Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Size: px
Start display at page:

Download "Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography"

Transcription

1 Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn Early Cryptology - India Secret writing was well known and practiced in India India had a well organized espionage service - the country was riddled with spies The erotic textbook, the Kama-sutra, lists secret writing was one of the 64 arts that women should know and practice it is 45th in a list that begins with vocal music and runs through poetry 3 1

2 Early Cryptology - Hebrews Hebrew literature records three forms of letter substitutions atbah - the letters are numbered and the first nine are paired so that their value adds to 10, the remaining are paired so their value adds to 28 atbash - the last letter in the alphabet replaces the first, the next to the last replaces the second... albam - splits the alphabet in half and equates the two halves 4 The first recorded cryptographer was Early Cryptology - Greeks the Histories of Herodotus mention several methods of secret writing During a revolt against the Persians, word was sent by shaving the head of a slave, tattooing the message on his head and waiting for the hair to grow One of the most important messages in the history of early Western civilization was transmitted secretly. A Greek exile in Persia sent a warning 5 back to Sparta that Xerxes was going to invade Early Cryptology - English During the Middle Ages, cryptology, along with other arts and sciences, died out. The English monk, Roger Bacon, wrote about secret writing in the mid-1200 s (Secret Works of Art and the Nullity of Magic) Chaucer enciphered six short passages 6 2

3 Early Cryptosystems The Spartans were the first to use cryptography in the military They developed a device called a skytale it consists of a staff of wood around which a strip of papyrus or parchment is wrapped the secret message is written on the parchment down the length of the staff 7 when the parchment is unwrapped it appears Skytail Example T H I S I S F U N N Y Given the message: THIS IS FUNNY S T F H U I N S N I Y 8 Greek Cryptosystems The first text on cryptology was written by the Greeks a chapter in one of the earliest works on military science On the Defense of Fortified Places listed several systems One suggestion was to replace the vowels of the message with dots, one for alpha, two for epsilon, etc Another suggestion was to prick holes in a 9 3

4 Polybus Square Another Greek writer, Polybius, first suggested a method that is commonly used the letters are arranged in a square, numbering the rows and columns letters in a message are replaced by their row and column numbers a b c d e 2 f g h i k 3 l m n o p 4 q r s t u 5 v w x y z THIS Black Chambers As Europe began to emerge from the Dark Ages, governments began to build large networks of spies They would communicate with their agents using ciphers so it was only natural that organizations would be developed whose goal was to read the ciphers of other nations These organizations were called black chambers and they became quite common during the 1700s The best was the Austrian black chamber in Vienna 11 Vienna Black Chamber 1 At 7 a.m., the mail on its way to the embassies in Vienna was first brought to the black chamber the letters were opened by melting their seals with a candle important parts of the letters were copied they were replaced, resealed with forged seals, and returned to the post office by 9:30 a.m. At 10 a.m. mail passing through Vienna to other points on the continent arrived. It was opened, read, resealed, and returned by 2 p.m. 12 4

5 Vienna Black Chamber 2 At 11 a.m. interceptions made by the police arrived At 4 p.m. letters send out by the embassies were brought in, opened, read, resealed and returned by 6:30 p.m. Overall, this 10 man organization handled an average of 80 to 100 letters a day 13 England England also had a Black Chamber Started in the mid-1600 s by John Wallis, perhaps the greatest English mathematician before Newton 14 Were the Black Chambers Legal? The statute of 1657 which established the postal service declared outright that the mails were the best means of discovering dangerous and wicked designs against the commonwealth The Post Office Act of 1711 permitted the government to open mail under warrants that they themselves issued so the government issued all-inclusive general warrants this is the legal precedent for today s wiretaps 15 5

6 16 Secure Systems Ciphers are only part of a complete security package System Hardware/Software Protocol Process for multi-round message exchange OP: encipher,... Actual Transformation Cipher: DES, RSA,... Cipher Algorithms 17 A Good Cipher Enciphering and deciphering should be efficient for all keys - it should not take forever to get a message. Easy to use. The problem with hard to use cryptosystems is that mistakes tend to be made. The strength of the system should not lie in the secrecy of your algorithms. The strength of the system should only depend the secrecy of your key. Kerckhoffs' Principle 18 6

