Sherlock Holmes and the adventures of the dancing men

Size: px
Start display at page:

Download "Sherlock Holmes and the adventures of the dancing men"

Transcription

1 Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is a pair of algorithms that create the encryption (the process of converting ordinary information into unintelligible gibberish) and the reversing decryption - all using a secret key. Without knowing the secret key, it is difficult, if not nearly impossible, to decrypt the message. In this workshop, students will get acquainted with many different kinds of ciphers. We will start off by introducing historical ciphers, such as scytale transposition cipher claimed to have been used by the Spartan military and Caesar substitution cipher, used by its namesake to communicate with his generals during his military campaigns. We will then discuss the Vigenère cipher - a combination of 26 possible Caesar ciphers. We will then proceed to introduce the transposition ciphers in which the letters remain unchanged, but message is scrambled in a sophisticated way. We will analyze all the ciphers and learn how to break them. 2 Instructions and explanation of the format Below you will see detailed explanation of the material that should be presented to the students as well as various activities and challenges. Activities are for the students to practice the material. Brainstorm idea are for you to suggest or get from the audience and discuss. Extra activities are bonus in case some students work faster than others, these will prevent students from getting bored. Challenges are rewarded by clues to the mega puzzle! 1

2 The mega puzzle consists of the attached clues of dancing men. Students are told (in a skit or otherwise) that they are privy to secret communication between imprisoned Augustus Carmichael and Slippery Pete, his pirate partner on the outside. At the very beginning students are given the first two lines of the code. After completing the first challenge, the students are given the rest of the first page of clues. After completing the second challenge, the students are told that flags represent the ends of words (you will have to draw those in before photocopying the clues!!). After completing the third challenge, the students are given the final clue. The clues read: I hid the treasure at UVic. Keep it a secret. Make sure you are not followed. Tell pirate the password to get the map. Password is vacuum. (Do not forget to draw flags in!) After telling the pirate (someone will have to dress up), the pirate gives them the campus map where X makes the spot where treasure (aka candy) is hidden. 3 Substitution ciphers Idea: each letter that you want to encipher is substituted by another letter or symbol, but the order in which the letter appear is kept the same. Example 1 (Caesar cipher). Julius Caesar ( BC) used this cipher in government communications. This cipher was less strong than other methods, by a small amount, but in a day when few people read in the first place, it was good enough. Activity 1. Decipher the following: D pdwkhpdwlfldq lv d ghylfh iru wxuqlqj friihh lqwr wkhruhpv. (A mathematician is a device for turning coffee into theorems.) Brainstorm ideas: Look for short words first; there are only two one-letter words in English and very few two-letter words (what are they?). Also, each word in English must have a vowel in it. Look for doubled letters. Frequent doubles are ss, ll, oo, ee, nn, pp. Hardly ever do you see aa or yy, and uu (unless the message happens to be about vacuums!) A more advanced technique is called frequency analysis, which is used to break ANY simple substitution cipher. To use this, count the occurrences of each of 2

3 the letters in the ciphertext (e.g., 17 X s, 12B s, 9 C s, 7 P s, etc.). Then look at a standard English frequency table. Activity 2. How can we make encoding faster with Caesar cipher? ideas. Create cipher disk. Brainstorm Challenge 1. Work as a team. Use cipher disk for speed to decipher the following: Zngu vf ab zber pbzchgngvba guna glcvat vf yvgrengher. (Math is no more computation than typing is literature.) Extra activity 1 (Atbash cipher). The cipher used in this message is another substitution cipher. It s not a rotation of the alphabet, so you cannot use the cipher disk. There is, however, a pattern to it (the alphabet is reveresed). Decipher the following: LYERLFH RH GSV NLHG WZMTVILFH DLIW RM NZGSVNZGRXH (Obvious is the most dangerous word in mathematics) Questions for thought: What if you didn t have any word breaks? Use frequency analysis. What else would make this harder to break? Since frequency analysis uses the fact that letters (like e ) are repeated regularly, you can instead replace e with several different symbols (say, 12 of them), so that each symbol only shows up one percent of the time. If you do this for the highest frequency letters, the cipher is much harder to crack! You can also have entire words replaced by certain symbols, especially ones that come up often and contain high-frequency letters (the words the and and, for example) or you can replace important words (like midnight if you message was attack at midnight ). That way, the frequency analysis is thrown off and some words remain hidden even after most of the cipher is broken. Another option is to insert nulls symbols that don t stand for anything at all! If you have a wide enough variety of nulls in your cipher, it can be pretty hard to crack! 3

