The Web Cryptology Game CODEBREAKERS.EU edition 2015

Similar documents
An Introduction to Cryptography

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Exploring the Enigma [The MATH Connection]

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Sherlock Holmes and the adventures of the dancing men

Most people familiar with codes and cryptography have at least heard of the German

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Appendix Cryptograms

Note: This document should only be used as a reference and should not replace assignment guidelines.

PA Substitution Cipher

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Editing EndNote Output Styles Rosemary Rodd 5/23/ Configuring EndNote at the University Managed Cluster sites

FOR OFFICIAL USE ONLY

Many books on cryptography were published prior to the 1609

ANCIENT WORLD WRITING SYSTEMS

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Narrative #4. i didn t understand family i understood my grandparents my mom my brothers and sisters

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Chapter 2 Divide and conquer

CS408 Cryptography & Internet Security

An Analysis of the Enlightenment of Greek and Roman Mythology to English Language and Literature. Hong Liu

Institute of Southern Punjab, Multan

Name: Ancient Egypt Detective: Research paper

National Standards for Visual Art The National Standards for Arts Education

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Different jobs called for different kinds of writing in the Roman world. Here are the three most common:

Ciphers that Substitute Symbols

Personal Narrative STUDENT SELF-ASSESSMENT

LEARN * DREAM * AWAKEN* DISCOVER * ENLIGHTEN * INVESTIGATE * QUESTION * EXPLORE

AUSTRALIAN HOMESCHOOLING SERIES SAMPLE. Successful English 7B. Years 7 9. Written by Valerie Marett. CORONEOS PUBLICATIONS Item No 559

ENGLISH 1201: Essays and Prose

Writing Styles Simplified Version MLA STYLE

The Paper Enigma Machine

A-LEVEL CLASSICAL CIVILISATION

A Layered Approach for Watermarking In Images Based On Huffman Coding

THE HEROIC AGE OF EXPLORATION. Sample file

DESI WULANDARI A

Build your own: Track Display

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

[Meta comment: Page numbering starts at the first page of the anonymous. manuscript; the title page does not have page numbering.

What is Steganography

Style Guides APA Format

PAPER AND FIRE. Volume 2 of the Great Library by Rachel Caine Author of the Morganville Vampires series

FROMM CRITICA FREUD. In italiano e in inglese. Articolo di Giuseppe Battaglia pubblicato su :

WINGS TO YOUR THOUGHTS..

Table of Contents. Introduction...4. Common Core State Standards Alignment Matrix Skill Assessment Skill Assessment Analysis...

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

The Swiss cipher machine NeMa

The character who struggles or fights against the protagonist. The perspective from which the story was told in.

Found Poem USING NIGHT BY ELIE WIESEL

Champions of Invention. by John Hudson Tiner

The Anchor Paper Main Logo

Introduction to Drama

Antigone by Sophocles

The Influence of Chinese and Western Culture on English-Chinese Translation

AXIOLOGY OF HOMELAND AND PATRIOTISM, IN THE CONTEXT OF DIDACTIC MATERIALS FOR THE PRIMARY SCHOOL

Style (How to Speak) February 19, Ross Arnold, Winter 2015 Lakeside institute of Theology

ENGLISH 2201: Essays and Prose

Telairity Dives Deep into Digital Video Technology Part 1

What are MLA, APA, and Chicago/Turabian Styles?

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Substitution cipher. Contents

Introduction to embodiment

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Excerpts From: Gloria K. Reid. Thinking and Writing About Art History. Part II: Researching and Writing Essays in Art History THE TOPIC

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Modelling Intellectual Processes: The FRBR - CRM Harmonization. Authors: Martin Doerr and Patrick LeBoeuf

julius caesar Welcome to

CLASSIFICATION OF THE METAPHORS ACCORDING TO THE DEGREE OF UNEXPECTEDNESS

Humanities Learning Outcomes

Quantitative Evaluation of Pairs and RS Steganalysis

Lecture (0) Introduction

(Refer Slide Time 1:58)

A reprint from American Scientist

Formatting a Document in Word using MLA style

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

On Translating Ulysses into French

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

web address: address: Description

AV KEEPS NYC SECURE JAIL IS UNDER CONTROL GREETINGS FROM MARS NYPD S EOC SERVES MULTIPLE PURPOSES.

Style Guides APA Format

Tutor Led Manual v1.7. Table of Contents PREFACE I.T. Skills Required Before Attempting this Course... 1 Copyright... 2 GETTING STARTED...

Essential Histories. The Greek and Persian W ars BC

(12) United States Patent

First Manassas 1861: The Battle of Bull Run (Trade Editions)

Correlation to Common Core State Standards Books A-F for Grade 5

Arkansas Learning Standards (Grade 12)

56 Discoveries in Egypt Howard Carter discovers Tutankhamen

There is an activity based around book production available for children on the Gothic for England website which you may find useful.

