VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Similar documents
An Introduction to Cryptography

Sherlock Holmes and the adventures of the dancing men

CS408 Cryptography & Internet Security

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Substitution cipher. Contents

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

PA Substitution Cipher

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Cryptography. The Codebreakers: The Story of Secret Writing. by David Kahn A Bit of History. Seminal Text on Cryptography

Most people familiar with codes and cryptography have at least heard of the German

Playfair Cipher. From the earliest forms of stenography to the most advanced forms of encryption, the

Cryptology Notes ~ 1. Frank Tapson 2003 [trolc0:2]

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

Institute of Southern Punjab, Multan

Exploring the Enigma [The MATH Connection]

Cabinet War Rooms SIGSALY. The A-3 scrambler

Attacking of Stream Cipher Systems Using a Genetic Algorithm

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

CSc 466/566. Computer Security. 4 : Cryptography Introduction

FOR OFFICIAL USE ONLY

Many books on cryptography were published prior to the 1609

The Paper Enigma Machine

The Web Cryptology Game CODEBREAKERS.EU edition 2015

The Swiss cipher machine NeMa

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

The Evolution of the Cryptologic Bombe. Chris Christensen Department of Mathematics Northern Kentucky University

Dorabella Cipher. Cryptography peppers the world s history as an aid to military communication

How I Broke the Confederate Code (137 Years Too Late)

Ciphers that Substitute Symbols

Update to 8 June 2011 Press Release

Note: This document should only be used as a reference and should not replace assignment guidelines.

Key- The key k for my cipher is a single number from 1-26 which is shared between the sender and the reciever.

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

Grade School Crypto. Part 1. Dr. Rick Smith, Cryptosmith October, 2013

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

LFSR stream cipher RC4. Stream cipher. Stream Cipher

Relies on hiding a message by jumbling up individual letters of the message. Sending a whole message with the letters jumbled up using a cipher

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

Teaching and Promoting Cryptology at Faculty of Science University of Hradec Králové

Perfect Localized Security of the Fourtytwofish Cipher in the Delphic Oracle Model

The Tentatve List of Enigma and Other Machine Usages, formatted by Tony Sale. (c) July March l945 page 1

cryptography, plaintext; ciphertext. key,

New Address Shift Linear Feedback Shift Register Generator

Le Sphinx. Controls. 1 sur 5 17/04/ :59. Pocket cipher device

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Decrypted Secrets. Friedrich L. Bauer. Methods and Maxims of Cryptology. Fourth, Revised and Extended Edition

Code-makers & Codebreakers. Substitution ciphers and frequency analysis

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Sequences and Cryptography

CRYPTOGRAPHY AND STATISTICS: A DIDACTICAL PROJECT. Massimo BORELLI, Anna FIORETTO, Andrea SGARRO, Luciana ZUCCHERI

CRYPTOGRAPHY IN CREATIVE MEDIA. Olivia Grace Vanarthos. Honors Thesis. Appalachian State University

Sources. Computer Security. Ancient China. Ancient Egypt. A [Not So?] Short History of Cryptography. Used a technique of hiding messages:

Facts and Myths of Enigma: Breaking Stereotypes

Hidden Codes and Grand Designs

Cryptography Through the Ages: A Layman's View

Appendix Cryptograms

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

The National Cryptologic Museum Library

History Curriculum Overview

5 The Printing Press and Cryptography

Multiple Image Secret Sharing based on Linear System

CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI. July 01, 1996 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 15 STATISTICAL ATTACKS

A reprint from American Scientist

Pseudorandom bit Generators for Secure Broadcasting Systems

ENIGMA RELOADED I N T E R N A T I O N A L E V E N T

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Style Guides APA Format

Authors crack the Bard's code

Stream Ciphers. Debdeep Mukhopadhyay

Texts in Theoretical Computer Science An EATCS Series

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

Style Guides APA Format

The Code Book: The Science Of Secrecy From Ancient Egypt To Quantum Cryptography Download Free (EPUB, PDF)

History 348: The Hispanic World,

The reduced Enigma. Keywords: Education, Enigma, Public Understanding of Cryptography, reduced Enigma

How to Predict the Output of a Hardware Random Number Generator

EATCS Monographs on Theoretical Computer Science

Performance Evaluation of Stream Ciphers on Large Databases

The Geheimschreiber Secret

, etc.,nor ,etc.