4 4 Vigenère cipher Above ciphers are monoalphabetic substitution ciphers - ones which were encoded using only one fixed alphabet (hence the Greek root mono meaning one ). As we saw, especially when the spaces between words are still there, these are fairly easy to break. So, how can you make this harder? Use more than one alphabet, switching between them systematically! This type of cipher is called a polyalphabetic substitution cipher ( poly is the Greek root for many ). The difference is that frequency analysis no longer works the same way to break these. One such cipher is the famous Vigenère cipher, which was thought to be unbreakable for almost 300 years! It uses the power of 26 possible shift ciphers. How this Cipher Works: Pick a keyword (for our example, the keyword will be MEC ). Write your keyword across the top of the text you want to encipher, repeating it as many times as necessary. Now each block of 3 letters is shifted by a key-word. Word MEC consists of the 13th, 5th, and 3rd letters of the alphabet, then the first letter of the message is shifted by 13, the second letter is shifted by 5, the third by 3, the fourth by 13 (here we return to the beginning of the key-word), the fifth by 5, and so on. (Alternatively, use the Vigenère table for faster lookup or a slide ruler). Example: M E C M E C M E C M E C M E C M E C M E C M w e n e e d m o r e s u p p l i e s f a s t I I P Q I F Y S T Q W W B T N U I U R E U F So, as you can see, the letter e is enciphered sometimes as an I and sometimes as a Q. Not only that, but I represents two different letters, sometimes a w and sometimes an e. This renders our favorite tool, frequency analysis, nearly useless. Even though e is used very often in the plaintext, the letters that replace it ( I and Q ) don t show up as frequently. Also, now if we check doubled letters in the ciphertext (say II or WW ), these are not doubled letters in the plaintext. 4

5 You may, then, ask yourself is there any hope? Fortunately, there is! Given a long enough piece of ciphertext, certain words or parts of words (like the ) will line up with the keyword several times, giving rise to a repeated string of letters in the ciphertext. This can give us a clue as to the length of the keyword. After that, we can use frequency analysis on each piece that was enciphered with the same letter to crack the code. Consequently, cracking these ciphers hinges on finding repeated strings of letters in the ciphertext. Challenge 2. Give them first ciphertext and first key. They bring back ciphertext. Give them second key. They bring back final plaintext. H O C U S P O C U S - first ciphertext h b c t a p e y s m - first key O P E N S E S A M E - second ciphertext e t i f i h i b w i - second key S I M S A L A B I M - final answer Extra activity 2 (Keyed cipher disk). You can use a key for the construction of cipher disk and, hence, a modification of both Caesar and Vigenère ciphers. Pick a word with no repeated letters, for example CIPHER. On the inner disk, instead of standard alphabet, first write the keyword and then write the remaining letters of the alphabet. So on our inner disk we will have: CIPHERABDFGJKLMNOQSTU- VWXYZ. Now you have to be more careful shifting. Decipher the following keyed Caesar cipher: Uwtaofq ifoo xyryfd lx krog xtocfd (Problem well stated is half solved) 5 Transposition ciphers Recall that substitution ciphers are ones in which each letter is replaced by another letter (or symbol) in some systematic way. However, the order in which the letters appear stays the same. In transposition ciphers, the letters stay the same, but the order is all mixed up. 5