7 Cipher Classification Ciphers Public Key Symmetric Key Unkeyed PublicKey Signature ID Random OneWay Hash Random Signature MAC Symmetric Classical Stream Block Transposition Substitution 19 Cipher Environment The typical communication environment for discussing ciphers is plaintext Alice eavesdrop Bob Eve 20 Cipher System If Alice and Bob use a cipher system, this environment becomes: Alice plaintext cipher key ciphertext cipher eavesdrop plaintext key Bob Eve 21 7

8 A simple cipher 22 Example Cipher A substitution cipher is one in which each character in the plaintext is substituted for another character in the ciphertext The Caesar Cipher replaces each plaintext character by the character 3 positions to the plaintext right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext D E F G H I J K L M N O P Q R S T U V W X W Z A B C 23 Example Operation plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext D E F G H I J K L M N O P Q R S T U V W X Y Z A B C MESSAGE the word privacy does not appear in the united states constitution wkh zrug sulydfb grhv qrw dsshdu lq wkh xqlwhg vwdwhv frqvwlwxwlrq NOTE: the shift could be any value from 1 to 25 NOTE: It helps to remove spaces - WHY?? wkhzr ugsul ydfbg rhvqr wdssh dulqw khxql whgvw dwhvf rqvwl wxwlr q 24 8

9 Cryptanalysis How would you break the Caesar cipher? Try all 25 possible shifts This is easy to do by hand or by computer 25 Ciphertext Attacks There are five types of general attacks on a cipher designed to discover the key 1. ciphertext only: the cryptanalyst has only the cipher text 2. known-plaintext: the cryptanalyst knows both the ciphertext and its plaintext 3. chosen-plaintext: the cryptanalyst selects the plaintext used to create the ciphertext 4. adaptive-chosen-plaintext: the plaintext is selected based on previous plaintext-ciphertext pairs 5. chosen-ciphertext: the cryptanalyst selects the ciphertext to decode with known plaintext 26 9

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

Many books on cryptography were published prior to the 1609

Many books on cryptography were published prior to the 1609 Early Cryptology N accurate assessment of a proposed cryptogram in the work of "Shake-speare" can only take place when the evidence is judged in the light of both the history and techniques of cryptology.

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

CSc 466/566. Computer Security. 4 : Cryptography Introduction

CSc 466/566. Computer Security. 4 : Cryptography Introduction 1/51 CSc 466/566 Computer Security 4 : Cryptography Introduction Version: 2012/02/06 16:06:05 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015 Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children

More information

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU ) Special Edition for CSEDU Students TOUCH-N-PASS EXAM CRAM GUIDE SERIES CRYPTOGRAPHY Prepared By Sharafat Ibn Mollah Mosharraf CSE, DU 12 th Batch (2005 2005-2006 2006) Table of Contents CHAPTER 1: INTRODUCTION

More information

Cabinet War Rooms SIGSALY. The A-3 scrambler

Cabinet War Rooms SIGSALY. The A-3 scrambler F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies

More information

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the Baldwin 1 Erin Baldwin Dr. Bruff FYWS Cryptology October 27, 2010 Playfair Cipher From the earliest forms of stenography to the most advanced forms of encryption, the field of cryptography has advanced

More information

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

Most people familiar with codes and cryptography have at least heard of the German

Most people familiar with codes and cryptography have at least heard of the German Hunt 1 John Hunt Professor Derek Bruff FYWS Cryptography 28 October 2010 Most people familiar with codes and cryptography have at least heard of the German Enigma Machines. However, very few people have

More information

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. Cryptography Assign. 1A Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever. How to Encipher- Each letter is assigned a number beginning from k

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

A reprint from American Scientist

A reprint from American Scientist A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society This reprint is provided for personal and noncommercial use. For any other use, please send a request to Permissions,

More information

Substitution cipher. Contents

Substitution cipher. Contents Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters

More information

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. Rotating Grille Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. An even number of cells on each side of grille

More information

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013 Grade School Crypto Part 1 Dr. Rick Smith, Cryptosmith October, 2013 What We ll Learn About Substitution ciphers, especially the Caesar Ciphers Algorithms and Keys Cipher Disks Cracking a cipher key using

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

How I Broke the Confederate Code (137 Years Too Late)

