Classical Cryptosystems - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

Classical Cryptosystems

Description:

Cracking Substitution Cipher. Identify Common Pairs Of Letters. ss, ee, tt, ff, ll, mm and oo ... Cracking Substitution Cipher. Tailor Made Frequency Tables ... – PowerPoint PPT presentation

Number of Views:137
Avg rating:3.0/5.0
Slides: 30
Provided by: pirun
Category:

less

Transcript and Presenter's Notes

Title: Classical Cryptosystems


1
Classical Cryptosystems
  • ??????? ????????

2
??????
  • Steganography
  • Substitution Ciphers
  • Transposition Techniques

3
Steganography
  • ???? Hidden or Covered writing
  • Stegotext
  • ??????????
  • ???????? http//chemistry.about.com/cs/howtos/ht/i
    nvisibleink3.htm
  • ??????????
  • Digital watermarking

4
Software
  • Camouflages
  • http//camouflage.unfiction.com/
  • Jphide

5
(No Transcript)
6
Encryption Techniques
  • Substitution
  • Transposition

7
Substitution Cipher
  • Monoalphabetic substitution
  • every occurrence of a particular plaintext letter
    is replaced by a ciphertext letter
  • Polyalphabetic substitution

8
Caesar Cipher
  • Replace A with D, B with E, ...
  • meet me after the toga party
  • phhw ph diwhu wkh wrjd sduwb
  • cE(p)(p3) mod 26
  • pD(c)(c-3) mod 26

9
Brute force cryptanalysis
  • 25 keys to try
  • BZDRZQ'R VHED LTRS AD ZANUD RTROHBHNM
  • http//www.simonsingh.net/The_Black_Chamber/caesar
    .html

10
Monoalphabetic Substitution Cipher
  • plain a b c d e ...
  • cipher d z i g n ...
  • 26! or 4x1026 possible keys

11
Frequency Analysis
  • e t a
  • q x j
  • http//www.simonsingh.net/The_Black_Chamber/freque
    ncyanalysis.html
  • http//www.simonsingh.net/The_Black_Chamber/freque
    ncypuzzle.htm

12
Cracking Substitution Cipher
  • Identify Common Pairs Of Letters
  • ss, ee, tt, ff, ll, mm and oo
  • Identify The Smallest Words First
  • a and I
  • of, to, in, it, is, be, as, at, so, we, he, by,
    or, on, do, if, me, my, up, an, go, no, us, am

http//www.simonsingh.net/The_Black_Chamber/hintsa
ndtips.htm
13
Cracking Substitution Cipher
  • Tailor Made Frequency Tables
  • If you know you are tackling a military message,
    you should use a frequency table generated from
    other military messages.
  • T9
  • 26 an - am - co
  • 9653 wolf - woke - yoke
  • Play The Guessing Game
  • crib a section of an enciphered message that
    can easily be guessed
  • 'In the name of God'
  • Arab cryptanalyst vs Greek

http//www.simonsingh.net/The_Black_Chamber/hintsa
ndtips.htm
14
Pigpen Cipher
15
Pigpen Cipher
?????? Singh, The Code Book
16
Mary Queen of Scots
Nomenclator
?????? Singh, The Code Book
17
Mary Queen of Scots
?????? Singh, The Code Book
18
Playfair Cipher
  • Best known multiple-letter encryption
  • Key
  • Matrix
  • i,j treated as one letter
  • Plaintext
  • Encryption
  • Different row or column
  • Same row (its right)
  • Same column (below it)

19
????????
  • key
  • playfair
  • plaintext
  • meet at the schoolhouse
  • ciphertext
  • eg mn fq qm kn bk sv vr gq xn ku

20
National Treasure Book of Secrets
  • ME IK QO TX CQ TE ZX CO MW QC TE HN FB IK ME HA
    KR QC UN GI KM AV
  • DEATH

http//www.caesarcipher.com/2008/09/14/the-playfai
r-cipher-in-national-treasure-book-of-secrets/
21
Relative Freq of Occurrence of Letters
?????? Stalling, Cryptography and Network Security
22
Playfair Cipher Weakness
  • digram frequency
  • th he an in re es

23
Polyalphabetic Substitution
  • use different monoalphabetic substitutions as
    proceeds through the plaintext
  • key
  • choose monoalphabetic substitution
  • Cipher
  • Vigenère

24
Vigenère table
  • ABCDEFGHIJKLMNOPQRSTUVWXYZ BCDEFGHIJKLMNOPQRSTUV
    WXYZA CDEFGHIJKLMNOPQRSTUVWXYZAB
    DEFGHIJKLMNOPQRSTUVWXYZABC EFGHIJKLMNOPQRSTUVWXY
    ZABCD FGHIJKLMNOPQRSTUVWXYZABCDE
    GHIJKLMNOPQRSTUVWXYZABCDEF HIJKLMNOPQRSTUVWXYZAB
    CDEFG IJKLMNOPQRSTUVWXYZABCDEFGH
    JKLMNOPQRSTUVWXYZABCDEFGHI KLMNOPQRSTUVWXYZABCDE
    FGHIJ LMNOPQRSTUVWXYZABCDEFGHIJK
    MNOPQRSTUVWXYZABCDEFGHIJKL NOPQRSTUVWXYZABCDEFGH
    IJKLM OPQRSTUVWXYZABCDEFGHIJKLMN
    PQRSTUVWXYZABCDEFGHIJKLMNO QRSTUVWXYZABCDEFGHIJK
    LMNOP RSTUVWXYZABCDEFGHIJKLMNOPQ
    STUVWXYZABCDEFGHIJKLMNOPQR TUVWXYZABCDEFGHIJKLMN
    OPQRS UVWXYZABCDEFGHIJKLMNOPQRST
    VWXYZABCDEFGHIJKLMNOPQRSTU WXYZABCDEFGHIJKLMNOPQ
    RSTUV XYZABCDEFGHIJKLMNOPQRSTUVW
    YZABCDEFGHIJKLMNOPQRSTUVWX ZABCDEFGHIJKLMNOPQRST
    UVWXY

25
Cryptanalysis of Vigenère Cipher
  • Determine key length
  • if keyword length is n, n monoalphabetic
    substitution ciphers
  • Frequency

26
One-Time Pad
  • Vernam cipher
  • Theoretically unbreakable method of encryption
  • Has drawbacks in practice
  • A random key as long as the message

27
Rotor Machine
  • Multiple stage
  • ?????????? odometer
  • Single rotor defines a polyalphabetic
    substitution with a period of 26
  • Three rotor
  • 26x26x2617,578 different substitution alphabets
    before the system repeat
  • ??????? Enigma

28
Rotor Machine
?????? Stalling, Cryptography and Network Security
29
Transposition Technique
  • ???????????
  • Easy to recognize
  • Same frequency
  • Rail fence
  • m e m a t r h t g p r y e t e f e t e o a a t
  • Permute the order of column
  • ??????????????????????????
Write a Comment
User Comments (0)
About PowerShow.com