6 One of the oldest ways to do this was created by the ancient Egyptians and Greeks. It uses a stick called scytale. The Spartans used this rather extensively - all the generals had same diameter sticks. It is easy to crack: steal a general s scytale or just try different ones. Better yet - we can crack it using math! As it ends up, the scytale is just a very old version of a greater class of ciphers called matrix transposition ciphers. Pick a matrix of a fixed size, write your message across the rows. Then read down the columns instead. Here s a simple example Troops heading west need water ): T R O O P S H E A D I N G W E S T N E E D W A T E R So the ciphertext is TEEWRASAODTTOINEPNERSGEHWD. How to crack it: Count how many letters are in the ciphertext (in this example it s 26) Make all of the matrices that would fit such a length (here it is 2x13, 3x9, 4x7, 5x6). Use two of each size - one vertical and one horizontal. Now it s trial and error. For each size matrix, write out the ciphertext across the columns. See if you can find anything legible, reading across the rows. Challenge 3. Use matrix method to decipher the following: Mowpatoeintplnndlshlleawlseebwshiaafutky (Millions saw the apple fall, but Newton asked why.) Extra activity 3 (Columnar transposition). As above in transpositions cipher, the message is written out in rows of a fixed length (use extra random letters in the end if need be) and then read out again column by column, but this time the columns are chosen in some scrambled order. So, say your keyword is CIPHER. The permutations of columns is defined by the alphabetical order of the letters in the keyword. In this case, the order would be , so you read first column first, then 5th column, then 4th and so on. To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length. Then he can write the message out in columns again, then re-order the columns by reforming the key 6

7 word. Try to make a message to see how it works. Then decipher the following that used keyword CIPHER: Peslteeclnveteieaitmtrdtalalbyrrrlcyuayeleaehvs (Parallel lines actually meet, but they are very discrete.) Questions for thought: How can we make it harder still? Use Double Transposition - two applications of columnar transposition to a message. The two applications may use the same key for each of the two steps, or they may use different keys. It s harder to break, but possible if attacker intercepted two or more messages of the same length using the same key. During World War I, the German military used a double columnar transposition cipher, changing the keys infrequently. The system was regularly solved by the French, naming it Ubchi, who were typically able to quickly find the keys once they d intercepted a number of messages of the same length, which generally took only a few days. However, the French success became widely-known, and the Germans changed to a new system on 18 November During World War II, the double transposition cipher was used by Dutch Resistance groups, the French Maquis and the British Special Operations Executive (SOE). It was also used by agents of the American Office of Strategic Services and as an emergency cipher for the German Army and Navy. Until the invention of the VIC cipher, double transposition was generally regarded as the most complicated cipher that an agent could operate reliably under difficult field conditions. 7

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Code-makers & Codebreakers. Substitution ciphers and frequency analysis Code-makers & Codebreakers Substitution ciphers and frequency analysis Introductiion to Substiitutiion Ciiphers Author: Will Mitchell william.mitchell@ic.ac.uk A substitution cipher replaces each letter

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

Substitution cipher. Contents

Substitution cipher. Contents Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters

More information

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. Cryptography Assign. 1A Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. How to Encipher- Each letter is assigned a number beginning from k

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) Department of Software The University of Babylon LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. Rotating Grille Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. An even number of cells on each side of grille

More information

CSc 466/566. Computer Security. 4 : Cryptography Introduction

CSc 466/566. Computer Security. 4 : Cryptography Introduction 1/51 CSc 466/566 Computer Security 4 : Cryptography Introduction Version: 2012/02/06 16:06:05 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn 1967 2 Early Cryptology - India Secret writing was well known and practiced in India

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the Baldwin 1 Erin Baldwin Dr. Bruff FYWS Cryptology October 27, 2010 Playfair Cipher From the earliest forms of stenography to the most advanced forms of encryption, the field of cryptography has advanced

More information

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015 Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

Most people familiar with codes and cryptography have at least heard of the German

Most people familiar with codes and cryptography have at least heard of the German Hunt 1 John Hunt Professor Derek Bruff FYWS Cryptography 28 October 2010 Most people familiar with codes and cryptography have at least heard of the German Enigma Machines. However, very few people have

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher INTRODUCTION INTRODUCTION For centuries, some people, organisations and governments have wanted to send information secretly. Different ways of sending secret messages have been developed over time but

More information

NUMB3RS Activity: Coded Messages. Episode: The Mole

NUMB3RS Activity: Coded Messages. Episode: The Mole Teacher Page 1 : Coded Messages Topic: Inverse Matrices Grade Level: 10-11 Objective: Students will learn how to apply inverse matrix multiplication to the coding of values. Time: 15 minutes Materials:

