slides courtesy of Eric Roberts

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Alan Turing Start of the 20 th century The Atom Quantum physics Freud Philosophy …and a crisis in Maths!
The Use of Sounds in Poetry Jacob Kobler Shane Nelson Megan Schonhar English IV 25 March 2013.
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
David Reed Department of Computer Science Creighton University Nifty Assignments: Encryption & the Enigma Machine.
String Processing Eric Roberts CS 106A February 3, 2010.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Animation Programs: Scenarios and Storyboards Alice Web Design Section 8-3.
Alan Turing Presented By: Tyler Romero CSCE Spring 2014.
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Encryption: A Brief History Author: Margery Waldron.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
David Evans CS200: Computer Science University of Virginia Computer Science Class 26: Halting Problem It is plain at any.
String Processing Eric Roberts CS 106A February 1, 2016.
Encryption with Keys and Passwords
CIT 380: Securing Computer Systems
Eric Roberts and Jerry Cain
Chapter 2 Basic Encryption and Decryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography & Security
(Tuesday, 20 October, 7:30-9PM) Encryption-Decryption
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Cryptography CS Principles January 19, 2017.
History and Background Part 3: Polyalphabetic Ciphers
Cryptography.
CSCI-235 Micro-Computer Applications
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
In this lesson we will understand:
Enigma Machine.
Jerry Cain and Eric Roberts
Alan Turing & Cryptanalysis
Chapter 3:Cryptography (16M)
Encryption with Keys and Passwords
Welcome to the Primary 3 Reading Workshop.
Simple Encryption- Lesson 5
Substitution Codes By Sarah Bonnell.
Binary Representation
Encryption with Keys and Passwords
Lesson 7: Simple Encryption
Class 24: Computability Halting Problems Hockey Team Logo
slides courtesy of Eric Roberts
Jabberwocky By: Lewis Carroll
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Modern Cryptography.
Symmetric Encryption or conventional / private-key / single-key
Cryptography: from substitution cipher to RSA
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

slides courtesy of Eric Roberts Cryptography Jerry Cain CS 106AJ October 26, 2018 slides courtesy of Eric Roberts

Once upon a time . . .

Alan Turing The film The Imitation Game celebrated the life of Alan Turing, who made many important contributions in many areas of computer science, including hardware design, computability, and AI. During World War II, Turing headed the mathematics division at Bletchley Park in England, which broke the German Enigma code—a process you’ll simulate in Assignment #5. Tragically, Turing committed suicide in 1954 after being convicted on a charge of "gross indecency" for homosexual behavior. Prime Minister Gordon Brown issued a public apology in 2009. Alan Turing (1912-1954)

The Imitation Game Alan Turing’s wartime work is now more widely known because of the movie The Imitation Game. Unfortunately, the movie got much of the history wrong. 4

Cryptography

Encryption Lfr gax wvwx clgat vngeclzx. Doo plpvb zhuh wkh erurjryhv, M N O P Q R S T U V W X Y Z Lfr gax wvwx clgat vngeclzx. Doo plpvb zhuh wkh erurjryhv, Did gyre and gimble in the wabe: Twas brillig, and the slithy toves, Twas brillig, and the slithy toves, Twas brillig, and the slithy toves, Did gyre and gimble in the wabe: Did gyre and gimble in the wabe: All mimsy were the borogoves, All mimsy were the borogoves, And the mome raths outgrabe. And the mome raths outgrabe. 6

Implementing a Caesar Cipher str result key i code base ch "Et tu, Brute?" "Rg gh, " "Rg " "Rg gh" "Rg g" "Rg gh, O" "Rg gh, Oeh" "Rg gh, Oehgr?" "Rg gh, Oehgr" "Rg gh, Oehg" "Rg" "Rg gh, Oe" "Rg gh," "R" "" -13 13 7 6 11 8 9 10 4 5 12 3 2 13 1 117 101 114 66 116 116 117 69 116 97 97 97 97 65 97 97 97 65 "r" "e" "t" "?" "h" "g" "O" "R" "u" "g" "t" "g" " " "u" "h" "t" "r" "," "B" " " "E" "e" > caesarCipher("Et tu, Brute?", -13) Rg gh, Oehgr?

Cryptograms A cryptogram is a puzzle in which a message is encoded by replacing each letter in the original text with some other letter. The substitution pattern remains the same throughout the message. Your job in solving a cryptogram is to figure out this correspondence. One of the most famous cryptograms was written by Edgar Allan Poe in his short story "The Gold Bug." Edgar Allan Poe (1809-1849) In this story, Poe describes the technique of assuming that the most common letters in the coded message correspond to the most common letters in English, which are E, T, A, O, I, N, S, H, R, D, L, and U.

Poe’s Cryptogram Puzzle 5 3 ‡ † ) 6 * ; 4 8 2 • ¶ 1 ( : 9 ? – 8 33 ; 26 4 19 ‡ 16 ) * 13 5 12 6 11 ( 10 † 1 9 2 : 3 ? ¶ – • A G O D L S I N T H E B P V F R Y M U C 5 3 ‡ † ) 6 * T H E 2 • ¶ 1 ( : 9 ? – 5 3 ‡ † ) 6 * ; 4 8 2 • ¶ 1 ( : 9 ? – 5 3 ‡ † ) 6 * ; 4 E 2 • ¶ 1 ( : 9 ? – 9

Exercise: Letter-Substitution Cipher Poe’s cryptogram is an example of a letter-substitution cipher, in which each letter in the original message is replaced by some different letter in the coded version of that message. In this type of cipher, the key is usually presented as a sequence of 26 letters that shows how each of the letters in the standard alphabet are mapped into their enciphered counterparts: JavaScript Console > const KEY = "QWERTYUIOPASDFGHJKLZXCVBNM"; > encrypt("SECRET MESSAGE", KEY) LTEKTZ DTLLQUT 10

The Enigma Machine 11

Important Properties of the Enigma Code The decryption team at Bletchley was able to exploit the following facts about the Enigma machine: The encoding is symmetrical. The Enigma machine can never map a character into itself. The steckerboard does not affect the transformation pattern of the rotors, but only the characters to which the outputs of that rotor are assigned. The codebreakers were also helped by the fact that the Germans were often both careless and overconfident. In believing they had an unbreakable encoding machine, they failed to take adequate measures to safeguard the integrity of their communications.

Breaking the Enigma Code The most common technique used at Bletchley Park was the known-plaintext attack, in which the codebreakers guess that a particular sequence of characters exists somewhere in the decoded message. A sequence of characters that you guess is part of the plaintext is called a crib. The Imitation Game gives the mistaken impression that Alan Turing came up with the idea of a crib during the war. The value of a crib has been known since antiquity. The 2001 movie Enigma offers a much more accurate view of why cribs are important and how codebreakers use them.

The End