How I Broke the Confederate Code (137 Years Too Late) Cryptologia, 30:340 345, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190600826729 How I Broke the Confederate Code (137 Years Too Late) KENT D. BOKLAN Abstract We

More information

Performance Evaluation of Stream Ciphers on Large Databases

Performance Evaluation of Stream Ciphers on Large Databases IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 28 285 Performance Evaluation of Stream Ciphers on Large Databases Dr.M.Sikandar Hayat Khiyal Aihab Khan Saria

More information

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7 Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting

More information

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit Generators for Secure Broadcasting Systems +00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu

More information

Appendix Cryptograms

Appendix Cryptograms Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is

More information

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University CRYPTOGRAPHY IN CREATIVE MEDIA by Olivia Grace Vanarthos Honors Thesis Appalachian State University Submitted to The Honors College in partial fulfillment of the requirements for the degree of Bachelor

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Attacking of Stream Cipher Systems Using a Genetic Algorithm Attacking of Stream Cipher Systems Using a Genetic Algorithm Hameed A. Younis (1) Wasan S. Awad (2) Ali A. Abd (3) (1) Department of Computer Science/ College of Science/ University of Basrah (2) Department

More information

Permutation-based cryptography for the Internet of Things

Permutation-based cryptography for the Internet of Things Permutation-based cryptography for the Internet of Things Gilles Van Assche 1 Joint work with Guido Bertoni, Joan Daemen 1,2, Seth Hoffert, Michaël Peeters 1 and Ronny Van Keer 1 1 STMicroelectronics 2

More information

The Paper Enigma Machine

The Paper Enigma Machine The Paper Enigma Machine http://mckoss.com/crypto/enigma.htm Mike Koss mike04@mckoss.com Wednesday, April 28, 2004 Introduction Having been fascinated with codes and secret writing since I was young, I

More information

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME 1 V.RAJENDRAN, 2 DR.T.PURUSOTHAMAN 1 Research Scholar, Anna university, Coimbatore, Tamilnadu, India. 2 Faculty Of

More information

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing Zhang Tongbo ztb5129@live.com Li Guangli calculatinggod@foxmail.com

More information

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Code-makers & Codebreakers. Substitution ciphers and frequency analysis Code-makers & Codebreakers Substitution ciphers and frequency analysis Introductiion to Substiitutiion Ciiphers Author: Will Mitchell william.mitchell@ic.ac.uk A substitution cipher replaces each letter

More information

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

V.Sorge/E.Ritter, Handout 5

V.Sorge/E.Ritter, Handout 5 06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 5 Summary of this handout: Stream Ciphers RC4 Linear Feedback Shift Registers

More information

Facts and Myths of Enigma: Breaking Stereotypes

Facts and Myths of Enigma: Breaking Stereotypes Facts and Myths of Enigma: Breaking Stereotypes Kris Gaj 1 and Arkadiusz Oráowski 2 1 George Mason University, Electrical and Computer Engineering 4400 University Drive, Fairfax, VA 22030, U.S.A. kgaj@gmu.edu

More information

Ciphers that Substitute Symbols

Ciphers that Substitute Symbols Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols I Δ ℵ Ω Δ ℵ Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less

More information

cryptography, plaintext; ciphertext. key,

cryptography, plaintext; ciphertext. key, Cryptography C omputers are most valuable when they are used to solve problems that humans cannot easily solve for themselves. Charles Babbage, for example, wanted to automate the production of mathematical

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher INTRODUCTION INTRODUCTION For centuries, some people, organisations and governments have wanted to send information secretly. Different ways of sending secret messages have been developed over time but

More information

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University The Evolution of the Cryptologic Bombe Chris Christensen Department of Mathematics Northern Kentucky University Electronic Communications 1844 Samuel F. B. Morse: What hath God Wrought? Telegraph. 1876

More information

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Randomness analysis of A5/1 Stream Cipher for secure mobile communication Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Cryptography Through the Ages: A Layman's View

Cryptography Through the Ages: A Layman's View Internet-Technologien (CS262) History of Cryptography and Cryptanalysis 22. Mai 2013 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Cryptography Through the

More information

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI DSM (Department of Mathematical Sciences) University of Trieste, 34100 Trieste (Italy)

More information

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) Department of Software The University of Babylon LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Update to 8 June 2011 Press Release