More information

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device 1 sur 5 17/04/2016 18:59 Le Sphinx Pocket cipher device Homepage Crypto Index Glossary Enigma Hagelin Fialka Siemens Philips Nema Racal Motorola STK Transvertex Gretag OMI HELL Telsy Teltron TST Mils AT&T

More information

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013 Grade School Crypto Part 1 Dr. Rick Smith, Cryptosmith October, 2013 What We ll Learn About Substitution ciphers, especially the Caesar Ciphers Algorithms and Keys Cipher Disks Cracking a cipher key using

More information

Hidden Codes and Grand Designs

Hidden Codes and Grand Designs Hidden Codes and Grand Designs A Code-breaker s Tour of Secret Societies Pierre Berloquin Copyright Pierre Berloquin 2 - HIDDEN CODES AND GRAND DESIGNS Introduction - 3 Introduction Writing about secret

More information

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1 30 March l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES Contents 1. Naval Enigma. 2. German Army and Air Force Enigma (including a few other miscellaneous devices). 3. Commercial Type Machines.

More information

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo Jian Chen Supervisor: Professor Jeffrey S. Rosenthal May 12, 2010 Abstract In this paper, we present the use of Markov Chain

More information

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication Courtney Hulse November 1, 2010 Dorabella Cipher Cryptography peppers the world s history as an aid to military communication and national strategizing. During the Second World War, cryptography was perhaps

More information

Appendix Cryptograms

Appendix Cryptograms Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is

More information

A reprint from American Scientist

A reprint from American Scientist A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to Permissions,

More information

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Attacking of Stream Cipher Systems Using a Genetic Algorithm Attacking of Stream Cipher Systems Using a Genetic Algorithm Hameed A. Younis (1) Wasan S. Awad (2) Ali A. Abd (3) (1) Department of Computer Science/ College of Science/ University of Basrah (2) Department

More information

Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36

Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36 AdChoices Zodiackillersite AddThis AdMeld Criteo Google Adsense Quantcast "D GAIK IS R GYKE" Author Message Daniel Gillotti Subject: "D GAIK IS R GYKE" Mon Jan 30, 2012 4:22 pm I wanted to add a drawing

More information

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2] CRYPTOLOGY Notes & Cryptology is the study of 'hidden writing', but is more generally thought of as being to do with codes and ciphers. It involves working with both language and mathematics. For that

More information

V.Sorge/E.Ritter, Handout 5

V.Sorge/E.Ritter, Handout 5 06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 5 Summary of this handout: Stream Ciphers RC4 Linear Feedback Shift Registers

More information

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS SUMMARY Lecture 15 considers the role and influence that statistics and probability

More information

Many books on cryptography were published prior to the 1609

Many books on cryptography were published prior to the 1609 Early Cryptology N accurate assessment of a proposed cryptogram in the work of "Shake-speare" can only take place when the evidence is judged in the light of both the history and techniques of cryptology.

More information

Authors crack the Bard's code

Authors crack the Bard's code The Australian Higher Education Supplement WED 19 JUL 2006, Page 028-029 theaustralian.com.au/highereducation Authors crack the Bard's code Bruce Leyland and James Goding assess the latest attempt, this

More information

cryptography, plaintext; ciphertext. key,

cryptography, plaintext; ciphertext. key, Cryptography C omputers are most valuable when they are used to solve problems that humans cannot easily solve for themselves. Charles Babbage, for example, wanted to automate the production of mathematical

More information

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing Zhang Tongbo ztb5129@live.com Li Guangli calculatinggod@foxmail.com

More information

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME 1 V.RAJENDRAN, 2 DR.T.PURUSOTHAMAN 1 Research Scholar, Anna university, Coimbatore, Tamilnadu, India. 2 Faculty Of

More information

Key-based scrambling for secure image communication

Key-based scrambling for secure image communication University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication

More information

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI DSM (Department of Mathematical Sciences) University of Trieste, 34100 Trieste (Italy)

