Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Similar documents
Institute of Southern Punjab, Multan

Appendix Cryptograms

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Sherlock Holmes and the adventures of the dancing men

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

An Introduction to Cryptography

Most people familiar with codes and cryptography have at least heard of the German

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Substitution cipher. Contents

CSc 466/566. Computer Security. 4 : Cryptography Introduction

PA Substitution Cipher

CS408 Cryptography & Internet Security

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Exploring the Enigma [The MATH Connection]

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Paper Enigma Machine

FOR OFFICIAL USE ONLY

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Cabinet War Rooms SIGSALY. The A-3 scrambler

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Update to 8 June 2011 Press Release

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

A reprint from American Scientist

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Optimum Composite Field S-Boxes Aimed at AES

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Note: This document should only be used as a reference and should not replace assignment guidelines.

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

How I Broke the Confederate Code (137 Years Too Late)

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Many books on cryptography were published prior to the 1609

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Baudot code channels

Cryptography in Criminal Investigations

LFSR stream cipher RC4. Stream cipher. Stream Cipher

New Address Shift Linear Feedback Shift Register Generator

The Bletchley Park 1944 Cryptographic Dictionary formatted by Tony Sale (c) 2001

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Pseudorandom bit Generators for Secure Broadcasting Systems

The Swiss cipher machine NeMa

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Clarification for 3G Coverage Obligation Verification Data

Facts and Myths of Enigma: Breaking Stereotypes

Ciphers that Substitute Symbols

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

NUMB3RS Activity: Coded Messages. Episode: The Mole

Hidden Codes and Grand Designs

Edward Simpson: Bayes at Bletchley Park

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

CS 61C: Great Ideas in Computer Architecture

Alan Turing s Work on Voice Encryption. Craig Bauer

980 HDMI Video Generator Module Video Pattern Testing of HDMI HDTVs & Displays

The National Cryptologic Museum Library

cryptography, plaintext; ciphertext. key,

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Appendix B: Project Literature Review

Examining The Dorabella Cipher with Three Lesser-Known Cryptanalysis Methods

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography

Encryption. Secure Chat. Encryption Machine

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

Practice Task: The Sieve of Eratosthenes

VIVO-D203(M) Quick installation and programming guide. Elements of the complete installation

INTRODUCTION (EE2499_Introduction.doc revised 1/1/18)

Style Guides APA Format

Force & Motion 4-5: ArithMachines

Pushbutton Units and Indicator Lights

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages:

TEN. Classical Serialism

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

Dual Handed Keyboard Maltron Keyboards Australia Maltron, Error, Errors, Dvorak

A microcomputer system for color video picture processing

Key-based scrambling for secure image communication

VENDOR NUMBER CROSS REFERENCE LIST

SSTV Transmission Methodology

The UoM Guide to the Harvard System of Referencing

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

Basic LabVIEW Programming Amit J Nimunkar, Sara Karle, Michele Lorenz, Emily Maslonkowski

Transcription:

Baldwin 1 Erin Baldwin Dr. Bruff FYWS Cryptology October 27, 2010 Playfair Cipher From the earliest forms of stenography to the most advanced forms of encryption, the field of cryptography has advanced much since the need to pass information secretly was first recognized. As code makers and code breakers fought to win the upper hand in a centuries old battle, the ciphers that they concerned themselves with by necessity grew more and more advanced. Codes were invented and subsequently broken so new codes had to be created to take their place. The progression of cryptology was the main driving force behind the Playfair cipher, invented in 1854 as a replacement for the simple substitution ciphers of the 1800s. Although the cipher itself is named after Lyon Playfair, Charles Wheatstone was the sole inventor. However, the two men were neighbors, took Sunday walks together, and even looked so much alike (short, bespectacled men) that Lady Wheatstone once mistook Lord Playfair for her husband (Kahn 198). It was within this camaraderie that the men developed a taste for cryptology as they entertained themselves by deciphering agony columns, which ran in the newspapers (Singh 79 ). However, while Playfair s interest in the field went little beyond entertainment, Wheatstone devoted a great amount of time to the subject. Throughout his career Wheatstone achieved many great accomplishments as a scientist and cryptographer. Besides the invention of the Cryptograph (a machine that used two alphabets of different lengths to encode and decode messages) and the decipherment of a letter from Charles 1, written only in numbers, the Playfair cipher is the most well-known and widely used of his advancements.

