Background on Unsolved 340-cipher Ryan Garlick

Slides:



Advertisements
Similar presentations
Heuristics, and what to do if you dont know what to do Carl Hultquist.
Advertisements

Reinforcement Learning
Inspiring imagination for story content.. Write for 3 minutes non stop.  Using a piece of A4 paper write non stop when your teacher says go.  You can.
Markov Decision Process
Using Parallel Genetic Algorithm in a Predictive Job Scheduling
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
The Zodiac Killer By: Bianca Peluso and Urszula Karwowska.
Cryptography and Murder – The Zodiac Killer
By: Reed Fujan. Serial Killer One of the great unsolved serial killers. Police investigated over 2,500 potential suspects. Roamed parts of Northern California.
BLAST, PSI-BLAST and position- specific scoring matrices Prof. William Stafford Noble Department of Genome Sciences Department of Computer Science and.
Tuesday, May 14 Genetic Algorithms Handouts: Lecture Notes Question: when should there be an additional review session?
Genetic Algorithms Representation of Candidate Solutions GAs on primarily two types of representations: –Binary-Coded –Real-Coded Binary-Coded GAs must.
1 Lecture 8: Genetic Algorithms Contents : Miming nature The steps of the algorithm –Coosing parents –Reproduction –Mutation Deeper in GA –Stochastic Universal.
Improved Crowd Control Utilizing a Distributed Genetic Algorithm John Chaloupek December 3 rd, 2003.
Intro to AI Genetic Algorithm Ruth Bergman Fall 2004.
Alignment Statistics and Substitution Matrices BMI/CS 576 Colin Dewey Fall 2010.
String Matching. Problem is to find if a pattern P[1..m] occurs within text T[1..n] Simple solution: Naïve String Matching –Match each position in the.
Cryptography Programming Lab
Genetic Algorithm.
Haplotype Blocks An Overview A. Polanski Department of Statistics Rice University.
Game Playing Chapter 5. Game playing §Search applied to a problem against an adversary l some actions are not under the control of the problem-solver.
SOFT COMPUTING (Optimization Techniques using GA) Dr. N.Uma Maheswari Professor/CSE PSNA CET.
Evolution Strategies Evolutionary Programming Genetic Programming Michael J. Watts
FBI Agent By: Aaliyah H. 5 th Grade Ms. Lattimore’s Class May 22, 2013.
Game Playing Chapter 5. Game playing §Search applied to a problem against an adversary l some actions are not under the control of the problem-solver.
Fundamentals of Hidden Markov Model Mehmet Yunus Dönmez.
Plot, Characters, Setting, Theme, and Point of View Ms. Adame 8 th Grade Language Arts ELEMENTS OF FICTION.
BLAST: A Case Study Lecture 25. BLAST: Introduction The Basic Local Alignment Search Tool, BLAST, is a fast approach to finding similar strings of characters.
Lecture 8: 24/5/1435 Genetic Algorithms Lecturer/ Kawther Abas 363CS – Artificial Intelligence.
Genetic Algorithms by using MapReduce
1 Chapters 6-8. UNIT 2 VOCABULARY – Chap 6 2 ( 2) THE NOTATION “P” REPRESENTS THE TRUE PROBABILITY OF AN EVENT HAPPENING, ACCORDING TO AN IDEAL DISTRIBUTION.
AP Statistics Section 11.1 A Basics of Significance Tests
Genetic Algorithms Michael J. Watts
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
A Genetic Solution to the Travelling Salesman Problem Ryan Honig.
Symmetric-Key Cryptography
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
CSCI 5857: Encoding and Encryption
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
CPSC 171 Introduction to Computer Science More Algorithm Discovery and Design.
Recursive Back Tracking & Dynamic Programming Lecture 7.
Learning by Simulating Evolution Artificial Intelligence CSMC February 21, 2002.
Evolution Programs (insert catchy subtitle here).
The Zodiac Killer Background on Unsolved 340-cipher Ryan Garlick.
By: Anna-Grace Cary PERSPECTIVE. INTRODUCTION Dear Reader, My book, To Kill A Mockingbird, talked a lot about perspective. Atticus did this very often.
For Friday Finish chapter 6 Program 1, Milestone 1 due.
Exhaustion, Branch and Bound, Divide and Conquer.
Genetic Algorithms and Machine Learning Brent Harrison.
Genetic Algorithms CSCI-2300 Introduction to Algorithms
1 Running Experiments for Your Term Projects Dana S. Nau CMSC 722, AI Planning University of Maryland Lecture slides for Automated Planning: Theory and.
Optimization Problems
1 Types of Evidence. 2 Classification of Evidence Testimonial evidence is a statement made under oath; also known as direct evidence or prima facie (pree-mah.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Genetic Algorithms MITM613 (Intelligent Systems).
Finding the Mean David R. David N.. Mean The average of the numbers in a set of data is the mean.
Graph Search II GAM 376 Robin Burke. Outline Homework #3 Graph search review DFS, BFS A* search Iterative beam search IA* search Search in turn-based.
HANGMAN OPTIMIZATION Kyle Anderson, Sean Barton and Brandyn Deffinbaugh.
1 Contents 1. Basic Concepts 2. Algorithm 3. Practical considerations Genetic Algorithm (GA)
How to do Research 3 rd Grade. How to do Research Did you know that you can access "all the information in the known galaxies"? It's true! In libraries.
Artificial Intelligence By Mr. Ejaz CIIT Sahiwal Evolutionary Computation.
Advanced AI – Session 7 Genetic Algorithm By: H.Nematzadeh.
Genetic (Evolutionary) Algorithms CEE 6410 David Rosenberg “Natural Selection or the Survival of the Fittest.” -- Charles Darwin.
Evolution Strategies Evolutionary Programming
The Zodiac Killer.
Homophonic Substitution Ciphers Cracking the Code of a Killer
The Zodiac Killer Toska Ymerhalili.
Design & Analysis of Algorithms Combinatorial optimization
Game review By ?.
Presentation transcript:

