Ciphers that Substitute Symbols

Similar documents
Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

FOR OFFICIAL USE ONLY

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

PA Substitution Cipher

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

This article was published in Cryptologia Volume XII Number 4 October 1988, pp

Appendix Cryptograms

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

CS408 Cryptography & Internet Security

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Update to 8 June 2011 Press Release

Sherlock Holmes and the adventures of the dancing men

Examining The Dorabella Cipher with Three Lesser-Known Cryptanalysis Methods

An Introduction to Cryptography

The Dramatic Publishing Company

Substitution cipher. Contents

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

How I Broke the Confederate Code (137 Years Too Late)

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

The Web Cryptology Game CODEBREAKERS.EU edition 2015

Most people familiar with codes and cryptography have at least heard of the German

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Institute of Southern Punjab, Multan

CROATIAN OPEN COMPETITION IN INFORMATICS. 6 th ROUND

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

A reprint from American Scientist

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

Part 1: Introduction. Peter Tobin. Mr Bruff would like to thank:

Exploring the Enigma [The MATH Connection]

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

The Swiss cipher machine NeMa

A Sherlock Holmes story The Second Stain by Sir Arthur Conan Doyle Chapters 6 and 7 (Part 2)

New Address Shift Linear Feedback Shift Register Generator

Mr Ralph Cecilio: an educator who dared to be different Antonio F Moreno SJ 08 September 2010

Scouting and Sherlock holmes

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Stream Ciphers. Debdeep Mukhopadhyay

Directions: Today you will be taking a short test using what you have learned about reading fiction texts.

Comfort Women Memorial by Steven Whyte, Sculptor

The National Cryptologic Museum Library

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

Hybrid Chart Recorder 250 mm (10")

A Sherlock Holmes story The Norwood Builder by Sir Arthur Conan Doyle Chapter 1

Cabinet War Rooms SIGSALY. The A-3 scrambler

Facts and Myths of Enigma: Breaking Stereotypes

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

SPELLING BOOKLET. Grade 5 Term 3. Are you ready for some magic Spells? SURNAME, NAME: CLASS: 051-eng-wb3 -(spelling)

ST. MARY'S CATHOLIC HIGH SCHOOL, DUBAI

PARCC Narrative Task Grade 8 Reading Lesson 4: Practice Completing the Narrative Task

Newspaper Project Rubric. Newspaper Project Rubric

A Sherlock Holmes story A Scandal in Bohemia by Sir Arthur Conan Doyle Chapter 4

DOWNLOAD OR READ : THE WORKS OF SIR JAMES Y SIMPSON BART VOLUME I III PDF EBOOK EPUB MOBI

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Dear Rising Eighth Grade Students,

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Summer Reading Program 2014

British Literature Summer Reading

Cabin John Middle School Gainsborough Rd. Potomac, MD Phone SUMMER MUSIC PACKET 2017

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Edge Level B Unit 5 Cluster 3 The Tell-Tale Heart

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Baker Street Elementary & The Victorian Web Presents The Life and Times in Victorian London

Instant Words Group 1

CHAPTER I INTRODUCTION. language such as in a play or a film. Meanwhile the written dialogue is a dialogue

The Paper Enigma Machine

Sherlock Holmes On Screen: The Complete Film And TV History By Alan Barnes

Getting Around FibreWire TV. User Guide. onecomm.bm

GM 2000 Lane Controllers

cryptography, plaintext; ciphertext. key,

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Abby T. LA P a g e

The Little Apple Written by Mike Covell Illustrations by Jared Wehmeyer. Kids Sunday School Place, Inc. All Rights Reserved.

Edgar Allan Poe,

Magnolia. Diana Palmer. Click here if your download doesn"t start automatically

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Unit 1 Assessment. Read the passage and answer the following questions.

Authors crack the Bard's code

THE BENCH. Shawn Martin

SHERLOCK HOLMES PROSOCIAL BEHAVIOR TO HELP THE SOCIETY IN SIR ARTHUR CONAN DOYLE S A STUDY IN SCARLET

Read in the most efficient way possible. You ll want to use a slightly different approach to prose than you would to poetry, but there are some

Zodiackillersite. Backward E = 3/ G = 14 / Y K E = = 36 3/14/36

PRINTABLE CRYPTOGRAMS AND ANSWER KEY

JACOBEAN POETRY AND PROSE

SIR ARTHUR CONAN DOYLE

RAPTORS WHO PLAYED WHOM?