Baldwin 2 In January 1854, Playfair attended a dinner party given by Lord Gainville and attended by such highly influential figures as the queen s husband and the future prime minister (Kahn 197-198). It was at this event that Playfair introduced his good friend s newly-discovered symmetrical cipher, which would come to be named Playfair after the man who marketed its usability. Originally, Lord Playfair had intended it to be used by British troops during the impending Crimean War, but the cipher met resistance from the Under Secretary of the Foreign Office, who thought that it was too complicated to be used as a field cipher (Kahn 201). The British kept the record of the code; however, and it was eventually used in the field during the Boer War and to some extent during World War I. The United States adopted the cipher for sending quick field messages on the Pacific front during World War II, although the cipher had been broken in the later years of World War I. Compared to the popular cryptography machines of the time, such as the Enigma and the SIGABA, the Playfair was used to encode and decode messages quickly in situations where machinery was unavailable. Typically these were circumstances where an action would be carried out before the enemy had a chance to decipher the messages that they received (Lyon). Most famously, the code was used by John F. Kennedy when his patrol boat was sunken by a Japanese vessel and his crew of 12 men was forced to swim to a nearby island. Using the cipher, Kennedy alerted a nearby watch post as to his position and the crew was returned to safety without Japanese interference (Biryukov). As a post-vigenére cipher, the Playfair cipher was invented at a time when the substitution cipher ruled. From the simplest Caesar shift, a mono-alphabetic cipher, to the more complicated and at one point considered unbreakable Vigenére cipher, a polyalphabetic cipher, most of the work done in the field had focused on the substitution of letters. A letter in the

Baldwin 3 plaintext is replaced by one in the cipher text, which has been generated using some type of predetermined system, the code. The Playfair cipher however is not a simple substitution, which is defined by Konheim as a one-to-one mapping of one complete alphabet to another. Instead, the Playfair is a two-gram substitution cipher, also known as a digraph substitution cipher, in which pairs of letters are encoded (Konheim 95). It is also not regarded as a normal substitution because the letters I and J are considered as the same entity in the cipher alphabet and nulls are used frequently, though strategically, in the plaintext (preventing the one-to-one characteristic of simple substitutions). Encipherment of a text using the Playfair system begins with a re-working of the plain text. The message is first divided into digraphs, pairs of two letters each. Take for instance the quote by Thomas Carlyle: Secrecy is the element of all goodness; even virtue, even beauty is mysterious (Secrecy Quotes). To encipher it using the Playfair system, the sentence must first be stripped of all spaces and punctuations, resulting in the following: Secrecyistheelementofallgoodnessevenvirtueevenbeautyismysterious. Any doubled letters in the non-spaced text are separated by nulls, represented by x s or sometimes a different letter with a low frequency of usage, such as q (Gaines 201). For this example x will for serve as the null, resulting in the plain text: Secrecyisthexelementofalxlgoxodnesxsevenvirtuexevenbeautyismysterious Dividing it into groupings of two letters results in: Se cr ec yi st he xe le me nt of al xl go xo dn es xs ev en vi rt ue xe ve nb ea ut yi sm ys te ri ou sx. Now, the plaintext is ready to be transformed into cipher text. The Playfair cipher, in its traditional form used by Wheatstone, consists of a five by five alphabet square representing every letter in the English alphabet (I/J share a space and are considered the same letter. In the

Baldwin 4 cipher text they are represented as an I). Playfair, one of the first ciphers to use a keyword to determine the cipher alphabet, starts the grid with a pre-chosen word (Kahn 200). Using the word WHEATSTONE as the key, a unique five by five grid is created (Figure 1). Next following a specific set of rules, the pairs of plain text letters are translated into cipher text. The three rules of the Playfair cipher are (Biryukov): 1. If the two letters of a pair are situated in the same column of the alphabet grid, then each letter is enciphered as the letter immediately below it. (Except the bottom letter which is enciphered as the top letter of the column) (see Figure 2). 2. If the two letters of a pair are in the same row of the square, then the plain text is translated into the letter directly to the right of it. (The letter on the far right is enciphered as the first letter in the row) (see Figure 3). 3. If a pair of letters is located in a different row or column, then the rectangular method is used. In this case, a rectangle is formed with the two letters in opposite corners, and each letter enciphered by the letter in the corner of the rectangle horizontally across from it (see Figure 4). Following these rules, the message Secrecy is the element of all goodness; even virtue, even beauty is mysterious becomes WN KZ TN AQ WC EA EN WP HP CE FM WQ UP FN VN GS WN UN HX NG YF ZC XW XH BC AT ZW AQ OL UB WA QK SV NU. The final version of the code would be sent to the recipient without spaces, resulting in the cipher text WNKZTNAQWCEAENWPHPCEFMWQUPFNVNGSWNUNHXNGYFZCXWXHBCATZW AQOLUBWAQKSVNU.

