Ciphers and Permutations. Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF)

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
390 Codes, Ciphers, and Cryptography
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
1 Codes, Ciphers, and Cryptography-Ch 3.2 Michael A. Karls Ball State University.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Security & Encryption Thomas Fenske & Joseph Minter.
Solving the Enigma How the Western Allies Cracked the German Secret Codes During WW II.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 4: Captain Ridley’s Shooting Party.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Enigma Meghan Emilio Faculty Sponsor: Ralph Morelli (Computer Science)
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Modern Cryptography.
Enigma Machine - Design Presentation Group M1 Adithya Attawar Shilpi Chakrabarti Zavo Gabriel Michael Sokolsky Digital World War II Enigma Cipher Wed.
The Enigma Encryption System Andrew Regan CSC 290.
Cryptography in World War II
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
Classical Encryption Techniques
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Chapter 12, Cryptography Explained Part 6
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Introduction to Cryptography
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
4.7 Identity and Inverse Matrices
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Encryption of WWII Philip Gebhardt 10/24/2011. Interest.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
CS 150 – Computing: From Ada to the Web Cryptography.
Turing’s Bombes. Solve Enigma using known plaintext Depending on German patterns, e.g. weather reports Sometimes setup by seeding/farming Depended on.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
By, Amanda Rydzynski O’Brien Computer Skills
Chris Christensen Department of Mathematics and Statistics Northern Kentucky University.
Some of these PowerPoint pages were created by my friend Shawna Haider.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
The Mathematics Behind
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Substitution Ciphers.
History and Background Part 3: Polyalphabetic Ciphers
History of Cryptography
Enigma Machine.
Rotor Ciphers.
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
WORLD OF WONDERS : THE ENIGMA MACHINE
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Presentation transcript:

Ciphers and Permutations

Monoalphabetic Cipher is simply a permutation abcdefghijklmnopqrstuvwxyz SATBUCVDWEXFYGZRQPONMLKJIH Cycle Form (ASOZHDB) (CTNGVLF) (EUMYIWKXJ) (PR) (Q) Four cycles, lengths 9, 7, 7, 2, 1

8 Character examples C1 = (ADE) (FGH) (BC) P = (AD) (BG) (EF) (C) (H) Note: second example is self-inverse could be plugboard setting.

Theorem C1 = (ADE) (FGH) (BC) P = (AD) (BG) (EF) (C) (H) P C1 P = (AFD) (BHE) (CG) Theorem: P C1 P will have the form of permutation cycles as C1 (same lengths, different letters)

Question What are the possible permutations chains for the cipher for a single setting of the Enigma – self-inverse with no letters going to themselves? Since it is self inverse, if letter s1 goes to letter s2, then s2 goes to s1. Since no letter goes to itself, s1 and s2 are different. Thus, every chain in the permutation is a transposition (s1 s2). The pattern is all pairs. (s1 s2) (s3 s4) … (s25 s26)

Application to Polish deciphering Based on the German system of sending message key twice at the beginning of message (encrypted with day key) then message (encrypted with message key) Consider the machine at step 1 and step 4 –two different ciphers encoding the same unknown letter –Same for steps 2 and 5, 3 and 6

Example L1 L2 L3 L1 L2 L3 B L V X P R

Consider step 1, step 4 settings Enigma Step 1 Enigma Step 4 L1 BX Since Enigma is self-inverse, reverse the first one

Consider step 1, step 4 settings Enigma Step 1 Enigma Step 4 BL1 X Produces a new cipher that takes B to X Can be characterized by its permutation cycles What is the effect of the plugboard?

Plugboard is P, rotors are R1 and R4 R1R4 BL1 X PPPP What is the effect of the plugboard?

Plugboard has no effect on cycle form! R1R4 BX R1 followed by R4 forms a cipher with characteristic cycle form, not self-inverse. Plugboard has no effect on the cycle form, only the specific letters! PP

Idea of Polish Bombe R1R2 B X Form machine from two Enigma Rotor machines, setup the same, but one 3 steps ahead of the other. Then step through settings. For each setting, check electrically for cycles XQ Q B

Polish procedure Find cycle pattern for S1-S4, S2-S5,S3-S6 Find machine settings with matching pattern –Originally done by hand cataloging all enigma settings –Later, when rotors were modified, automated with Bombes –Also used “females” – one element cycles Pattern of number of females for each step pairing could often reduce possible machine settings to a few that could then be tested. Punch card system to find matches