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Many books on cryptography were published prior to the 1609

Transcription:

Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols I Δ ℵ Ω Δ ℵ Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less familiar less friendly but the techniques for cryptanalysis remain the same as for any simple substitution cipher frequency analysis. Edgar Allan Poe (1809-1849) Edgar Allan Poe was an avid cryptologist. For six months, beginning in December, 1839, Poe wrote a cryptology column in Alexander s Weekly Messenger. In addition to expressing his own ideas about cryptology, Poe solicited cryptological challenges from his readers. Poe published his solutions in his column. About a year after his last column in Alexander s, Poe wrote A Few Words on Secret Writing for Graham s Magazine. In addition to this article, there were several follow-up articles about cryptology. It was during this time that one of Poe's readers, a Mr. W. B. Tyler, submitted two cryptographs. Poe never published solutions to Tyler's cryptographs. This fact alone makes them interesting - of the 100-plus cryptographs submitted by his readers, these are the only two not solved. Poe claimed that he did not have the time to work out their solution, but published them in Graham's for his readers to decipher. However, the most interesting aspect of these cryptographs is the possibility that they were not written by W. B. Tyler, but by Poe himself. There is only circumstantial evidence to corroborate the theory that Tyler was Poe's nom de plume. http://www.bokler.com/eapoe.html Tyler s first cryptogram was published in Graham s in December 1841.

It was solved in 1992 by Terrance Whalen. "The soul secure in her existence smiles at the drawn dagger and defies its point. The stars shall fade away, the sun himself grow dim with age and nature sink in years, but thou shalt flourish in immortal youth, unhurt amid the war of elements, the wreck of matter and the crush of worlds." According to Rosenheim's account in "The Cryptographic Imagination" Whalen's solution proceeded from recognition that the three-character pattern of "comma-dagger-section symbol", repeated seven times in eight lines, most likely represented the word "the" or "and". It turned out to be "the". http://www.bokler.com/eapoe.html Tyler s second cryptogram was solved in June, 2000, by Gil Broza.

http://www.bokler.com/eapoe.html Then, in July, Gil Broza, a software engineer living in Toronto, submitted what turned out to be the correct decryption. Tyler's cryptograph proved to be a polyalphabetic substitution cipher using several different symbols for each English letter. The number of different symbols is greater as the plaintext letter is more frequent in English text, for instance 'z' is encrypted by two symbols and 'e' by 14. Given the brevity of the cipher, this meant that there was almost no information about letter frequencies, which cryptographers count as their most potent tool for decryption. In addition, Broza s solution revealed that the original cipher had over two dozen mistakes introduced by the typesetters or the encipherer. Many of these were trivial (such as warb for warm, shaye for

share, langomr for langour ), but even after Broza corrected obvious errors, the final plaintext is sometimes garbled: It was early spring, warm and sultry glowed the afternoon. The very breezes seemed to share the delicious langour of universal nature, are laden the various and mingled perfumes of the rose and the essaerne (?), the woodbine and its wildflower. They slowly wafted their fragrant offering to the open window where sat the lovers. The ardent sun shoot fell upon her blushing face and its gentle beauty was more like the creation of romance or the fair inspiration of a dream than the actual reality on earth. Tenderly her lover gazed upon her as the clusterous ringlets were edged (?) by amorous and sportive zephyrs and when he perceived (?) the rude intrusion of the sunlight he sprang to draw the curtain but softly she stayed him. No, no, dear Charles, she softly said, much rather you ld I have a little sun than no air at all. http://www.bokler.com/eapoe.html Poe is also famous, at least among cryptologists, for his short story The Gold Bug. The focus of his story is the solution of a simple substitution cipher that holds the key to locating buried treasure. In the story, Poe provides an excellent tutorial in cryptanalyzing a simple substitution cipher.

