Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY 2012-2013.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Da Vinci Challenge Code Breaking Due to a teacher vocational exchange in 2010/11, nine teams can compete in Code breaking (the interpretation.
1 CSCD434/539 Winter 2013 Lecture 11 Cryptography - Basics.
Lecture 3 Classical Cipher System SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
95-752:4-1 Encryption - I :4-2 Definitions Plaintext: easy to understand form (original message) Ciphertext: difficult to understand form Encryption:
Encryption and Encoding
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Classical Cryptography
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Session 1: Introduction to cryptology. Cryptology Cryptology: criptos=secret + logos=science Cryptology = Cryptography + Cryptanalysis Opposite and complementary.
Encryption Theory CSC380 – Flint Joasaint, Marcial White.
ICS 454: Principles of Cryptography
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography
Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings.
第四讲 古典替换密码. 1 。多字母表替换密码 (Polyalphabetic ciphers) 增强密码安全性的方法是使用多字母替换密码 hence the name polyalphabetic ciphers 使得密码分析更困难,因为有较多的密码表去 猜测 打乱了字母出现的频率 用一个密钥决定对每个字母使用什么字母变换.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptology I.Definitions II.Substitution Ciphers III.Transpositions Ciphers IV.The DES Algorithm V.Public-Key Cryptology.
Introduction to Cryptography
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.3: Substitution Ciphers
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
ROT13 cipher. The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. Example: all 'A's.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Mohammad Alauthman 6/12/2016© 2004 Dr. Khalid Kaabneh.2 CRYPTOLOGY Definition: Cryptology : from the Greek Crypto meaning secret.
LAB#3 CLASSICAL ENCRYPTION CPIT 425. This diagram is taken from Dr.Omaima slides.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Cryptography.
Affine Cipher.
Asad Gondal Ali Haider Mansoor
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Cryptography and Network Security
Computer and Data Security 4th Class
Computer and Data Security 4th Class
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
CSCD 303 Fall 2018 Lecture 18 Cryptography - Basics.
Computer Security Mohammad Alauthman
CSCD434 Spring 2019 Lecture 12 Cryptography - Basics.
Double Transpositions
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY

2- SIMPLE SUBSTITUTION CIPHERS: In simple substitution (or mono alphabetic) ciphers, each character of the plaintext replaced with a corresponding character of ciphertext. A single one-to-one mapping function (f) from plaintext to ciphertext character is used to encrypt the entire message using the same key (k); such that: Ek(M) = F(m1) F(m2) …..F(mN) =C Where: N : is the length of the message. M : is plaintext message given by M = ( m1, m2, …..,mN). C : is ciphertext message given by C = (c1,c2,….., cN). There are many types of simple substitution ciphers according to its equations used to encryption, they: Shifted alphabet (Caesar cipher): F(a) = (a + k) mod n Where k : is the number of positions to be shifted. a : is a single character of the alphabet> n : is the size of the alphabet.

2- SIMPLE SUBSTITUTION CIPHERS: Example: If k =3 then we can encrypt the following message as: M = R E N A I S S A N C E Ek(M) = U H Q D L V V D Q F H Multiplication based (decimation): F(a) = ak mod n Where k, n are relatively prime in order to produce a complete set of residues. Example: If k =9 then the above message can encrypted as: M = R E N A I S S A N C E Ek(M) = X K N A U G G A N S K If k and n are not relatively prime, several letters will encipher to the same ciphertext letter, and not all letters will appear in the ciphertext.

2 - SIMPLE SUBSTITUTION CIPHERS: Addition and multiplication (affine): F(a) = (ak1+k0) mod n Where k1 and n are relatively prime Simple substitution ciphers dose not hide the underlying frequencies of the different letters of the plaintext, and hence it can be easily broken. Example: Encrypt the following message using Caesar and decimation methods of simple substitution Ciphers when k=13 and alphabet A … Z: M = RENAISSANCE First we give the position of each character in alphabet. A -0G -6M – 12S – 18Y -24 B -1 H -7N - 13T - 19Z -25 C -2I -8O - 14U -20 D -3J -9 P - 15V – 21 E -4K -10Q -16W - 22 F -5L - 11R -17X - 23 Then we obtained the equation with k =13 and n =26: Shifted alphabet (Caesar): F (a) = (a+k) mod n F (R) = ( ) mod 26 = 30 mod 26 = 4 =E F (E) = (4 + 13) mod 26 = 17 mod 26 =17 = R F (N) = (13 +13) mod 26 = 26 mod 26 =0 =A And so on

2 - SIMPLE SUBSTITUTION CIPHERS: Multiplication based (decimation): We can't encrypted because k and n are not relatively prime (GCD (13, 26) =13 not 1) That’s mean: F (A) = 0 * 13 mod 26 = 0 = A F(C) = 2 * 13 mod 26 = 0 = A F (E) = 4 * 13 mod 26 = 0 = A This is meaning the characters A, C and E encrypted to same letter A.