Update to 8 June 2011 Press Release 19 August 2011 Update to 8 June 2011 Press Release In June 2011, the National Security Agency (NSA) declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages

More information

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo Jian Chen Supervisor: Professor Jeffrey S. Rosenthal May 12, 2010 Abstract In this paper, we present the use of Markov Chain

More information

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2] CRYPTOLOGY Notes & Cryptology is the study of 'hidden writing', but is more generally thought of as being to do with codes and ciphers. It involves working with both language and mathematics. For that

More information

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS SUMMARY Lecture 15 considers the role and influence that statistics and probability

More information

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication Courtney Hulse November 1, 2010 Dorabella Cipher Cryptography peppers the world s history as an aid to military communication and national strategizing. During the Second World War, cryptography was perhaps

More information

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model Perfect Security of the Cipher in the Delphic Model La spatialisation de Poisson de Pharse à Trappes TELECOM ParisTech david.madore@enst.fr http://perso.enst.fr/~madore/ 2008-W14-2 1/16 1 Background on

More information

The National Cryptologic Museum Library

The National Cryptologic Museum Library Cross References The National Cryptologic Museum Library Eugene Becker Last year, a widely published German technical author, Klaus Schmeh, e-mailed the library of the National Cryptologic Museum from

More information

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept Vinod Kumar,Santosh kr Upadhyay,Satyam Kishore Mishra,Devesh Singh Abstract In this paper we are presenting

More information

Baudot code channels

Baudot code channels BLETCHLEY PARK The Testery and the contribution made by the Intelligence Corps The battle to break Enigma was not the only one being fought in 1942. Much of the high level traffic believed to be from Hitler

More information

6.115 KryptoPhone Final Project Report

6.115 KryptoPhone Final Project Report 6.115 KryptoPhone Final Project Report Your voice for secure telecommunications(tm) Ben Adida, Kevin Fu, Rodrigo Leroux {ben,fubob,rodrigo}@mit.edu December 18, 1997 1 Introduction In this age of information,

More information

EATCS Monographs on Theoretical Computer Science

EATCS Monographs on Theoretical Computer Science EATCS Monographs on Theoretical Computer Science Volume 23 Editors: W. Brauer G. Rozenberg A. Salomaa Advisory Board: G.Ausiello M.Broy S.Even IHartmanis N.Jones T. Leighton M.Nivat C. Papadimitriou D.

More information

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

WINGS TO YOUR THOUGHTS..

WINGS TO YOUR THOUGHTS.. Review on Various Image Steganographic Techniques Amrit Preet Kaur 1, Gagandeep Singh 2 1 M.Tech Scholar, Chandigarh Engineering College, Department of CSE, Landran, India, kaur.amritpreet13@gmail 2 Assistant

More information

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages:

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages: 3 4 Sources Computer Security A [Not So?] Short History of Cryptography Two absolutely fascinating books: The Codebreakers, David Kahn, 1996, Scribner The Code Book: The Science of Secrecy from Ancient

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device 1 sur 5 17/04/2016 18:59 Le Sphinx Pocket cipher device Homepage Crypto Index Glossary Enigma Hagelin Fialka Siemens Philips Nema Racal Motorola STK Transvertex Gretag OMI HELL Telsy Teltron TST Mils AT&T

More information

Stream Ciphers. Debdeep Mukhopadhyay

Stream Ciphers. Debdeep Mukhopadhyay Stream Ciphers Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -7232 Classifications Objectives Feedback Based Stream

More information

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1 30 March l945 page 1 TENTATIVE LIST OF ENIGMA AND OTHER MACHINE USAGES Contents 1. Naval Enigma. 2. German Army and Air Force Enigma (including a few other miscellaneous devices). 3. Commercial Type Machines.

More information

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition Decrypted Secrets Friedrich L. Bauer Decrypted Secrets Methods and Maxims of Cryptology Fourth, Revised and Extended Edition With 191 Figures, 29 Tables, and 16 Color Plates 123 Dr. rer. nat. Dr. ès sc.

