Download presentation

Presentation is loading. Please wait.

Published byOmari Wolman Modified over 2 years ago

1
Ciphers and Permutations

2
Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF) (EUMYIWKXJ) (PR) (Q) Four cycles, lengths 9, 7, 7, 2, 1

3
8 Character examples C1 = (ADE) (FGH) (BC) P = (AD) (BG) (EF) (C) (H) Note: second example is self-inverse could be plugboard setting.

4
Theorem C1 = (ADE) (FGH) (BC) P = (AD) (BG) (EF) (C) (H) P C1 P = (AFD) (BHE) (CG) Theorem: P C1 P will have the form of permutation cycles as C1 (same lengths, different letters)

5
Question What are the possible permutations chains for the cipher for a single setting of the Enigma – self-inverse with no letters going to themselves? Since it is self inverse, if letter s1 goes to letter s2, then s2 goes to s1. Since no letter goes to itself, s1 and s2 are different. Thus, every chain in the permutation is a transposition (s1 s2). The pattern is all pairs. (s1 s2) (s3 s4) … (s25 s26)

6
Application to Polish deciphering Based on the German system of sending message key twice at the beginning of message (encrypted with day key) then message (encrypted with message key) Consider the machine at step 1 and step 4 –two different ciphers encoding the same unknown letter –Same for steps 2 and 5, 3 and 6

7
Example L1 L2 L3 L1 L2 L3 B L V X P R

8
Consider step 1, step 4 settings Enigma Step 1 Enigma Step 4 L1 BX Since Enigma is self-inverse, reverse the first one

9
Consider step 1, step 4 settings Enigma Step 1 Enigma Step 4 BL1 X Produces a new cipher that takes B to X Can be characterized by its permutation cycles What is the effect of the plugboard?

10
Plugboard is P, rotors are R1 and R4 R1R4 BL1 X PPPP What is the effect of the plugboard?

11
Plugboard has no effect on cycle form! R1R4 BX R1 followed by R4 forms a cipher with characteristic cycle form, not self-inverse. Plugboard has no effect on the cycle form, only the specific letters! PP

12
Idea of Polish Bombe R1R2 B X Form machine from two Enigma Rotor machines, setup the same, but one 3 steps ahead of the other. Then step through settings. For each setting, check electrically for cycles XQ Q B

13
Polish procedure Find cycle pattern for S1-S4, S2-S5,S3-S6 Find machine settings with matching pattern –Originally done by hand cataloging all enigma settings –Later, when rotors were modified, automated with Bombes –Also used “females” – one element cycles Pattern of number of females for each step pairing could often reduce possible machine settings to a few that could then be tested. Punch card system to find matches

Similar presentations

Presentation is loading. Please wait....

OK

A Glimpse of the History of Cryptography

A Glimpse of the History of Cryptography

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on networking related topics on personality Ppt on science fiction in films Ppt on power diode testing Ppt on social contract theory john Ppt on silicon valley of india Ppt on digital energy meter Ppt on basic etiquettes for teens Ppt on world diabetes day Ppt on natural resources in india Ppt on water pollution causes