3- HOMOPHONIC SUBSTITUTION CIPHERS: A homophonic substitution cipher maps each character a of the plaintext alphabet in to a set of Ciphertext elements f(a) called homophonies. High- order homophones: Example: Let n=5, alphabet= {E, I, L,M,S}, M= SMILE, X= K= LIMES. Find C. EILMS E I L M S Matrix=5*5= 25 numbers= 01,……,25. C=

4-POLYALPHABETIC SUBSTITUTION CIPHERS: Vigener cipher : The key is specified by a sequence of the letters= k1,k2,……..,kd, where ki (i=1,2,….,d) gives the amount of shift in the ith alphabet that is: F(a) = (a + ki) mod n Where ki : is the number of positions to be shifted in the ith alphabet. a : is a single character of the alphabet. n : is the size of the alphabet. Example: we can encrypt the following message and key as: M = R E N A I S S A N C E K = B A N D B A N D B A N Ek(M) = S E A D J S F D O C R

4-POLYALPHABETIC SUBSTITUTION CIPHERS: Beaufort cipher : This cipher similar to Vigener cipher,where, The key is specified by a sequence of the letters, K=k1,k2,……..,kd, where ki(i=1,2,….,d) gives the amount of shift in the ith alphabet except the shifted is begin with 25in it's table that is: F(a) = (k i -a i ) mod n Where ki : is the number of positions to be shifted in the ith alphabet. a : is a single character of the alphabet. n : is the size of the alphabet. Example: we can encrypt the following message and key as: M = R E N A I S S A N C E K = B A N D B A N D B A N Ek(M) =

4-POLYALPHABETIC SUBSTITUTION CIPHERS: Variant Beaufort cipher : This cipher is the reversal of vigener cipher, and when used one to encryption the other is used to decryption and vice versa. Such that is: F(a i ) = (a i -k i ) mod n Where ki : is the number of positions to be shifted in the ith alphabet. a : is a single character of the alphabet. n : is the size of the alphabet. Example: we can encrypt the following message and key as: M = R E N A I S S A N C E K = B A N D B A N D B A N Ek(M) =

plaintext key ABCDEFGHIJKLMNOPQRSTUVWXYZ BCDEFGHIJKLMNOPQRSTUVWXYZA CDEFGHIJKLMNOPQRSTUVWXYZAB DEFGHIJKLMNOPQRSTUVWXYZABC EFGHIJKLMNOPQRSTUVWXYZABCD FGHIJKLMNOPQRSTUVWXYZABCDE GHIJKLMNOPQRSTUVWXYZABCDEF HIJKLMNOPQRSTUVWXYZABCDEFG IJKLMNOPQRSTUVWXYZABCDEFGH JKLMNOPQRSTUVWXYZABCDEFGHI KLMNOPQRSTUVWXYZABCDEFGHIJ LMNOPQRSTUVWXYZABCDEFGHIJK MNOPQRSTUVWXYZABCDEFGHIJKL NOPQRSTUVWXYZABCDEFGHIJKLM OPQRSTUVWXYZABCDEFGHIJKLMN PQRSTUVWXYZABCDEFGHIJKLMNO QRSTUVWXYZABCDEFGHIJKLMNOP RSTUVWXYZABCDEFGHIJKLMNOPQ STUVWXYZABCDEFGHIJKLMNOPQR TUVWXYZABCDEFGHIJKLMNOPQRS UVWXYZABCDEFGHIJKLMNOPQRST VWXYZABCDEFGHIJKLMNOPQRSTU WXYZABCDEFGHIJKLMNOPQRSTUV XYZABCDEFGHIJKLMNOPQRSTUVW YZABCDEFGHIJKLMNOPQRSTUVWX ZABCDEFGHIJKLMNOPQRSTUVWXY