Background on Unsolved 340-cipher Ryan Garlick The Zodiac Killer Background on Unsolved 340-cipher Ryan Garlick

Background The Zodiac was a serial killer active in California during the late 1960’s and early 1970’s. He definitely killed 5 people and claimed 37 victims. He taunted the police in over 20 letters and ciphers

July 4, 1969 Mike Mageau and Darlene Ferrin Parked at a Lover’s Lane Darlene was killed and Mike seriously wounded Gunman approached and shot without saying a word

July 31, 1969 Zodiac mails very similar handwritten letters to 3 newspapers in northern California…

July 31, 1969 Each newspaper also received a different cipher Vallejo Times-Herald received

Solved by… CIA? NSA? The California Department of Justice? FBI? Office of Naval Intelligence?

Solved by High school history teacher Donald Harden and his wife Betty at their breakfast table.

Cipher Details The Cipher was a homophonic substitution cipher Δ = ‘S’, etc. Homophones – more than one symbol represents ‘S’. Throws off statistical analysis

I LIKE KILLING PEOPLE BECAUSE IT IS SO MUCH FUN IT IS MORE FUN THAN KILLING WILD GAME IN THE FORREST BECAUSE MAN IS THE MOST DANGEROUE ANIMAL OF ALL TO KILL SOMETHING GIVES ME THE MOST THRILLING EXPERENCE IT IS EVEN BETTER THAN GETTING YOUR ROCKS OFF WITH A GIRL THE BEST PART IS THAE WHEN I DIE I WILL BE REBORN IN PARADICE AND ALL THE I HAVE KILLED WILL BECOME MY SLAVES I WILL NOT GIVE YOU MY NAME BECAUSE YOU WILL TRY TO SLOI DOWN OR STOP MY COLLECTING OF SLAVES FOR MY AFTERLIFE EBEORIETEMETHHPITI

Oct. 11, 1969 Cab driver Paul Stine killed in San Francisco

2 Days later Another letter

Nov. 8, 1969

The “Dripping pen” card included this 340 character cipher

Assumptions Another substitution cipher? Left to right? Meaningless? Polyalphabetic? Symbols mean different things for each occurrence in the cipher Book cipher?

Naïve Brute Force 26^63 possible keys Then all possible word combinations x = min number of words + 1, y = max + 1

We can do much better Not all symbols represent ‘A’ Max number of mappings per symbol Don’t need to generate every possible word Scan for digrams, trigrams Total word count Use his previous vocabulary – 22 letters

Scoring What is a ‘good’ solution? Word count Bigrams and trigrams Frequency distribution – Zodiac may have thrown this off with junk at the end like on 408 (solved) cipher Combination

Still a lot of work Distribute the problem Other optimizations Your ideas

Genetic Algorithm Heuristic method Directed search “Evolve” the key Many parameters – population size, mutation rate, % of pop to discard, etc.

EM Algorithm Expectation Maximization Bigram probabilities for the entire cipher

Brute Force Intractable Many computers running keys The “testbed” for our key scoring Keeping good keys, return them to a key server We could get (very) lucky - stranger things have happened!

Distributed Key processing Key server EM client GA client Human Reader Brute client

Sources zodiackiller.com Robert Graysmith, Zodiac Kevin Knight @ USC – EM algorithm