Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Similar documents
An Introduction to Cryptography

CS408 Cryptography & Internet Security

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Many books on cryptography were published prior to the 1609

PA Substitution Cipher

Institute of Southern Punjab, Multan

Sherlock Holmes and the adventures of the dancing men

CSc 466/566. Computer Security. 4 : Cryptography Introduction

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

The Web Cryptology Game CODEBREAKERS.EU edition 2015

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Cabinet War Rooms SIGSALY. The A-3 scrambler

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Sequences and Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

New Address Shift Linear Feedback Shift Register Generator

Exploring the Enigma [The MATH Connection]

Most people familiar with codes and cryptography have at least heard of the German

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

FOR OFFICIAL USE ONLY

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

A reprint from American Scientist

Substitution cipher. Contents

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

How I Broke the Confederate Code (137 Years Too Late)

Performance Evaluation of Stream Ciphers on Large Databases

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Pseudorandom bit Generators for Secure Broadcasting Systems

Appendix Cryptograms

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Permutation-based cryptography for the Internet of Things

The Paper Enigma Machine

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

V.Sorge/E.Ritter, Handout 5

Facts and Myths of Enigma: Breaking Stereotypes

Ciphers that Substitute Symbols

cryptography, plaintext; ciphertext. key,

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Cryptography Through the Ages: A Layman's View

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Update to 8 June 2011 Press Release

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

The National Cryptologic Museum Library

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Baudot code channels

6.115 KryptoPhone Final Project Report

EATCS Monographs on Theoretical Computer Science

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

WINGS TO YOUR THOUGHTS..

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages:

The Swiss cipher machine NeMa

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

Stream Ciphers. Debdeep Mukhopadhyay

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

Fault Analysis of Stream Ciphers

WG Stream Cipher based Encryption Algorithm

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE PATENT TRIAL AND APPEAL BOARD. ITRON, INC., Petitioner. CERTIFIED MEASUREMENT, LLC, Patent Owner

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

Alan Turing s Work on Voice Encryption. Craig Bauer

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

BeepBeep: Embedded Real-Time Encryption

Multiple Image Secret Sharing based on Linear System

Note: This document should only be used as a reference and should not replace assignment guidelines.

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Testing of Cryptographic Hardware

The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext

THE HEROIC AGE OF EXPLORATION. Sample file

Optimum Composite Field S-Boxes Aimed at AES

David Chaum s Voter Verification using Encrypted Paper Receipts

Transcription:

Cryptography A Bit of History 1 Seminal Text on Cryptography The Codebreakers: The Story of Secret Writing by David Kahn 1967 2 Early Cryptology - India Secret writing was well known and practiced in India India had a well organized espionage service - the country was riddled with spies The erotic textbook, the Kama-sutra, lists secret writing was one of the 64 arts that women should know and practice it is 45th in a list that begins with vocal music and runs through poetry 3 1

Early Cryptology - Hebrews Hebrew literature records three forms of letter substitutions atbah - the letters are numbered and the first nine are paired so that their value adds to 10, the remaining are paired so their value adds to 28 atbash - the last letter in the alphabet replaces the first, the next to the last replaces the second... albam - splits the alphabet in half and equates the two halves 4 The first recorded cryptographer was Early Cryptology - Greeks the Histories of Herodotus mention several methods of secret writing During a revolt against the Persians, word was sent by shaving the head of a slave, tattooing the message on his head and waiting for the hair to grow One of the most important messages in the history of early Western civilization was transmitted secretly. A Greek exile in Persia sent a warning 5 back to Sparta that Xerxes was going to invade Early Cryptology - English During the Middle Ages, cryptology, along with other arts and sciences, died out. The English monk, Roger Bacon, wrote about secret writing in the mid-1200 s (Secret Works of Art and the Nullity of Magic) Chaucer enciphered six short passages 6 2

Early Cryptosystems The Spartans were the first to use cryptography in the military They developed a device called a skytale it consists of a staff of wood around which a strip of papyrus or parchment is wrapped the secret message is written on the parchment down the length of the staff 7 when the parchment is unwrapped it appears Skytail Example T H I S I S F U N N Y Given the message: THIS IS FUNNY S T F H U I N S N I Y 8 Greek Cryptosystems The first text on cryptology was written by the Greeks a chapter in one of the earliest works on military science On the Defense of Fortified Places listed several systems One suggestion was to replace the vowels of the message with dots, one for alpha, two for epsilon, etc Another suggestion was to prick holes in a 9 3

