crypttext 2018/1/9 13:06 page 18 #22

Similar documents
CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Enhanced Play Fair Cipher

Introduction to Cryptology

Substitution Ciphers

Substitution Ciphers

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

2

P2_L6 Symmetric Encryption Page 1

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

PART I Symmetric Ciphers

3D (6 X 4 X 4) - Playfair Cipher

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security

Chapter 2: Classical Encryption Techniques

Hardware Design and Software Simulation for Four Classical Cryptosystems

Cryptography Symmetric Encryption Class 2

Cryptanalysis. Ed Crowley

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Cryptography ThreeB. Ed Crowley. Fall 08

PART THREE. PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

CSCE 715: Network Systems Security

Enhanced 3-D PLAYFAIR Cipher

Cryptography and Network Security Chapter 2

Keywords: Playfair, Matrix, XOR operation

A Modified Playfair Encryption Using Fibonacci Numbers

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Classical Encryption Techniques. CSS 322 Security and Cryptography

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

CSCE 813 Internet Security Symmetric Cryptography

2 What does it mean that a crypto system is secure?

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Lecture 4: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption

B) Symmetric Ciphers. B.a) Fundamentals B.b) Block Ciphers B.c) Stream Ciphers

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

Lesson 7a - Encryption and Decryption

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CIS 3362 Final Exam. Date: 12/9/2015. Name:

Modified Playfair Cipher Using Random Key Linear Congruent Method

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

Overview of Conventional Encryption Techniques

USING MAPLETS IN TEACHING CRYPTOLOGY

Java Applets for a Cryptology Course. Ulrich A. Hoensch Rocky Mountain College Billings, Montana

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

Cryptanalysis of Homophonic Substitution- Transposition Cipher

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis

Cryptography Functions

Nature Sunday Academy Lesson Plan

Module 1: Classical Symmetric Ciphers

Classical Encryption Techniques

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

CIS 3362 Final Exam 12/4/2013. Name:

Plaintext (P) + F. Ciphertext (T)

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

Introduction to Cryptography. In the News: Hacker exposes embassies'

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

Introduction to Cryptology Dr. Sugata Gangopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Roorkee

Cryptosystems. Truong Tuan Anh CSE-HCMUT

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Classic Cryptography: From Caesar to the Hot Line

ENGR/CS 101 CS Session Lecture 5

(8) Cryptanalysis. Close-up of the rotors in a Fialka cipher machine

Mathematical Perspectives: Secret Codes: Dr. Morton. Ch 2: Substitution Ciphers

7. Symmetric encryption. symmetric cryptography 1

Encryption Algorithms

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

The Caesar Cipher Informatics 1 Functional Programming: Tutorial 3

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

CRYPTOGRAPHY. BY, Ayesha Farhin

Computers and Security

Introduction to Symmetric Cryptography

Cryptanalysis. Andreas Klappenecker Texas A&M University

18-642: Cryptography 11/15/ Philip Koopman

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

1-7 Attacks on Cryptosystems

Secret-Key Encryption Lab

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

Information Systems Security

Introduction to Cryptology. Lecture 2

Lecture 1: Perfect Security

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Classical Encryption Techniques

Transcription:

crypttext 2018/1/9 13:06 page 18 #22 18 CHAPTER 2. SUBSTITUTION CIPHERS 5. Find some information about the encrypted messages sent by the Zodiac killer to the San Francisco Bay area press in 1969 70, and write a summary of your findings. 2.3 Playfair Ciphers Substitution ciphers would be less susceptible to attack by frequency analysis if plaintext characters were encrypted in pairs (i.e., digraphs). This is the basis for Playfair ciphers. Playfair ciphers were first described in 1854 by English scientist and inventor Sir Charles Wheatstone, but are named for Scottish scientist and politician Baron Lyon Playfair, Wheatstone s friend, who argued for their use by the British government. Although initially rejected because of their perceived complexity, Playfair ciphers were eventually used by the British military during the Second Boer War and World War I, and by British intelligence and the militaries of several countries, including both the United States and Germany, during World War II. Playfair ciphers use one or more keywords. Spaces and duplicate letters in the keyword(s) are removed, and the resulting letters are then used to form an array of letters, similar to the array used in keyword columnar substitution ciphers, except that for Playfair ciphers this array must always

