Vigenére Cipher Kimberly Chiffens & Maria Jannelli.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
January 6. January 7 January 8 January 9 January 10.
Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
Network Security Chapter
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
CS110: Computers and the Internet Encryption and Certificates.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Systems of Equations as Matrices and Hill Cipher.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Section 2.7: The Friedman and Kasiski Tests Practice HW (not to hand in) From Barr Text p. 1-4, 8.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Web Tools for Classical Cryptology Tristan Beeble.
1 Codes, Ciphers, and Cryptography-Ch 2.2 Michael A. Karls Ball State University.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
CAP Cryptographic Analysis Program
Asad Gondal Ali Haider Mansoor
Section 2.7 The Friedman and Kasiski Tests
Classical Polygraphic Ciphers
Nihilist Cipher.
Classical Cryptography
Classical Polyalphabetic Ciphers
Kasiski Method Reference
Cryptanalysis of Vigenere Cipher
Traditional Symmetric-Key Ciphers
Computer Security Chapter Two
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Vigenére Cipher Kimberly Chiffens & Maria Jannelli

Progress Report Implementation of Vigenere encryption and decryption Applet design Website design Implementation of Friedman attack which one way to find the key length in cryptanalysis

December: Finish introduction of the paper, Finish Kasiski implementation January: Start to implement the Cryptanalysis and finish draft of the paper February: Implement cryptanalysis March: Implement cryptanalysis April: Finish final project and paper Future Plans

Cryptanalysis Given only the Ciphertext, we must find the Plaintext and the key The first step in doing this is finding the KEY LENGTH Two ways to find this key length is: Friedman Attack implementation Kasiski Attack implementation

Friedman Attack The goal is to find the key length Uses frequencies to count the amount of each letter in the ciphertext We multiply the count of each letter by count minus 1 and then add up the sum. It computes the sum of the frequencies as follows: for(int k = 0; k < 26; k++) sum = sum + Fcount[k]*(Fcount[k]-1); }

Friedman Attack We then find the index of coincidence To find this we divide the entire sum of the frequencies with the length of the cipher times the length minus 1. index= sum/(lc*(lc-1));, where lc is the length Then we must calculate the key length. To do so we use this equation: keyword2= ((0.0265*lc)/(( index)+(lc*(index ))));

Ciphertext: OAKKADKMFCRBCKBOMTTITMIF Frequencies: Length = 24 letters Sum of frequencies = Σ letterCount*(letterCount-1) Key: Cat Plaintext: mariakimmariakimmariakim ABCDEFGHIJKLMNOPQRSTUVWXYZ Friedman Example

Program Demonstration Ciphertext: KSEUOBHCSABMBSGBCLHCSATYLSLXHNJGRNRMWGMVSMCVCADJJQCOCPRTGCKC ASUQSPNWRRGLXHWXIKRUFCRGBZGTSWXIPWCQNOJXHGVOERBCRTWXIPYFCLW MDGLXGCFSPNGYWRURQFNRGWPCCKCNBWXIPCCCBHFJHAUSYAZWFCSUR8WCRK SYCFCJHDXFWXIBKSDXFANRRXGKNZJHCSATCNHWXIPWCQNKMDZBKSYBCSAQCXTB ASYMKCASGCORCOAQSBJHMYMMDFFNOBRHQXCLFCSURBAWTNMMDHMMSQYO GATMASTNFRRQIUSBKMWXIPQOGAKGCVGWMMDFCJFWXIPWCQNKMDZBKSYWO ZBCJDHCLORJGRACNQSDXFUQSLHCSFSPNCZUWENRRXGLNSXNMMDFZAOGWKMD ZBAORCZCOFMVHFNPPNSXNMMDFLXGCRBQCSYMHFACSPVRQWATOLMHFRBPNAY RBQKSRFSCWMMDFCHSQJBBLVGWBMCDYBHCMCLBCKNCRQSPYZYLSZNUJJRWXIP WCQNWQXBWXIPOOAN Key: joy

Plaintext: BEGLADYOURNOSEISONYOURFACENOTPASTEDONSOMEOTHERP LACEFORIFITWEREWHEREITISNOTYOUMIGHTDISLIKEYOURNOSE ALOTIMAGINEIFYOURPRECIOUSNOSEWERESANDWICHEDINBET WEENYOURTOESTHATCLEARLYWOULDTNOTBEATREATFORYOUD BEFORCEDTOSMELLYOURFEETYOURNOSEWOULDBEASOURCEOF DREADWEREITATTACHEDATOPYOURHEADITSOONWOULDDRIVE YOUTODESPAIRFOREVERTICKLEDBYYOURHAIRWITHINYOUREARY OURNOSEWOULDBEANABSOLUTECATASTROPHEFORWHENYOU WEREOBLIGEDTOSNEEZEYOURBRAINWOULDRATTLEFROMTHEB REEZEYOURNOSEINSTEADTHROUGHTHICKANDTHINREMAINSBE TWEENYOUREYESANDCHINNOTPASTEDONSOMEOTHERPLACEBE GLADYOURNOSEISONYOURFACE Deciphered

Kasiski Attack The goal is to find the key length Count the gaps between repeated trigrams in the ciphertext The key is a divisor of the GCDs of the gaps

Kasiski Attack Example Ciphertext: WCZOU QNAHY YEDBL WOSHM AUCER CELVE LXSSU ZLQWB SVYXA RRMJF IAWFN AHBZO UQNAH ULKHG YLWQI STBHW LJCYZ EIYWV YJPFN TQQYY IRNPH SHZOR WBSVY XAEEM JFIAW F -NAH repeated three times -There are 48 letters from the first occurrence of NAH to the second and 8 letters from the second to the third occurrence. -WBSVYZAEEMJFIAWF repeated twice -There are 72 letters between the long groups

· The greatest common divisor of 72,48, and 8 is 8 · The keyword length is likely to be 8, 4, or 2 · A 2 or 4 letter keyword offers little security so it is likely to have the keyword length of 8 Kasiski Attack Example

References Principles of Operating Systems: Design and Application, Brian L. Stuart. Course Technology Invitation to Cryptology, Thomas H. Barr. Prentice Hall