Classical Techniques: Substitution

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptography and Network Security
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography and Network Security Sixth Edition by William Stallings.
Classical Cryptography
CSCE 790G: Computer Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Classical Encryption Techniques
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Classical Encryption Techniques
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
Cryptography & Classical Ciphers
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Information Systems Security 3. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves,
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Cryptography and Network Security Chapter 2
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Conventional Encryption Message Confidentiality
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Communication Security
Cryptography and Network Security
CS4780 Cryptography and Information Security
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
Conventional Encryption Message Confidentiality
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
“Classical Encryption Techniques”
Cryptographic Algorithms and Protocols
Traditional Symmetric-Key Ciphers
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Classical Techniques: Substitution Substitute a character, digit or symbol for each character in the plaintext Discussed: The Caesar cipher Monoalphabetic cipher Playfair cipher Polyalphabetic cipher

Caesar Cipher ci=E(3,pi)=(pi+3) mod 26; pi=D(3,ci)=(ci-3) mod 26 2000 years ago, by Julius Caesar A simple substitution cipher, known as Caesar cipher Replace each letter with the letter standing 3 places further down the alphabet Plain: meet me after the toga party Cipher: PHHW PH DIWHU WKH WRJD SDUWB No key, just one mapping (translation) 0123456... Plain: abcdefghijklmnopqrstuvwxyz Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC 3456789... ci=E(3,pi)=(pi+3) mod 26; pi=D(3,ci)=(ci-3) mod 26

Generalized Caesar Cipher Can use any shift from 1 to 25, i.e., replace each letter by a letter a fixed distance away ci=E(k,pi)=(pi+k) mod 26; pi=D(k,ci)=(ci-k) mod 26 Shift cipher Key = k Key letter: the letter a plaintext A maps to e.g. a key letter of F means A maps to F, B to G, …, Y to D, Z to E Hence have 26 (25 useful) ciphers Key space = 26

Brute-Force Cryptanalysis of Caesar Cipher Ciphertext only attack Charateristics for success The encryption and decryption algorithms are known There are only 25 keys to try The language of the plaintext is known and easily recongnizable

Monoalphabetic Cipher Increased key space compared to Caesar cipher Alphabet sequence is not required What is the key space? 26! > 4 x 1026 Monoalphabetic ciphers are still easy to break because they reflect frequency of alphabet E = 12.75, T = 9.25, R = 8.50, N = 7.75, etc.

Relative Frequency of Letters in English Text

Frequency Statistics of Language Substitution Techniques Frequency Statistics of Language In addition to the frequency info of single letters, the frequency info of two-letter (digram) or three-letter (trigram) combinations can be used for the cryptanalysis Most frequent digrams TH, HE, IN, ER, AN, RE, ED, ON, ES, ST, EN, AT, TO, NT, HA, ND, OU, EA, NG, AS, OR, TI, IS, ET, IT, AR, TE, SE, HI, OF Most frequent trigrams THE, ING, AND, HER, ERE, ENT, THA, NTH, WAS, ETH, FOR, DTH

Playfair Cipher Best-known multiple-letter substitution cipher Digram cipher (digram to digram, i.e., E(pipi+1) = cici+1 through keyword-based 5x5 transformation table) Great advance over simple monoalphabetic cipher (26 letters  26x26=676 digrams) Can be generalized to polygram cipher Keyword = monarchy Plaintext: H S E A A R M U Ciphertext: B P I M R M C M M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z

Playfair Cipher - Rules Repeating plaintext letters are separated with a filler letter, such as X. Plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element of the row circularly following the last. Plaintext letters that fall in the same column are each replaced by the letter beneath, with the top element of the row circularly following the last. Otherwise, each plaintext letter is replaced by the letter that lies in its own row and the column occupied by the other plaintext letter.

Polyalphabetic Cipher Typically a set of monoalphabetic substitution rules is used Key determines which rule to use

Vigenère cipher ci = E(pi) = pi + ki mod(key length) mod 26 Example: Best-known polyalphabetic ciphers Each key letter determines one of 26 Caesar (shift) ciphers ci = E(pi) = pi + ki mod(key length) mod 26 Example: Keyword is repeated to make a key as long as the plaintext Key: deceptivedeceptivedeceptive Plaintext: wearediscoveredsaveyourself Cipheretxt: ZICVTWQNGRZGVTWAVZHCQYGLMGJ

Vigenère cipher - 2

Example: Encryption Decryption

Vigenère cipher - 3 Vigenère autokey system: after key is exhausted, use plaintext for running key (to eliminate the periodic nature) Key: deceptivewearediscoveredsav Plaintext: wearediscoveredsaveyourself Cipheretxt: ZICVTWQNGKZEIIGASXSTSLVVWLA

Transposition (Permutation) Techniques Hide the message by rearranging the letter order without altering the actual letters used Rail Fence Cipher Write message on alternate rows, and read off cipher row by row Example: Block (Columnar) Transposition Ciphers Message is written in rectangle, row by row, but read off column by column; The order of columns read off is the key M e m a t r h t g p r y e t e f e t e o a a t MEMATRHTGPRYETEFETEOAAT Key: 4 3 1 2 5 6 7 Plaintext: a t t a c k p o s t p o n e d u n t i l t w o a m x y z Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ

Steganography “The art of covered writing” “Security by obscurity” Hide messages in other messages Conceal the existence of message Conceal what you are communicating (Sending encrypted messages would make you a spy) Character marking. Overwrite with a pencil Invisible ink, - Pin punctures, - First letter of each word Letter position on page, - Drawings, - Codes Typewriter correction ribbon Microdots Digital steganography

Steganography - Example News Eight Weather: Tonight increasing snow. Unexpected precipitation Smothers Eastern towns. Be extremely cautious and use snowtires especially heading east. The highways are knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday First letter of each word yields: Newt is upset because he thinks he is President This example was created by Neil F. Johnson, and was published in Steganography,Technical Report TR_95_11_nfj, 1995. URL:  http://www.jjtc.com/pub/tr_95_11_nfj/ From WWII German spy (Kahn): Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable Oils. Second letter of each word yields: Pershing sails from NY June 1.