crypttext 2018/1/9 13:06 page 19 #23 2.3. PLAYFAIR CIPHERS 19 have exactly five letters per row. Also, I and J are considered to be the same letter in Playfair arrays, so J is not included. The reason for this is so that Playfair arrays will always form perfect squares of size 5 5. (That is, Playfair arrays will always have exactly five rows and five columns.) Example 2.5 Consider a Playfair cipher with keyword WHEATSTONE. Removing the duplicate letters in this keyword gives WHEATSON, and using these letters to form the array for a Playfair cipher yields the following. W H E A T S O N B C D F G I K L M P Q R U V X Y Z We will use a Playfair cipher with this array to encrypt a message in Example 2.7. To encrypt a message using a Playfair cipher, spaces are removed from the plaintext, and the plaintext is then split into digraphs. If any digraphs contain repeated letters, an X is inserted in the plaintext between the first pair of repeated letters that were grouped together in a digraph, and the plaintext is again split into digraphs. This process is repeated if necessary and as many times as necessary until no digraphs contain repeated letters. Finally, if necessary, an X is inserted at the end of the plaintext so that the last letter is in a digraph. Example 2.6 Consider the message IDIOCY OFTEN LOOKS LIKE INTELLI- GENCE. To encrypt this message using a Playfair cipher, we begin by splitting the plaintext into digraphs. This yields the following. ID IO CY OF TE NL OO KS LI KE IN TE LL IG EN CE The seventh digraph is the first one that contains repeated letters. Thus, we insert an X between these letters and again split the plaintext into digraphs. This yields the following. ID IO CY OF TE NL OX OK SL IK EI NT EL LI GE NC E None of these digraphs contain repeated letters, but now we must insert an X at the end of the plaintext so that the last letter will be in a digraph. This yields the following. ID IO CY OF TE NL OX OK SL IK EI NT EL LI GE NC EX We are now ready to encrypt this message using a Playfair cipher, which we will do in Example 2.7.

crypttext 2018/1/9 13:06 page 20 #24 20 CHAPTER 2. SUBSTITUTION CIPHERS In a Playfair cipher, the 5 5 array of letters is used to convert plaintext digraphs into ciphertext digraphs according to the following rules. If the letters in a plaintext digraph are in the same row of the array, then the ciphertext digraph is formed by replacing each plaintext letter with the letter in the array in the same row but one position to the right, wrapping from the end of the row to the start if necessary. For example, using the array in Example 2.5, the plaintext digraph ID encrypts to the ciphertext digraph KF, and IK encrypts to KD. If the letters in a plaintext digraph are in the same column of the array, then the ciphertext digraph is formed by replacing each plaintext letter with the letter in the array in the same column but one position down, wrapping from the bottom of the column to the top if necessary. For example, using the array in Example 2.5, OF encrypts to FM, andex encrypts to NE. If the letters in a plaintext digraph are not in the same row or column of the array, then the ciphertext digraph is formed by replacing the first plaintext letter with the letter in the array in the same row as the first plaintext letter and the same column as the second plaintext letter, and replacing the second plaintext letter with the letter in the array in the same row as the second plaintext letter and the same column as the first plaintext letter. For example, using the array in Example 2.5, IO encrypts to FB, and OX encrypts to NV. Example 2.7 The Playfair cipher with keyword WHEATSTONE (for which the array is given in Example 2.5) encrypts the plaintext IDIOCY OFTEN LOOKS LIKE INTELLIGENCE as follows. Plain: Cipher: ID IO CY OF TE NL OX OK SL IK EI NT EL LI GE NC EX KF FB BZ FM WA SP NV CF DU KD AG CE WP QD PN BS NE For decryption, the rules for encryption are reversed. (The first decryption rule is identical to the first encryption rule except letters one position to the left are chosen, wrapping from the start of the row to the end. The second decryption rule is identical to the second encryption rule except letters one position up are chosen, wrapping from the top of the column to the bottom. The third decryption rule is identical to the third encryption rule.) For cryptanalysis, because Playfair ciphers encrypt digraphs, single-letter frequency analysis is in general not helpful. (Note in Example 2.7 the plaintext letters I and O both correspond to four different ciphertext letters.) However, when used to encrypt long messages, it is sometimes possible to break Playfair ciphers using frequency analysis on digraphs, since identical plaintext digraphs will always encrypt to identical ciphertext digraphs.

