Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.

Slides:



Advertisements
Similar presentations
CAP Cryptographic Analysis Program
Advertisements

CAP Cryptographic Analysis Program
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
1 Codes, Ciphers, and Cryptography-Ch 3.1 Michael A. Karls Ball State University.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Introduction to Cryptography
Section 2.3: Substitution Ciphers Practice HW from Barr Textbook (not to hand in) p. 92 # 1, 2 # 3-5 (Use Internet Site)Use Internet Site.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Section 2.4 Transposition Ciphers Practice HW (not to hand in) From Barr Text p. 105 #
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Introduction to Cryptography
Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in.
Section 2.5 Polyaphabetic Substitutions
Section 2.3: Substitution Ciphers
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Divisibility.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
TRANSPOSITION CYPHER.
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
CAP Cryptographic Analysis Program
Classical Polygraphic Ciphers
Cryptography and Network Security
CS4780 Cryptography and Information Security
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Transposition Ciphers
Cryptography II Jagdish S. Gangolly School of Business
Fundamentals of Data Representation
Information Security IT423
Traditional Symmetric-Key Ciphers
Encryption Basics Types of ciphers Algorithms Modes Key Length
EKRJGTU CTG CYGUQOG! Can you break the code?.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Double Transpositions
. Columnar Transposition
Cryptanalysis Network Security.
Florida State University
Presentation transcript:

Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon by the sender and receiver. –In transposition ciphers, no new alphabet is created. The letters of the plaintext are just rearranged in some fashion…

Simple Types of Transposition Ciphers Rail Fence Cipher – The plaintext is written in a zig-zag pattern in two rows and form the ciphertext by reading off the letters from the first row followed by the second row. Example 1: Encipher “CHUCK NORRIS IS A TOUGH GUY” –Row 1: CUKORSSTUHU –Row 2: HCNRIIAOGGY –ciphertext: CUKORSSTUHUHCNRIIAOGGY To decipher a rail fence cipher, we divide the ciphertext in half and reverse the order of the steps of encipherment, that is, write the ciphertext in two rows and read off the plaintext in zig-zag fashion. (Note: if there are an odd number of letters, the first row has one more letter then the second) Example 2: Decipher the message “CITAT ODABT UHROE ELNES WOMYE OGEHW VR…Example 2

Simple Types of Transposition Ciphers Simple Columnar Transpositions – The Rail Fence Cipher is a special case of this. (The Rail Fence has n / 2 or n / columns) You use two or more columns to do the same thing. You first agree on the number of columns. Example 3: Encipher “THE JOKER SAID THAT IT WAS ALL PART OF THE PLAN” as a 5 column transposition cipher.Example 3 Example 4: Decipher TOTBA AUJAA KMHKO ANTAU FKEEE LTTYR SRLHJ RDMHO ETEII which was enciphered using a 4 column transposition:Example 4 In general, given a simple column transposition with n letters and c columns, then there are n / c rows if the remainder is 0, and n / c + 1 rows, with r columns have n / c + 1 entries, and c – r columns having n / c. –Example 5: Suppose n = 50, c = 9. Then there are 50 / = 6 rows. The last row will have 5 letters in it. The first 5 columns will each have 6 letters, and the last 4 columns will have 5…

Keyword Columnar Transposition Suppose that we use the keyword TUCKER (student from 2011 class). –This keyword has six letters in it. That means that there are six columns, and each column must have the same number of letters. (See below about what to do if letters repeat) Therefore, we may need to add fill letters at the end of the message so that the length of the message is divisible by 6. Let us suppose that we want to transmit the message: “THE STUDENT MENTIONED ABOVE IS A SENIOR AT PULASKI HIGH SCHOOL.” –This message has 52 letters in it. To be divisible by six we must add 2 letter to the message as fill letters. We will use ZZ. –Write the message in rows with 6 letters for each row. (The word document explains how to handle repeated letters).message The message sent is: “ENIBARAGOTMNVETKSZSTOOSASHLUEEENPICZTDNDIIUHHHETASOLIO”. To decipher, given that you know the keyword: –Write out the keyword. –Divide the ciphertext into columns of equal letters (use the keyword to get the length of each column). –Put the first column of letters under the letter in the keyword that comes alphabetically first. –Put the second column of letters under the letter in the keyword that comes second. Etc...

ADFGX During World War 1 most of the world was using either substitution or transposition ciphers to encrypt messages. –In March 1918 Germany began using ADFGX. It was invented by Colonel Fritz Nebel a Signals Officer… These particular letters were chosen because they were very different and could not be confused when using Morse Code.

ADFGX Two step process: –Step 1: Create a 5x5 table with ADFGX along the top and similarly along the side. Example: (See below and to the right) This table was created randomly. The letters I and J are interchangeable. (There are 26 letters and only 25 slots.) –Step 2: Apply a substitution or transposition cipher. Example…Example

ADFGX Historically –Germans thought the code was unbreakable. –It was broken by French Army Lieutenant Georges Painvin. –Probably contributed to Germany’s ill-fated 1918 Sring Offensive. –Painvin (who was already slender) spent many hours during a 3 month period breaking ADFGX and ADFGVX codes. He lost 33 pounds and had to go through rehabilitation…

ADFGVX Similar to ADFGX except now you use 6 x 6 table. This allows for all letters and the digits 0-9. Assignments: 3.1 #1,4,8, and one of #1, #1, #3…!