Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Similar documents
Substitution cipher. Contents

Many books on cryptography were published prior to the 1609

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Sherlock Holmes and the adventures of the dancing men

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

CSc 466/566. Computer Security. 4 : Cryptography Introduction

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PA Substitution Cipher

Institute of Southern Punjab, Multan

CS408 Cryptography & Internet Security

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

An Introduction to Cryptography

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

FOR OFFICIAL USE ONLY

5 The Printing Press and Cryptography

Most people familiar with codes and cryptography have at least heard of the German

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Cryptography Through the Ages: A Layman's View

Stream Ciphers. Debdeep Mukhopadhyay

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages:

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

How I Broke the Confederate Code (137 Years Too Late)

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

New Address Shift Linear Feedback Shift Register Generator

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

Ciphers that Substitute Symbols

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

What is Steganography

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

The Swiss cipher machine NeMa

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Cabinet War Rooms SIGSALY. The A-3 scrambler

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Appendix Cryptograms

The Web Cryptology Game CODEBREAKERS.EU edition 2015

A reprint from American Scientist

Exploring the Enigma [The MATH Connection]

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

Update to 8 June 2011 Press Release

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc

The National Cryptologic Museum Library

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

cryptography, plaintext; ciphertext. key,

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Performance Evaluation of Stream Ciphers on Large Databases

University of Toronto

Facts and Myths of Enigma: Breaking Stereotypes

Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36

Metamorphoses of the Letter. Tentative Program

NUMB3RS Activity: Coded Messages. Episode: The Mole

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

EATCS Monographs on Theoretical Computer Science

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

READING Why Do People Read?

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

, etc.,nor ,etc.

The Paper Enigma Machine

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

Multiple Image Secret Sharing based on Linear System

Texts in Theoretical Computer Science An EATCS Series

Sequences and Cryptography

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

Inter-Schools Literacy Olympiads

21.1. Unit 21. Hardware Acceleration

The A to Z GUIDE to the ZK-Crypt

Note: This document should only be used as a reference and should not replace assignment guidelines.

Cryptography in Criminal Investigations

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Dual Handed Keyboard Maltron Keyboards Australia Maltron, Error, Errors, Dvorak

V.Sorge/E.Ritter, Handout 5

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

1.0: Introduction: 1.1: "Banburismus":

History 220 History of Europe Prof. C. R. Friedrichs Ms. Stefanie Ickert Mr. John Dingle TERM PAPER ASSIGNMENT

Mary Holliman. Friedrich Kittler

BeepBeep: Embedded Real-Time Encryption

Sample Test Paper SYNONYMS

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Transcription:

Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution cipher with homophones Nomenclator Example. Nomenclator used by Mary, Queen of Scots in 1586 in the plot against Elizabeth I Taken from Simon Singh. The Code Book. Alberti s Cipher Disk Invented by Leon Battista Alberti in 1460s. outer disk (fixed) plaintext inner disk (moving) ciphertext Agree on index letter on inner disk. Key: letter corresponding to index letter on outer disk. Key can change during encryption 1

Cipher Disk Examples Let s choose K as index letter. Examples: rrvtzok akvttrck HKmZMEP Since the key can change, this cipher is no longer monoalphabetic, but polyalphabetic. Are there other ways to use the cipher disk? Johannes Trithemius 1462-1516, Germany Polygraphiae, 1518 First printed book on cryptography. Ave Maria Cipher Polyalphabetic substitution Progressive key Steganographia, 1606 hidden writing http://diglib.hab.de/drucke/12-3-rhet-2f/start.htm Polygraphiae I The Polygraphiae contains many pages of code. 2

Polygraphiae II: Ave Maria 1 st and 2 nd page Steganographia http://books.google.com/books?id=bqdc AAAAcAAJ&dq=Trithemius%20Stegano graphia&pg=pr6#v=onepage&q&f=false Polygraphiae III Tabula recta, from the 6 th book of the Polygraphiae. Polyalphabetic substitution Progressive key The history of information security: a comprehensive handbook, de Leeuw, Bergstra 3

Polygraphiae IV Examples (starting with first alphabet) Johannes SUGKESUOWSUN The history of information security: a comprehensive handbook, de Leeuw, Bergstra Modern Tabula Recta More Examples (not from beginning) XNNN NUGUV http://commons.wikimedia.org/wiki/file:vigenere-square.png Giovan Batista Belaso La cifra del. Sig. Giovan Batista Belaso, 1553 Idea: combine polyalphabeticity with keyword; that is, select cipher alphabet according to keyword key plaintext ciphertext viavia viaviav iaviav giovan batista belaso PTBAYA XYGRHGU ZRSYFF Decrypt: OQLNC ORITY OXA (belaso) The history of information security: a comprehensive handbook, de Leeuw, Bergstra 4

Giovan Batista Belaso La cifra del. Sig. Giovan Batista Belaso, 1553 key plaintext ciphertext viavia viaviav iaviav giovan batista belaso PTBAYA XYGRHGU ZRSYFF Examples plaintext: message, key: help ciphertext: OQLNC ORITY OXA key: belaso The history of information security: a comprehensive handbook, de Leeuw, Bergstra Giovanni Battista Porta I 1535-1615, Naples Founded the first scientific society, Academia Secretorum Naturae Magia naturalis, 1558 Book 16 Of Invisible Writing invisible inks hiding messages Giovanni Battista Porta II De Furtivis Literarum Notis, 1563 criticizes traditional ciphers (Rosicrucian cipher) Substitution/Transposition Digraphic Substitution symbol substitution Mixed polyalphabetic cipher Freemason s cipher (similar to Rosicrucian cipher) 5

De Furtivis I Classification of ciphers according to method: Transposition Substitution by symbol Substitution by value Suggests deliberate mistakes in plaintext to confuse cryptanalyst. Suggests probable word analysis De Furtivis II Earliest known Digraphic Substitution Symbol substitution De Furtivis III Mixed polyalphabetic cipher Combining Alberti s mixed alphabet with Trithemius/Belaso s tabula recta First ideas for cryptanalysis of mixed polyalphabetic ciphers 6

De Furtivis IV Cryptanalysis of mixed polyalphabetic cipher What happens to fed, pon in a progressive polyalphabetic cipher? Observation on a polyalphabetic cipher with literal key: Since there are 51 letters between the first MMM and the same three letters repeated in the thirteenth word, I conclude that the key has been given three times and decide correctly that it has 17 letters. Bacon s Biliteral cipher I Francis Bacon (1561-1626), England First idea: encode letters in binary (1623) Bacon s Biliteral cipher II Second idea: use two different typefaces to encode a/b decision. Example: To be or not to be that is the question. 7

Girolamo Cardano De Subtilitate, 1550; De Rerum Varietate, 1556 Autokeys: key plain cipher SIC SICE SICERGOEL sic ergo elementic NTF ZCLT ZVHRYVIPE Problems? Also invented the Cardano grille I H N A L Z A R N U R O O D X H N P A E E E I L S P E S D R E E D G N C 8

Cardano Grille I H N A L Z A R N U R O O D X H N P A E E E I L S P E S D R E E D G N C From Jules Verne, Matthias Sandorf 9