Annotated Bibliography

Learning Objectives Lower Grammar Stage. Kindergarten: The Cradle of Civilization Year First Grade: The Greek Year Second Grade: The Roman Year

THESIS/DISSERTATION FORMAT AND LAYOUT

Transcription:

Lecture 2, in which we look at the main methods of concealing information. We will learn that what used to be an unbreakable cipher can today be compared to a child play. We will also see how this children game can complicate the work of a codebreaker. In the present lecture we will devote our attention to the subject of the basic methods od concealing information. Probably we already can explain what steganography is and can tell the difference between codes and ciphers. It is time to look at how they work in reality. STEGANOGRAPHY Please take note of the word subject above: the letter t is written in a slightly smaller font than the other letters. You might have overlooked that while reading it for the first time. Now, however, knowing what you need to look for, you will find, in the first two sentences, several other characters that differ in size from the rest of the text. When you put these letters together they will form a phrase thisisthekey. The meaningful letters in a text can be made distinctive in many ways: by changing the font size, or type; by underlining or inserting an unexpected ápostrophe. Yet another method of transmitting information secretly consisted in formulating an apparently innocent message, in which only certain characters (plain to the receiver of the message) were meaningful. Let s take as an example the following sentence: Their gentlemanly spirits sagged almost tragically, taking out of every word only the third letter we get a secret message enigma. To compose a logical and unsuspicious masking text was a certain problem, however, dispatches of that kind were usually sent as trade correspondence, in which the use of e.g. a list of items or accepted abbreviations is natural. It was a Greek historian, Herodotus, who related the story of a Greek named Histiayos serving at the court of the great king of Persia. He decided once to send to his cousin in Miletus a message about a convenient moment to stir the uprising against the Persian rulers. He summoned one of his slaves, shaved his head and tattooed the text of warning on it. When the hair on the messenger s head grew back, he sent him to his country. These examples show that there is much reason behind hiding the fact of sending information. The point is that no one should know that the head of the slave (mentioned when the word steganography appeared in our course for the first time) has been tattooed. The guards of the Persian royal

road all too often had to search the messengers passing through, and might have failed to notice a message hidden under the hair - steganography thus fulfilled its role. In time, its methods became more sophisticated, as the users came to the conclusion that the fact of sending a courier or a parcel itself arouses suspicions of the enemy if no innocent and credible reason for sending them is provided. They would, therefore, send apparently innocent messages, hiding the proper message in their text or on their carrier. The illustration on the right is an example of such a situation. It was drawn by an insect researcher who happened to be a general in British army, Roberta Baden-Powell. As it turns out, the butterfly is an issue of secondary importance here, in reality the drawing presented the layout and distribution of guns of one of enemy s fortresses. A typical method of this kind was the use of the so-called invisible ink. The proper content of the message was written on a sheet of papyrus, parchment or paper with milk or lemon juice and then, after the invisible ink had dried, an ordinary letter, e.g. greetings for a cousin, was written on the same page with normal ink. Even during a detailed inspection the messenger could claim that he was transporting only some family correspondence. The addressee, later, heated the message over a burning candle or rubbed the sheet with a cloth soaked in an appropriate reagent, thus deciphering the hidden message. Just when it seemed that steganography would soon become a remnant of the past replaced by codes and ciphers, the era of computers has brought its unexpected revival. A substantial amount of information can be transmitted almost unnoticeably, without a visible or audible deterioration in the quality, in the graphic and music files sent via the Internet. MORE ABOUT CIPHERS Steganography has still not lost its significance, however, at the turn of our era cryptology made its comeback. It was largely due to Julius Caesar, who had to have at his disposal reliable methods to secretly pass on orders to the commanders of his military units. So he invented and used his own