An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext

V.Sorge/E.Ritter, Handout 5

You are about to start an exciting series of lessons on physical science. God s Design for the Physical

APA Style Guidelines

University of Toronto

(12) United States Patent (10) Patent No.: US 6,409,089 B1. Eskicioglu (45) Date of Patent: Jun. 25, 2002

Permutation-based cryptography for the Internet of Things

THE MIDDLE AGES. Chronology, Historical and cultural aspects

The Evolution of Egyptian Hieroglyphs

Primary and Secondary Sources. What are they?

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

A J T L Grades 2-7 Ancient Rome Learning Lapbook with Study Guide Sample Page A Journey Through Learning

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

Testing of Cryptographic Hardware

Transcription:

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are presenting the first subject of the encyclopedia: a walkthrough of the History of Cryptography, from its first steps till World War I. Come with us! 1. THE BEGINNING Nowadays, cryptography can be found everywhere in our world. Everyday actions like receiving or making a call from a mobile telephone, paying with a credit or debit card, withdrawing money from an ATM or logging on to a computer with a password, for example, use techniques based on this science. When did mankind invent these techniques and when did societies begin to use them? How were they first used? I recall that the answer is found in the origin of writing. That s right, Bob. Writing is, according to many, the most important invention of Humankind. Writing renders proof of events, opinions, ideas and so on, across time and space, while helping knowledge to progress and civilizations to advance. However, when writing developed Script intypedia001en 1

and had become generalized, the danger of others reading the texts was acknowledged. And thus, the first systems to protect writing were invented. Right. Usually, the information that is being protected is referred to as plaintext and when the information has been encrypted, we talk about ciphertext. Only the recipient, who possesses the information called cryptographic key or key can reveal the encrypted information. We would have to go back to the 5th century BC, to Sparta, to see the first methodical ciphered system. It consisted of a cylinder with a strip of leather wound around it, like a bandage and a message written on it. The unwound strip would look like a long string of letters without any meaning. But when the recipient wound the strip around a cylinder of the same size as the first one, the message would be decrypted. The diameter of the cylinder, therefore, was the key. 2. MONOALPHABETIC METHODS The scytale method was used by the government officials of Sparta to communicate with their military officers. It was not until a couple of centuries later that another popular encryption method arises: the Caesar cipher, named after Julius Caesar. It consisted in replacing each letter in the text by another letter, 3 positions down the alphabet. That is, replacing the A with a D, the B would become an E, and so on, until the end of the alphabet where X, Y and Z would be replaced by A, B and C respectively. Both methods, the scytale and the Caesar, are examples of the two main cipher methods: transposition and substitution. The transposition technique consists of shifting the position of the letters in the text following a certain pattern. This way, the ciphertext has the same letters as the plaintext, but with permuted positions. These encryption methods are called transposition or permutation ciphers and the previously described scytale would be an example of this. The substitution methods, on the other hand, maintain the position of the letters in the text, but their appearance changes. That is, each letter is replaced by another letter, a number or a symbol. If each letter is replaced by only one cipher symbol, the method is considered monoalphabetic, like the Caesar method. Oh, I see. But nowadays, this method isn t very appropriate, is it? Script intypedia001en 2

