Top Banner
Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics
13

Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Classical CryptographyThe Jefferson cylinder The Enigma Rotor machine

Scytale

Hieroglyphics

Page 2: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Symmetric Cryptography

• Uses a single key for both encryption and decryption

• The encryption and decryption algorithms are inverses of each other

Page 3: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

Page 4: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCE

Page 5: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCEIKOB YT KJIB

Page 6: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Simple Substitution Ciphers (Monoalphabetic Ciphers)

A B C D E F G H I J K L M N O P Q R S T U V W X Y ZY M I H B A W C X V D N O J K U Q P R T F E L G Z S

\\COME AT ONCEIKOB YT KJIB• GIVE TO INGE• HAVE TO ACHE• SECT IN EAST

Page 7: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Methods for decrypting a simple substitution cipher:

• Brute force attack– key space of the substitution cipher = 26! ≈ 288

• Letter frequency analysis– determine the frequency of every ciphertext

letter– look at pairs , triples, or quadruples of

ciphertext symbols

Page 8: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Letter Frequency

The most common digrams (in descending order): th, he, in, en, nt, re, er, an, ti, es, on, at, se, nd, or, ar, al, te, co, de, to, raThe most common trigrams (in descending order): the, and, tha, ent, ing, ion, tio, for, nde, has, nce, edt, tis, oft, sth, men

Page 9: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Polyalphabetic Ciphers

• Encrypt multiple characters at a time• Relationship from plain to ciphertext is one-to-

many• Thwart statistical attacks

Page 10: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Polyalphabetic Ciphers

• Vigenère • Autokey• Playfair• Hill• One-time pad• Rotor• Enigma

Page 11: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Vigenère Cipher

• Let m be a positive integer (the key length)

• P = C = K = Z26 x ... x Z26 = (Z26) m

• For k = (k1, ..., km):

– ek(x1, ..., xm) = (x1 + k1 (mod 26), ..., xm

+ km (mod m))

– dk(y1, ..., ym) = (y1 - k1 (mod 26), ..., ym -

km (mod m))

Page 12: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

• AES• RSA

•The Future of Cryptography and Quantum Computing

Rivest, Shamir, and Adleman

Modern Cryptography

Page 13: Classical Cryptography The Jefferson cylinder The Enigma Rotor machine Scytale Hieroglyphics.

Average Time Required for Exhaustive Key Search