Polybus Square Another Greek writer, Polybius, first suggested a method that is commonly used the letters are arranged in a square, numbering the rows and columns letters in a message are replaced by their row and column numbers 1 2 3 4 5 1 a b c d e 2 f g h i k 3 l m n o p 4 q r s t u 5 v w x y z THIS - 44 23 24 43 10 Black Chambers As Europe began to emerge from the Dark Ages, governments began to build large networks of spies They would communicate with their agents using ciphers so it was only natural that organizations would be developed whose goal was to read the ciphers of other nations These organizations were called black chambers and they became quite common during the 1700s The best was the Austrian black chamber in Vienna 11 Vienna Black Chamber 1 At 7 a.m., the mail on its way to the embassies in Vienna was first brought to the black chamber the letters were opened by melting their seals with a candle important parts of the letters were copied they were replaced, resealed with forged seals, and returned to the post office by 9:30 a.m. At 10 a.m. mail passing through Vienna to other points on the continent arrived. It was opened, read, resealed, and returned by 2 p.m. 12 4

Vienna Black Chamber 2 At 11 a.m. interceptions made by the police arrived At 4 p.m. letters send out by the embassies were brought in, opened, read, resealed and returned by 6:30 p.m. Overall, this 10 man organization handled an average of 80 to 100 letters a day 13 England England also had a Black Chamber Started in the mid-1600 s by John Wallis, perhaps the greatest English mathematician before Newton 14 Were the Black Chambers Legal? The statute of 1657 which established the postal service declared outright that the mails were the best means of discovering dangerous and wicked designs against the commonwealth The Post Office Act of 1711 permitted the government to open mail under warrants that they themselves issued so the government issued all-inclusive general warrants this is the legal precedent for today s wiretaps 15 5

16 Secure Systems Ciphers are only part of a complete security package System Hardware/Software Protocol Process for multi-round message exchange OP: encipher,... Actual Transformation Cipher: DES, RSA,... Cipher Algorithms 17 A Good Cipher Enciphering and deciphering should be efficient for all keys - it should not take forever to get a message. Easy to use. The problem with hard to use cryptosystems is that mistakes tend to be made. The strength of the system should not lie in the secrecy of your algorithms. The strength of the system should only depend the secrecy of your key. Kerckhoffs' Principle 18 6

Cipher Classification Ciphers Public Key Symmetric Key Unkeyed PublicKey Signature ID Random OneWay Hash Random Signature MAC Symmetric Classical Stream Block Transposition Substitution 19 Cipher Environment The typical communication environment for discussing ciphers is plaintext Alice eavesdrop Bob Eve 20 Cipher System If Alice and Bob use a cipher system, this environment becomes: Alice plaintext cipher key ciphertext cipher eavesdrop plaintext key Bob Eve 21 7

A simple cipher 22 Example Cipher A substitution cipher is one in which each character in the plaintext is substituted for another character in the ciphertext The Caesar Cipher replaces each plaintext character by the character 3 positions to the plaintext right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext D E F G H I J K L M N O P Q R S T U V W X W Z A B C 23 Example Operation plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ciphertext D E F G H I J K L M N O P Q R S T U V W X Y Z A B C MESSAGE the word privacy does not appear in the united states constitution wkh zrug sulydfb grhv qrw dsshdu lq wkh xqlwhg vwdwhv frqvwlwxwlrq NOTE: the shift could be any value from 1 to 25 NOTE: It helps to remove spaces - WHY?? wkhzr ugsul ydfbg rhvqr wdssh dulqw khxql whgvw dwhvf rqvwl wxwlr q 24 8

Cryptanalysis How would you break the Caesar cipher? Try all 25 possible shifts This is easy to do by hand or by computer 25 Ciphertext Attacks There are five types of general attacks on a cipher designed to discover the key 1. ciphertext only: the cryptanalyst has only the cipher text 2. known-plaintext: the cryptanalyst knows both the ciphertext and its plaintext 3. chosen-plaintext: the cryptanalyst selects the plaintext used to create the ciphertext 4. adaptive-chosen-plaintext: the plaintext is selected based on previous plaintext-ciphertext pairs 5. chosen-ciphertext: the cryptanalyst selects the ciphertext to decode with known plaintext 26 9