Baldwin 5 Different variations of the Playfair cipher exist in which the formation of the alphabetic grid is changed. Some grids for example include numbers, resulting in a formation like the one found in Figure 5. Others, invented after the widespread use of typing machines like the typewriter and computer, do not have a keyword and are instead based on the letter formation of the standard keyboard (Figure 6). The entire system of the Playfair cipher can also be manipulated. For example the Double Playfair first requires a cryptographer to separate the text into equally sized groups which are then stacked on top of one another. The pairs of letters to be enciphered are created by taking a letter from the top row and the letter directly beneath it (Figure 7) (Biryukov). Deciphering the Playfair cipher is rather difficult and at one point was considered impossible (Kahn 202). If the keyword is known, the decipherment is a straight forward process. By creating a five by five grid using the keyword and simply reversing the three rules of the Playfair cipher, the plaintext can be revealed. After removing nulls and deciding whether the i/j s in the text should represent an i" or a j the message will be returned to its original text (Nova). However if presented a body of text without the knowledge of a keyword, the process is longer and much more demanding. First, the cipher used to encode the message must be identified. The Playfair has several markers which indicate to a cryptanalyst that the Playfair cipher in particular has been used to encrypt the text (Biryukov). The cipher message will always have an even number of letters and a frequency count of the text will show no more than 25 letters (i and j are the same in the cipher text). Also the text will have no repeats. Although it can be broken by hand, the most efficient way to crack the Playfair cipher is to use a computer program (Lyon).

Baldwin 6 Wheatstone, in creating the Playfair cipher, engineered a secure mode of encryption that posed a challenge to the cryptanalysts whose job it became to break it. In deciphering the text, frequency analysis of letters cannot be utilized. Instead, a cryptanalyst must run an analysis of digraph possibilities, hundreds of which exist. The digraphic cipher not only pioneered the use of pairing letters in cryptology, but also was among the first to establish an alphabetic system using a code word. In the decades following the deaths of Wheatstone and Playfair, ambitious cryptographers would attempt to expand upon the breakthrough that was the Playfair cipher. Most notably, many cryptographers would seek a trygraphic cipher (one which separates the code into triples), but ultimately the majority of them would fail to do so. Not until 1929, with Lester Hill s application of algebra to cryptology would anyone be able to take codes beyond a digraph (Kahn 404). The Playfair was truly a groundbreaking achievement in the history of cryptology.

Baldwin 7 W H E A T S O N B C D F G I/J K L M P Q R U V X Y Z Figure 1: Playfair grid using the keyword WHEATSTONE W H E A T S O N B C D F G I/J K L M P Q R U V X Y Z Figure 2: Playfair Rule #1 (enciphering of plaintext cr ) W H E A T S O N B C D F G I/J K L M P Q R U V X Y Z Figure 3: Playfair Rule #2 (enciphering of plaintext th )

Baldwin 8 W H E A T S O N B C D F G I/J K L M P Q R U V X Y Z Figure 4: Playfair Rule #3 (enciphering of plaintext sx ) V A N D E 1 6 R B I L T 2 7 C F G H K 3 8 M O P Q S 4 9 U W X Y Z 5 J Figure 5: Playfair grid including numbers (keyword VANDERBILT) Q W E R T Y U I O P 1 2 A S D F G H J K L 3 4 5 Z X C V B N M 6 7 8 9 0 Figure 6: Playfair grid based on a keyboard configuration

Baldwin 9 first year writing seminar (plain text message) firs rwri semi tyea ting narx (groups of 4, odd numbered groups on top, even on the bottom) f i r s r w r i s e m i t y e a t i n g n a r x Ft iy re sa rt wi rn ig sn ea mr ix (vertical pairings) C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z IY FT LM QB CY ZF YM FB KQ HL VL HZ (pairings in cipher text) Figure 7: Double Playfair (enciphering the message first year writing seminar with the keyword CRYPTOLOGY)

Baldwin 10 Works Cited Biryukov, Alex. "Lecture 3." Faculty of Mathematics & Computer Science. N.p., n.d. Web. 26 Oct. 2010. <http://www.wisdom.weizmann.ac.il/~albi/cryptanalysis/lect3.htm>. Gaines, Helen. Cryptanalysis: A study of ciphers and their solution. New York: Dover Publications, 1956. Print. Kahn, David. Codebreakers: the Story of Secret Writing. New York: Weidenfeld & Nicolson/Macmillan, 1967. Print. Konheim, Alan G. Cryptography: A Primer. Hoboken, New Jersey: John Wiley & Sons Inc, 1981. Print. Lyon, James. "Playfair Cipher." Practical Cryptography. N.p., n.d. Web. 28 Oct. 2010. <http://www.practicalcryptography.com/ciphers/playfair-cipher/>. "NOVA Online Decoding Nazi Secrets The Double Playfair Cipher." PBS: Public Broadcasting Service. N.p., n.d. Web. 25 Oct. 2010. <http://www.pbs.org/wgbh/nova/decoding/doubplayfair.html>. "NOVA Online Decoding Nazi Secrets The Playfair Cipher." PBS: Public Broadcasting Service. N.p., n.d. Web. 25 Oct. 2010. <http://www.pbs.org/wgbh/nova/decoding/playfair.html>. "Secrecy Quotes." Famous Quotes and Quotations. Brainy Quote.com, n.d. Web. 27 Oct. 2010. <http://www.brainyquote.com/quotes/keywords/secrecy.html Singh, Simon. Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 2000. Print.