More information

The Paper Enigma Machine

The Paper Enigma Machine The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION Fluctuation and Noise Letters Vol. 4, No. 2 (2004) C1 C5 c World Scientific Publishing Company NON-REKLE DT ENCRYPTION WITH CLSSICL INFORMTION LSZLO. KISH and SWMINTHN SETHURMN Texas &M University, Department

More information

epic.hunt epic.two Solutions Thursday Night Teaser

epic.hunt epic.two Solutions Thursday Night Teaser Thursday Night Teaser Three questions just to lure you into a false sense of security Question 1) My first is in "Pea" but not in "Canoe". What am I? Answer - This was a simple "Google it" question, to

More information

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model Perfect Security of the Cipher in the Delphic Model La spatialisation de Poisson de Pharse à Trappes TELECOM ParisTech david.madore@enst.fr http://perso.enst.fr/~madore/ 2008-W14-2 1/16 1 Background on

More information

How I Broke the Confederate Code (137 Years Too Late)

How I Broke the Confederate Code (137 Years Too Late) Cryptologia, 30:340 345, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190600826729 How I Broke the Confederate Code (137 Years Too Late) KENT D. BOKLAN Abstract We

More information

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7 Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting

More information

Create Your SAMPLE. Penmanship Pages! Featuring: Abeka Manuscript Font. By Sheri Graham

Create Your SAMPLE. Penmanship Pages! Featuring: Abeka Manuscript Font. By Sheri Graham Create Your Own Penmanship Pages! SAMPLE Featuring: Abeka Manuscript Font By Sheri Graham Create Your Own Penmanship Pages! Featuring: Abeka Manuscript Font By: Sheri Graham Published in the United States

More information

Cabinet War Rooms SIGSALY. The A-3 scrambler

Cabinet War Rooms SIGSALY. The A-3 scrambler F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies

More information

Ciphers that Substitute Symbols

Ciphers that Substitute Symbols Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols I Δ ℵ Ω Δ ℵ Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less

More information

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové Michal Musílek Faculty of Science University of Hradec Kralove Rokitanskeho 62, Hradec Kralove michal.musilek@uhk.cz

More information

MATH& 146 Lesson 11. Section 1.6 Categorical Data

MATH& 146 Lesson 11. Section 1.6 Categorical Data MATH& 146 Lesson 11 Section 1.6 Categorical Data 1 Frequency The first step to organizing categorical data is to count the number of data values there are in each category of interest. We can organize

More information

Senior Math Studies Lesson Planning Date Lesson Events

Senior Math Studies Lesson Planning Date Lesson Events Senior Math Studies Lesson Planning 2014-2015 Date Lesson Events Aug 25 Style of Class: Student-led work teams (SLWTs) Facilitated (as opposed to taught) by the teacher Considering MS topics what areas

More information

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University CRYPTOGRAPHY IN CREATIVE MEDIA by Olivia Grace Vanarthos Honors Thesis Appalachian State University Submitted to The Honors College in partial fulfillment of the requirements for the degree of Bachelor

More information

Update to 8 June 2011 Press Release

Update to 8 June 2011 Press Release 19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages

More information

21.1. Unit 21. Hardware Acceleration

21.1. Unit 21. Hardware Acceleration 21.1 Unit 21 Hardware Acceleration 21.2 Motivation When designing hardware we have nearly unlimited control and parallelism at our disposal We can create structures that may dramatically improve performance

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms Ralph Morelli and Ralph Walde Computer Science Department Trinity College Hartford, CT 06106 ralph.morelli@trincoll.edu Abstract This

More information

Book Review of Rosenhouse, The Monty Hall Problem. Leslie Burkholder 1

Book Review of Rosenhouse, The Monty Hall Problem. Leslie Burkholder 1 Book Review of Rosenhouse, The Monty Hall Problem Leslie Burkholder 1 The Monty Hall Problem, Jason Rosenhouse, New York, Oxford University Press, 2009, xii, 195 pp, US $24.95, ISBN 978-0-19-5#6789-8 (Source

More information

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Vinod Kumar,Santosh kr Upadhyay,Satyam Kishore Mishra,Devesh Singh Abstract In this paper we are presenting

More information

The Number Devil: A Mathematical Adventure -By Hans Magnus Enzensberger 2 nd 9 wks Honors Math Journal Project Mrs. C. Thompson's Math Class