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002 USOO64O9089B1 (12) United States Patent (10) Patent No.: Eskicioglu (45) Date of Patent: Jun. 25, 2002 (54) METHOD FOR PROTECTING THE (58) Field of Search... 235/382, 492; AUDIO/VISUAL DATA ACROSS THE

More information

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL shakedy@eng.tau.ac.il, yash@acm.org

More information

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF) The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF) In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping

More information

Fault Analysis of Stream Ciphers

Fault Analysis of Stream Ciphers Fault Analysis of Stream Ciphers M.Sc. Thesis Ya akov Hoch yaakov.hoch@weizmann.ac.il Advisor: Adi Shamir Weizmann Institute of Science Rehovot 76100, Israel Abstract A fault attack is a powerful cryptanalytic

More information

WG Stream Cipher based Encryption Algorithm

WG Stream Cipher based Encryption Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 11, November 2015, PP 63-70 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) WG Stream Cipher based Encryption Algorithm

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ITRON, INC., Petitioner. CERTIFIED MEASUREMENT, LLC, Patent Owner

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ITRON, INC., Petitioner. CERTIFIED MEASUREMENT, LLC, Patent Owner UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD ITRON, INC., Petitioner v. CERTIFIED MEASUREMENT, LLC, Patent Owner Case: IPR2015- U.S. Patent No. 6,289,453 PETITION

More information

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Qi Ling, Tongtong Li and Jian Ren Department of Electrical & Computer Engineering Michigan State University, East Lansing,

More information

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY Vijay Shankar Pendluri, Pankaj Gupta Wipro Technologies India vijay_shankarece@yahoo.com, pankaj_gupta96@yahoo.com Abstract - This paper

More information

Alan Turing s Work on Voice Encryption. Craig Bauer

Alan Turing s Work on Voice Encryption. Craig Bauer Alan Turing s Work on Voice Encryption Craig Bauer Prologue: Inverters 1920s analog system put into use by AT&T. Prevented casual eavesdropping, but easily inverted back by determined amateurs. The frequency

More information

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving transmitted signal. CDMA signals can easily be hidden within the noise floor, and it is impossible to recover the desired user s signal without knowing both the user s spreading code and scrambling sequence.

More information

BeepBeep: Embedded Real-Time Encryption

BeepBeep: Embedded Real-Time Encryption BeepBeep: Embedded Real-Time Encryption Kevin Driscoll Honeywell Laboratories, 3660 Technology Drive, Minneapolis, MN 55418, USA kevin.driscoll@honeywell.com Abstract. The BeepBeep algorithm is designed

More information

Multiple Image Secret Sharing based on Linear System

Multiple Image Secret Sharing based on Linear System Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System

More information

Note: This document should only be used as a reference and should not replace assignment guidelines.

Note: This document should only be used as a reference and should not replace assignment guidelines. APA Quick Guide Note: This document should only be used as a reference and should not replace assignment guidelines. Page numbers below refer to the APA Manual 6 th edition, 2 nd printing. Title Page (pp.

More information

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 137-144 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Welch Gong (Wg) 128 Bit Stream Cipher For

More information

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms Ralph Morelli and Ralph Walde Computer Science Department Trinity College Hartford, CT 06106 ralph.morelli@trincoll.edu Abstract This

More information

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové Michal Musílek Faculty of Science University of Hradec Kralove Rokitanskeho 62, Hradec Kralove michal.musilek@uhk.cz

More information

Testing of Cryptographic Hardware

Testing of Cryptographic Hardware Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have

More information

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty

More information

THE HEROIC AGE OF EXPLORATION. Sample file

THE HEROIC AGE OF EXPLORATION. Sample file POLAR This Enrichment4You E-guide gives you: *A Brief History about mystery stories *Suggestions on how create a Polar Mystery Box based on the Polar Exploration series ENRICHMENT4YOU Published by Henrich

More information

Optimum Composite Field S-Boxes Aimed at AES

Optimum Composite Field S-Boxes Aimed at AES Optimum Composite Field S-Boxes Aimed at AES R.THILLAIKKARASI Assistant professor, Department Of ECE, Salem college of Engineering and technology. Salem, India. K.VAISHNAVI Post Graduate Student M.E Applied

More information

David Chaum s Voter Verification using Encrypted Paper Receipts

David Chaum s Voter Verification using Encrypted Paper Receipts David Chaum s Voter Verification using Encrypted Paper Receipts Poorvi L. Vora Dept. of Computer Science George Washington University Washington DC 20052 poorvi@gwu.edu February 20, 2005 This document

More information