No, this method isn t very secure. The answer can be found within cryptanalysis. Excuse me, Alice, I don t quite understand. What is cryptanalysis? Allow me to explain. Over the years, many people have tried to reveal the protected secrets without knowing the key with which they are encrypted. This field of study is called cryptanalysis and the people who perform them are cryptanalysts. Cryptology is the name of the science enclosing both cryptography and cryptanalysis. From the decline of the Roman Empire up to the Renaissance, cryptology only advanced significantly within the Islamic caliphates, especially with the Abbasids. In their capital, Baghdad, modern cryptanalysis was born in the 9th century when they discovered that in each language, letters appeared with a different frequency. This way, they only had to count the number of times a symbol, letter or number appeared in a text, to know which letter it represented, regardless of its appearance. Now I understand why they say that monoalphabetic cipher isn t secure. 3. POLYLPHABETIC METHODS Obviously, from that moment on, monoalphabetic ciphers were broken and cryptanalysts had won the battle over cryptographs. Naturally, cryptographs couldn t disregard substitution methods making all cryptography rely only on transposition, so they developed the polyalphabetic ciphers. Does this mean that a more secure cryptographic method could be made using many different alphabets to hide the frequency in which the letters appear? That s it! And it really isn t all that difficult. In polyalphabetic methods, each time a plain letter appears, it is replaced by an encrypted character -be it a letter, a number or a symbol- from a limited range of characters. This way, a plain letter like a, is sometimes replaced by x, but other times by y or by the number 10. And always following a strict pattern so there aren t any errors when deciphering. This way, the number of times a symbol appears in the text can t give any useful information to the cryptanalyst. Script intypedia001en 3

So, which were the most popular polyalphabetic systems? The methods that use this system were conceived by one of the most important figures of the Renaissance: Leone Battista Alberti, inventor of the first cipher device: the Alberti cipher disk, also called formula. It was made up of two concentric disks. The inner disk had a lowercase mixed alphabet for ciphertext and was fixed, while the outer disk had one uppercase alphabet for plaintext and could move around its centre point. This way, each letter of the plaintext alphabet corresponds to another letter of the ciphertext alphabet, while being able to change this correspondence by sliding the outer ring. Therefore, it was a polyalphabetic method. Another popular system was the one created by Blaise de Vigenère based on a table in which you could read the intersection letter of the plaintext with a key indicating which alphabet was being used. 4. EXTENDED USE OF CRYPTOGRAPHY Alice, is it true, then, that the consolidation of secret writing was an essential instrument of power in the creation of modern countries, communication between armies and the presence of permanent embassies? Certainly. Cipher secretaries were established and they were responsible for ciphering the correspondence between kings, ministers and ambassadors, as well as cryptanalysing the correspondence intervened to other countries. In Spain, for example, the first known Cipher Secretary was Pérez de Almazán, appointed by the Catholic Monarchs. But Philip II of Spain was the one to renew and greatly boost ciphering techniques, by putting the Cipher Secretary Luis Valle de la Cerda in charge. He established a General Cipher for communication between his secretaries, ambassadors, army officers and himself; and a Personal Cipher for communication between some of the afore-mentioned dignitaries and himself. Furthermore, for extra security, he would change frequently these ciphers. Did they use these methods of protection in other countries as well? Script intypedia001en 4

Of course they did. They followed these methods in the other European kingdoms. For example, Walsingham with Elizabeth I of England and Viétè with Henry III and Henry IV of France both made cryptology an essential matter in European royal courts and embassies. I know there was a famous ciphering machine. When did the first ones appear? Although cryptology continued developing throughout Modern and Contemporary Age, it isn t until the 20th century that we find substantial advances in ciphering techniques. So it is considered, in fact, the machine century. Being the Enigma machine the one that captured most of the attention, more than any of the other machines from past or present. Enigma was a cipher machine patented by Arthur Scherbius in 1918. It was used by the German Army in 1923, which had several thousands of them during World War II, where it played a very important role. That sounds familiar. The Germans tried out how the machine worked in battle during the Spanish Civil War, providing the Nationalists with some devices. That s right. The history of this machine and its use is fascinating. We ll study it in detail later on. In fact, it is after World War II, when the most significant theoretical advances in the history of cryptology take place. For example, in 1948, Claude Shannon establishes the theoretical basics of cryptology, but that s another subject. Well, Alice. I think this is enough for today. Yes, you re right Bob. We better continue this some other time. On the intypedia website you can find a document with additional information on this enthralling subject. See you at our next video Good-bye! See you later! Script intypedia001en 5

Script adapted from original. Dr. Arturo Ribagorda Garnacho, Carlos III University of Madrid, Spain. Madrid, Spain, September 2010 http://www.intypedia.com http://twitter.com/intypedia Script intypedia001en 6