cipher, eventually named after him. According to the contemporary standards the Caesar cipher was not very sophisticated. Each letter of the plaintext was replaced by a letter three positions down the alphabet. In this manner the letter A was replaced in the cipher message by D, B by E etc. The full modification in the cipher used by Caesar is shown below: plain alphabet: cipher alphabet: ABCDEFGHIKLMNOPQRSTUVXYZ DEFGHIKLMNOPQRSTUVXYZABC His own name, IULIUS CAESAR, thus became LXNLXV FDHVDU. For unclear reasons, or simply out of habit, Caesar would continue to use a shift of three. In other words, he encrypted his messages without changing the key, which is not a safe practice. Presumably, Caesar could feel confident as the tribes he fought were not aware of the existence of alphabets, let alone a cipher. If, however, he had to fight with some more civilised enemies, his cipher would have turned out dangerously weak. The structure of the cipher allowed for the use of merely 23 keys, corresponding to different shifts between the alphabets. To put it differently, the enemy, aware of the construction of the Caesar s cipher, would have to test only 23 possibilities to be able to break any message sent by Caesar. LET S BREAK THE FIRST CODE! It is a mystery why Caesar would never change the key to his cipher, which means that the letters were moved always by three positions. It was not the safest approach though safe enough as the tribes he fought were illiterate and therefore unaware of the existence of ciphers. How could then a potential literate enemy try to break Caesar s code? Let s assume a coded message of the following content: EXXEGOEXSRGI. We can check all possible moves by 1 letter (where A changes into B) up to the movement by the whole alphabet (where A changes into Z). Let s assume that the author has used the English alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ www.wikipedia.com

If the author has moved by three letters forward - has changed A to D, in the coded message we have to move three letters backwards - from D to A. The table illustrates what messages we get by checking one by one each of the possible shifts. Because the message has already been deciphered there is no need to check further shifts. As you can see the messages are written with no spaces or punctuation marks. As you can see breaking the Caesar cipher has not caused any difficulty. There is, however, a simple way of making the Caesar cipher more secure, in reality - any cipher, and even now cryptologists make use of the opportunities it offers. If we have two relatively weak ciphers, we can increase the security level applying them to the plaintext one after another. There is a type of a word game that children from certain language circles like to play, in which the order of letters of a particular word is reversed in order to hide e.g. not a very favourable nickname of a teacher. In this manner LILLIPUT would change into TUPILLIL, LETTER into RETTEL, and SUPER into REPUS. In the early phase of the development of cryptology modifications of this type were taken quite seriously. We could, for instance, apply the child cipher with the reversed order to the word CAESAR first, and then encrypt the result with the classic Caesar cipher. Let s look at the process: plaintext: child cipher : Caesar cipher: CAESAR RASEAC UDVHDF Anyone trying to break this cryptogram by applying all of the possible keys of the Caesar cipher, would get a non-existent Latin word RASEAC. Whether he or she manages to discover the reversed word CAESAR in it depends on their intuition and ingenuity. MORE ABOUT THE CODES The reports related to the method used by Julius Caesar can indicate that ciphers developed as the second, after steganography, method of hiding information. Codes developed later.

Speaking of which, the language that we use on everyday basis is also a certain type of a code. In our early childhood we tend to give names to concepts using the language of the people surrounding us. Each word that we utter or a phrase we construct represents some concept, and that correlation is a matter of convention. After all people speaking languages foreign to us can understand each other perfectly well, even though the words that they use to represent the same concepts as we do are completely different. The analogy with foreign languages manifests the code nature of our language: people speaking a common language use one common code, allowing them to communicate. However, it is enough to use this code when speaking to a person of a different language circle to encounter an information barrier. Besides, there are particular variations of language the goal of which is to hide information from an unwelcome eye. Such are the prison or smugler slangs, as well as the language of most disciplines of science. In the first lecture we have already mentioned the subject of codes and the fact that during certain periods they were particularly popular as a practical tool for concealing information. In order to effectively hide the transmitted messages all that had to be done in this strategy was to assign a string of characters to words or even whole expressions. Below an example of a typical message: To staff. Company commander reports enemy movement noticed. It can be expressed in the following manner: 2133 3452 4354 3246 9045 In this case the numbers in the code would have the following meaning: 2133 TO STAFF, 3246 ENEMY MOVEMENT, 3452 COMPANY COMMANDER, 4354 REPORT, 9045 NOTICE,

It s easy to notice that this way of hiding information, although relatively easily applied, imposes certain restrictions. The code language is fairly rigid (and also of limited capacity) and therefore it was impossible to prepare codes for every situation. Because of that, a new code was invented in the period of the Renaissance, the so-called nomenclator. In its most typical form, it contained only the code equivalents of the notions most often used in correspondence and an accompanying simple cipher, which served to secure those fragments of the text for which there were no equivalents in the code. Here is an example of a simple nomenclator: COMPANY 8381 BATTALION 9211 REGIMENT 1153 DIVISION 0455 ATTACKING 9802 DEFENDING 6653 RETREATING 1388 DELIVER AMMUNITION 9077 SEND REINFORCEMENTS 6615 ABCDEFGHIJKLMNOPQRSTUVWXYZ CIPHERABDFGJKLMNOQSTUVWXYZ a report: Third company attacking. Deliver ammunition encrypted with the use of the nomenclator above will look as follows: TBDQH838198029077 This short theoretical introduction will let you have a deeper insight into the issues related to cryptology, as well as solve the tasks accompanying the present lecture. Good luck!