crypttext 2018/1/9 13:06 page 21 #25 2.3. PLAYFAIR CIPHERS 21 Other weaknesses are that a plaintext digraph and its reverse (e.g., AB and BA) will always encrypt to a ciphertext digraph and its reverse, and that for short keywords the bottom rows of the array may be predictable. 2.3 Exercises 1. Consider a Playfair cipher with keyword SEINFELD. (a) Use this cipher to encrypt THE SMELLY CAR. (b) Use this cipher to encrypt THE BIZARRO JERRY. (c) Decrypt QMSHKZHCILKBXARBIY, which was formed using this cipher. 2. Consider a Playfair cipher with keywords CLINT EASTWOOD. (a) Use this cipher to encrypt DIRTY HARRY IS A CLASSIC. (b) Use this cipher to encrypt AFISTFULOFDOLLARSISGOODTOO. (c) Decrypt ORAEZCABSNEWWUOSCAFSAFOCCOQZOC, which was formed using this cipher. 3. Create a Playfair cipher and use it to encrypt a plaintext of your choice with at least 20 letters. 4. In Walt Disney Pictures 2007 movie National Treasure: Book of Secrets, amannamedthomasgates(thegreat-great-grandfatherof treasure hunter Benjamin Franklin Gates, the main character in the movie) is asked by John Wilkes Booth and a colleague to decrypt the ciphertext MEIKQOTXCQTEZXCOMWQCTEHNFBIKMEHAKRQCUNGIKMAV, which was formed using a Playfair cipher with keyword DEATH. Decrypt this ciphertext. 5. On August 2, 1943, Japanese destroyer Amagiri rammed and sank American patrol boat PT-109, which was under the command of U.S. Naval Reserve Lieutenant and future President John F. Kennedy. After reaching shore, Kennedy sent the following ciphertext, which was formed using a Playfair cipher with keywords ROYAL NEW ZEALAND NAVY. Use the Playfair cipher Maplet to decrypt this ciphertext. KXIEYUREBEZWEHEWRYTUHEYFSKREHEGOYFIWUQUTQYOMUQYCAIPOB OTEIZONTXBYBNTGONEYCUZWRGDSONSXBOUYWRHEBAAHYUSEDQ 6. Find a copy of Dorothy Sayers novel Have His Carcase, and write a summary of how a Playfair cipher is integrated into the story and the steps described in it for breaking a Playfair cipher.

crypttext 2018/1/9 13:06 page 22 #26 22 CHAPTER 2. SUBSTITUTION CIPHERS 7. A description of cryptanalysis of Playfair ciphers can be found in U.S. Army Field Manual 34-40-2 [32]. Find a copy of this manual, and write a summary of how it describes Playfair cipher cryptanalysis. 8. Find some information about two-square and four-square ciphers, and write a summary of your findings. 9. Find some additional information about the Beale ciphers, and write a summary of your findings. 2.4 The Navajo Code While simple substitution ciphers are not very secure, and even ciphers such as Playfair that substitute for digraphs can be broken through a type of frequency analysis on longer ciphertexts, not all ciphers based on substitution alone are easy to break. The Navajo code, a cipher famously created by Native Americans, primarily from the Navajo Nation that occupies a large region of Utah, Arizona, and New Mexico, and used effectively by the Americans throughout the Pacific Campaign during World War II, was essentially a substitution cipher. The Navajo language was at the time exclusively oral, very complex, and unknown to virtually everyone outside the Navajo Nation. The idea of using Navajos basically speaking their native language as a means for encrypting messages originated in 1942 with aman named Philip Johnston. Having grown up the son of a missionary to the Navajo, Johnston was very familiar with the Navajo culture, and wasone of only a handful of non-navajos who spoke the Navajo language fluently. Johnston was a veteran of World War I, where he may have seen Native Americans, specifically from the Choctaw Nation, encrypting messages for the U.S. Army basically by speaking their native language. More likely, Johnston first read of the use of Choctaw by the U.S. Army during World War I shortly after the Japanese attack on Pearl Harbor that thrust the U.S. into World War II. Whatever the origin of his idea, Johnston recruited four Navajos to demonstrate to a group of U.S. Marine officers how they could quickly and flawlessly translate English messages into the Navajo language, communicate these messages to each other via radio, and then translate these messages back into English. Convinced of the potential of the Navajo language, the Marines ordered a pilot project in which an eight-week communications training course was completed by a groupof 29 Navajos, who became the original Navajo code talkers. A graduation picture from this training course is shown in Figure 2.1 on page 23. Before this training course could commence, the Marines had to figure out a way to overcome a problem that had plagued attempts at using Native American languages as a means for encrypting messages during World War