The Number Devil: A Mathematical Adventure -By Hans Magnus Enzensberger 2 nd 9 wks Honors Math Journal Project Mrs. C. Thompson's Math Class The Number Devil: A Mathematical Adventure -By Hans Magnus Enzensberger 2 nd 9 wks Honors Math Journal Project Mrs. C. Thompson's Math Class DUE: Tuesday, December 12, 2017 1. First, you need to create

More information

Problem 5 Example Solutions

Problem 5 Example Solutions Problem 5 Example Solutions This document provides pictures of a working Tynker program for both game options described. Keep in mind that these are example solutions. Problems can be solved computationally

More information

Force & Motion 4-5: ArithMachines

Force & Motion 4-5: ArithMachines Force & Motion 4-5: ArithMachines Physical Science Comes Alive: Exploring Things that Go G. Benenson & J. Neujahr City Technology CCNY 212 650 8389 Overview Introduction In ArithMachines students develop

More information

Here s a question for you: What happens if we try to go the other way? For instance:

Here s a question for you: What happens if we try to go the other way? For instance: Prime Numbers It s pretty simple to multiply two numbers and get another number. Here s a question for you: What happens if we try to go the other way? For instance: With a little thinking remembering

More information

TRAVEL THROUGH TIME AND AROUND THE WORLD WITH JACK & ANNIE AND THEIR MAGIC TREE HOUSE

TRAVEL THROUGH TIME AND AROUND THE WORLD WITH JACK & ANNIE AND THEIR MAGIC TREE HOUSE TRAVEL THROUGH TIME AND AROUND THE WORLD WITH JACK & ANNIE AND THEIR MAGIC TREE HOUSE Dear Educator, Now in its eleventh year, our Summer Reading Program is an ongoing commitment to the communities we

More information

Stream Ciphers. Debdeep Mukhopadhyay

Stream Ciphers. Debdeep Mukhopadhyay Stream Ciphers Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -7232 Classifications Objectives Feedback Based Stream

More information

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

1.0: Introduction: 1.1: "Banburismus":

1.0: Introduction: 1.1: Banburismus: 1.0: Introduction: 60 years before this page was originally written, the cryptographers of Hut 8 (Naval Enigma) at Bletchley Park (BP) perfected "Banburismus", a unique statistical attack that would work

More information

COSC282 BIG DATA ANALYTICS FALL 2015 LECTURE 11 - OCT 21

COSC282 BIG DATA ANALYTICS FALL 2015 LECTURE 11 - OCT 21 COSC282 BIG DATA ANALYTICS FALL 2015 LECTURE 11 - OCT 21 1 Topics for Today Assignment 6 Vector Space Model Term Weighting Term Frequency Inverse Document Frequency Something about Assignment 6 Search

More information

Circle of Fifths - Introduction:

Circle of Fifths - Introduction: Circle of Fifths - Introduction: I don t consider myself a musician, although I enjoy music, and I don t count myself as an organist, but thoroughly enjoy playing the organ, which I first took up 10 years

More information

Foundations of Computing and Communication Lecture 5. The Universal Machine

Foundations of Computing and Communication Lecture 5. The Universal Machine Foundations of Computing and Communication Lecture 5 The Universal Machine Based on The Foundations of Computing and the Information Technology Age, Chapter 4 Lecture overheads c John Thornton 2010 Lecture

More information

CROATIAN OPEN COMPETITION IN INFORMATICS. 6 th ROUND

CROATIAN OPEN COMPETITION IN INFORMATICS. 6 th ROUND CROATIAN OPEN COMPETITION IN INFORMATICS 6 th ROUND COCI 2009/2010 Contest #6 - March 20, 2010 Task KAJAK 1 second / 2 MB / 0 points Mirko and Slavko are sports commentators on a local kayaking competition.