Sherlock Holmes Sir Arthur Conan Doyle s fictional detective Sherlock Holmes also faced a simple substitution cipher in The Adventure of the Dancing Men. Holmes used his cryptanalysis of the dancing men cipher to trick a murder into being captured.

The Shadow The 1930s crime fighter The Shadow confronted several ciphers during his crime fighting career. Two of them appear in The Chain of Death.

The Dorabella Cipher In 1897, the English composer Edward Elgar (1857 1934; composer of the Enigma Variations) included a still unsolved cipher in a letter to a young friend Dora Penny. http://www.geocities.com/vienna/4056/cipher.html

The Kryptos Sculpture In 1990, sculptor James Sanborn installed the Kryptos sculpture at the Central Intelligence Agency. The sculpture contains four encrypted messages. Three of the four have been solved. Well, as it turns out not quite. The sculptor James Sanborn, for aesthetic reasons, left a letter out of part 2 of the sculpture thinking that the missing letter would pose no problem to cryptanalysis of that portion of the sculpture. But, it did. It turns out that the missing letter led to a mistaken cryptanalysis. Part 2 s alleged plaintext was incorrect. Sanborn, who hadn t paid attention to the plaintext messages that had been decrypted, discovered the error in 2006 and announced it. See the sculpture at https://www.cia.gov/cia/information/tour/krypt.html Track the cryptanalysis at http://www.elonka.com/kryptos/

The Beale Ciphers In 1885, a pamphlet titled The Beale Papers was published in Lynchburg, Virginia. The pamphlet contains three ciphers that it claims have information that would lead to a large buried treasure in Bedford County. The pamphlet might well be a hoax, but the story and challenge of the ciphers has intrigued cryptologists since the pamphlet s publication.

Pig Pen Ciphers The cipher appearing in The Gold Bug, for example, does not have a memorable key. Unless the symbols have been designed with a pattern that facilitates memorization, it is usually difficult to remember substitutions that use strange symbols. One cipher that uses symbols but it easily memorized is the Pig Pen Cipher. It was used by the Freemasons in the Eighteenth Century, in the United States Civil War, and (more recently) by the Boy Scouts. The description that follows is taken from Codes, Ciphers and Secret Writing by Martin Gardner. Notice that the symbols are cells of two 3 3 pens of nine cells each (in one collection of cells, the cells are empty, and in the other collection of cells each cell contains a dot) and two collections of four cells formed by s (again, in one collection of cells, the cells are empty, and in the other collection of cells each cell contains a dot). Different cryptographers use slightly different versions of the twenty-six cells, but the basic idea is the same. The various versions of this cipher each use two collections of 9 cells with some way to distinguish between the two collections and two collections of 4 cells with some way to distinguish between the two collections and some memorable way of placing the letters of the plaintext alphabet in the cells. The pattern that aids in remembering the key can be used in cryptanalysis.

A similar cipher was used by the Rosicrusians. It uses three 3 3 pens of nine cells. Again, different cryptographers use slightly different versions, but here is one version of the key. abc def ghi jkl mno pqr stu vwx yz The left-hand letter in each cell correspond to having one dot on the left side of the cell. The middle letter in each cell corresponds to having one dot in the center of the cell. And, the right-hand letter in each cell corresponds to having one dot on the right side of the cell. For example, a is replaced by i, n is replaced by i, and u is replaced by i. Norse becomes i i i i The various versions of this cipher each use three collections of 9 cells with some way to distinguish among the three collections and some memorable way of placing the letters of the plaintext alphabet in the cells. The pattern that aids in remembering the key can be used in cryptanalysis.

Exercises 1. Cryptanalyze the following message: i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 2. Cryptanalyze the following message: 4 2 6 42 21 35 7 5 3 3 2 4 4 3 6 74 4 1 6 1 3 5 2 5 6 1 1 1 2 1 6 1 6 342 3 3 3 1 1 1 2 4 1 7 65 4 1 3 5 73 6 5 2 7 3 3 1 4 1 2 6 1 3 4 6 3 4 2 3 5 13 6 1 35 1 1 3423 7 5 3 2 6 41 6 1 5 75 4 6 4 2 1 5 6 3 44 35 6 1 1 3 34 2 5

3. Cryptanalyze the following message: