Visual Studio 2012 and open the Substitution Cipher Project Has everyone finished the program from last class

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY

Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY Math Circle January 14, 2018 1. For as long as humans have existed, humans have tried to hide information from other humans.

More information

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES SYMMETRIC ENCRYPTION SOME BASIC TERMINOLOGY or conventional / private-key / single-key sender and recipient share a common

More information

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

Introduction to Cryptography and Security Mechanisms. Abdul Hameed Introduction to Cryptography and Security Mechanisms Abdul Hameed http://informationtechnology.pk Before we start 3 Quiz 1 From a security perspective, rather than an efficiency perspective, which of the

More information

Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee

Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee Lecture 09 Cryptanalysis and its variants, linear attack Welcome

More information

Lecture 6: Overview of Public-Key Cryptography and RSA

Lecture 6: Overview of Public-Key Cryptography and RSA 1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first

More information

Encryption Algorithms

Encryption Algorithms Encryption Algorithms 1. Transposition Ciphers 2. Substitution Ciphers 3. Product Ciphers 4. Exponentiation Ciphers 5. Cryptography based on Discrete Logarithms 6. Advanced Encryption Standard (AES) 1.

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : CSS 322 Security and Cryptography Instructor

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 23 rd March 2018 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Cryptographic Methods for Deciphering/Identifying Ciphers in MATLAB

Cryptographic Methods for Deciphering/Identifying Ciphers in MATLAB Cryptographic Methods for Deciphering/Identifying Ciphers in MATLAB 1 Christian Pinto, BTech, 2 Harrison Carranza, MIS 1 The New York City College of Technology CUNY, USA, christian.pinto@mail.citytech.cuny.edu

More information

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test ECE 646 Fall 2009 Final Exam December 15, 2009 Multiple-choice test 1. (1 pt) Parallel processing can be used to speed up the following cryptographic transformations (please note that multiple answers

More information

NUMB3RS Activity: Creating Codes. Episode: Backscatter

NUMB3RS Activity: Creating Codes. Episode: Backscatter Teacher Page 1 NUMB3RS Activity: Creating Codes Topic: Codes Grade Level: 10-12 Objective: Explore several coding methods Time: 30+ minutes Materials: TI-83/84 Plus calculator Introduction While lecturing

More information

Introduction to Public Key Cryptology. Classical Cryptology

Introduction to Public Key Cryptology. Classical Cryptology Spring 2010 Chris Christensen MAT/CSC 483 Introduction to Public Key Cryptology Classical Cryptology Until 1976, cryptology was classical cryptology. Typical of cryptology were the substitution ciphers,

More information

Polyalphabetic cyphers

Polyalphabetic cyphers Unit 7 January 26, 2011 1 Polyalphabetic cyphers Let E 1, E 2,..., E n be distinct substitution cyphers. To encrypt a plaintext message P = p 1 p 2 p 3... apply the E i (i = 1,..., n) cyclically to the

More information

LECTURE NOTES ON COMPUTER AND DATA SECURITY

LECTURE NOTES ON COMPUTER AND DATA SECURITY Department of Software The University of Babylon LECTURE NOTES ON COMPUTER AND DATA SECURITY By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq Computer an

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5) Block Ciphers Tutorial c Eli Biham - May 3, 2005 146 Block Ciphers Tutorial (5) A Known Plaintext Attack on 1-Round DES After removing the permutations IP and FP we get: L R 48 K=? F L R c Eli Biham -

More information

Classical Cryptography

Classical Cryptography Classical Cryptography Chester Rebeiro IIT Madras STINSON : chapter 1 Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT,

More information

Lecture 4: Symmetric Key Encryption

Lecture 4: Symmetric Key Encryption Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by

More information

1 Extended Euclidean Algorithm

1 Extended Euclidean Algorithm CS 124 Section #8 RSA, Random Walks, Linear Programming 3/27/17 1 Extended Euclidean Algorithm Given a, b, find x, y such that ax + by = d where d is the GCD of a, b. This will be necessary in implementing

More information

Classical Encryption Techniques

Classical Encryption Techniques Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,

More information

Exercise Sheet 3. Problem 1: Textbook RSA and hybrid encryption

Exercise Sheet 3. Problem 1: Textbook RSA and hybrid encryption Cryptology I (spring 2016) Exercise Sheet 3 Dominique Unruh Out: 2016-03-21 Due: 2016-04-01 Problem 1: Textbook RSA and hybrid encryption A common variant of textbook RSA is the following: During key generation,

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography Jiyou Li lijiyou at sjtu.edu.cn Department of Mathematics, Shanghai Jiao Tong University Sep. 17th, 2013 Cryptography Cryptography: the art and science of keeping message secure.

More information

Cryptography. How to Protect Your Data

Cryptography. How to Protect Your Data Cryptography How to Protect Your Data Encryption is the act of changing information in such a way that only people who should be allowed to see the data are able to understand what the information is.

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 1 Introduction to Cryptography ver. October 28, 2010 These slides were

More information

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption

More information

CIS 3362 Final Exam. Date: 12/9/2015. Name:

CIS 3362 Final Exam. Date: 12/9/2015. Name: CIS 3362 Final Exam Date: 12/9/2015 Name: 1) (7 pts) Consider an adjusted shift cipher on an alphabet with 36 characters, the letters 'A' through 'Z', followed by the digits '0' through '9', where the

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 10,

For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 10, Math 167 Ch 17 WIR 1 (c) Janice Epstein and Tamara Carter, 2015 CHAPTER 17 INFORMATION SCIENCE Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9)

More information

File and Disk Encryption

File and Disk Encryption File and Disk Encryption Alex Applegate 1 Overview Common Weak Encryption Stronger Methods Threat From File Encryption Full Disk Encryption (FDE) Threat From FDE 2 Common Types of Weak File Encryption

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

Block Encryption and DES

Block Encryption and DES Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Introduction to Cryptography

Introduction to Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 Session 3 Copyright 2004 Konstantin Beznosov Session Outline Historical background Caesar and Vigenère

More information

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY Pawanveer Singh 1, Dr. Amanpreet Singh 2, Shelja Jhamb 3 1 Post Graduate Department of Mathematics, Lajpat Rai D. A. V. College Jagraon, (India) 2 Post Graduate

More information

LECTURE 4: Cryptography

LECTURE 4: Cryptography CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson

More information

Block Cipher Modes of Operation

Block Cipher Modes of Operation Block Cipher Modes of Operation Luke Anderson luke@lukeanderson.com.au 24th March 2016 University Of Sydney Overview 1. Crypto-Bulletin 2. Modes Of Operation 2.1 Evaluating Modes 2.2 Electronic Code Book

More information

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography 15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@

More information

Defending Computer Networks Lecture 20: More Encryp1on. Stuart Staniford Adjunct Professor of Computer Science

Defending Computer Networks Lecture 20: More Encryp1on. Stuart Staniford Adjunct Professor of Computer Science Defending Computer Networks Lecture 20: More Encryp1on Stuart Staniford Adjunct Professor of Computer Science HW5 out on website Logis;cs Will need at least one correc;on Due Weds Dec 2nd No lectures next

More information

Chapter 16 Identification Numbers Understand the purpose of a check digit. Know what a bmod

Chapter 16 Identification Numbers Understand the purpose of a check digit. Know what a bmod (c) Epstein 2013 1 Exam 3 Review Exam 3 Learning Objectives Chapter 16 Identification Numbers Understand the purpose of a check digit. Know what a bmod m means and be able to calculate xmod y. Know the

More information

MEP: Codes and Ciphers, UNIT 16 Modern Encryption

MEP: Codes and Ciphers, UNIT 16 Modern Encryption 16 Modern ncryption NON n the mid-wentieth entury encryption had to be done using mechanical devices such as the nigma machine. Now we have powerful computers with software which allows us to encrypt quickly.

More information

A (Brief) History of Cryptography

A (Brief) History of Cryptography Caesar Cipher A (Brief) History of Cryptography Ozalp Babaoglu A substitution cipher Each letter of the plaintext is replaced by a unique letter in the ciphertext Which letter? In the case of Caesar Cipher,

More information