More information

Study Guide. Solutions to Selected Exercises. Foundations of Music and Musicianship with CD-ROM. 2nd Edition. David Damschroder

Study Guide. Solutions to Selected Exercises. Foundations of Music and Musicianship with CD-ROM. 2nd Edition. David Damschroder Study Guide Solutions to Selected Exercises Foundations of Music and Musicianship with CD-ROM 2nd Edition by David Damschroder Solutions to Selected Exercises 1 CHAPTER 1 P1-4 Do exercises a-c. Remember

More information

THE MONTY HALL PROBLEM

THE MONTY HALL PROBLEM University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln MAT Exam Expository Papers Math in the Middle Institute Partnership 7-2009 THE MONTY HALL PROBLEM Brian Johnson University

More information

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876

More information

Optimum Composite Field S-Boxes Aimed at AES

Optimum Composite Field S-Boxes Aimed at AES Optimum Composite Field S-Boxes Aimed at AES R.THILLAIKKARASI Assistant professor, Department Of ECE, Salem college of Engineering and technology. Salem, India. K.VAISHNAVI Post Graduate Student M.E Applied

More information

UNIT 1: DIGITAL LOGICAL CIRCUITS What is Digital Computer? OR Explain the block diagram of digital computers.

UNIT 1: DIGITAL LOGICAL CIRCUITS What is Digital Computer? OR Explain the block diagram of digital computers. UNIT 1: DIGITAL LOGICAL CIRCUITS What is Digital Computer? OR Explain the block diagram of digital computers. Digital computer is a digital system that performs various computational tasks. The word DIGITAL

More information

Proceedings of the Third International DERIVE/TI-92 Conference

Proceedings of the Third International DERIVE/TI-92 Conference Description of the TI-92 Plus Module Doing Advanced Mathematics with the TI-92 Plus Module Carl Leinbach Gettysburg College Bert Waits Ohio State University leinbach@cs.gettysburg.edu waitsb@math.ohio-state.edu

More information

Primes and Composites

Primes and Composites Primes and Composites The positive integers stand there, a continual and inevitable challenge to the curiosity of every healthy mind. It will be another million years, at least, before we understand the

More information

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography Derrick Erickson and Michael Hausman University of Colorado at Colorado Springs CS 591 Substitution Cipher 1. Remove all but

More information

Route optimization using Hungarian method combined with Dijkstra's in home health care services

Route optimization using Hungarian method combined with Dijkstra's in home health care services Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Route optimization using Hungarian method combined with Dijkstra's method in home health care services Abstract Monika Sharma

More information

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

Prime Num Generator - Maker Faire 2014

Prime Num Generator - Maker Faire 2014 Prime Num Generator - Maker Faire 2014 Experimenting with math in hardware Stanley Ng, Altera Synopsis The Prime Number Generator ( PNG ) counts from 1 to some number (273 million, on a Cyclone V C5 device)

More information

Performance Evaluation of Stream Ciphers on Large Databases

Performance Evaluation of Stream Ciphers on Large Databases IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 28 285 Performance Evaluation of Stream Ciphers on Large Databases Dr.M.Sikandar Hayat Khiyal Aihab Khan Saria

More information

UNIT III. Combinational Circuit- Block Diagram. Sequential Circuit- Block Diagram

UNIT III. Combinational Circuit- Block Diagram. Sequential Circuit- Block Diagram UNIT III INTRODUCTION In combinational logic circuits, the outputs at any instant of time depend only on the input signals present at that time. For a change in input, the output occurs immediately. Combinational

More information

THE HEROIC AGE OF EXPLORATION. Sample file

THE HEROIC AGE OF EXPLORATION. Sample file POLAR This Enrichment4You E-guide gives you: *A Brief History about mystery stories *Suggestions on how create a Polar Mystery Box based on the Polar Exploration series ENRICHMENT4YOU Published by Henrich

More information

Algebra I Module 2 Lessons 1 19

Algebra I Module 2 Lessons 1 19 Eureka Math 2015 2016 Algebra I Module 2 Lessons 1 19 Eureka Math, Published by the non-profit Great Minds. Copyright 2015 Great Minds. No part of this work may be reproduced, distributed, modified, sold,

More information

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T Technical Naval Museum of La Spezia Cultural Association Rover Joe A.R.M.I. Marine Amateur Radio Association A.R.I. Fidenza Italian Amateur Radio League ENIGMA RELOADED I N T E R N A T I O N A L E V E

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information