Cryptography & Cryptanalysis

41
Cryptography & Cryptanalysis Classics

description

Cryptography & Cryptanalysis. Classics. The Evolution of Secret Writing. 1. Steganography. 2. Cryptography “The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption”. Transposition - PowerPoint PPT Presentation

Transcript of Cryptography & Cryptanalysis

Page 1: Cryptography &  Cryptanalysis

Cryptography&

Cryptanalysis

Classics

Page 2: Cryptography &  Cryptanalysis

The Evolution of Secret Writing

1. Steganography

Page 3: Cryptography &  Cryptanalysis

2. Cryptography “The aim of cryptography is not to hide the

existence of a message, but rather to hide its meaning, a process known as encryption”

Page 4: Cryptography &  Cryptanalysis

• Transposition

Cow cow, cwo, owc, ocw, wco, woc.

• Substitution

c Xo Gw P

cow XGP

Page 5: Cryptography &  Cryptanalysis

“For example, consider this short sentence”has

50,000,000,000,000,000,000,000,000,000,000rearrangements.

Page 6: Cryptography &  Cryptanalysis

Rail Fence Transposition

Page 7: Cryptography &  Cryptanalysis

Spartan Scytale

Page 8: Cryptography &  Cryptanalysis

Substitution

Cipher

meet at midnight CUUZ VZ CGXSGIBZ

Page 9: Cryptography &  Cryptanalysis

CAESAR Shift Cipher

Page 10: Cryptography &  Cryptanalysis
Page 11: Cryptography &  Cryptanalysis

Kerckhoffs’ Principle: The security of a cryptosystem must not depend on keeping secret the cryptoalgorithm. The security depends only

on keeping secret the key.

Page 12: Cryptography &  Cryptanalysis

JULIUS CAESAR

JULISCAER

Page 13: Cryptography &  Cryptanalysis

Muslims

Monoalphabetic Substitution Cipher

a #b +

Cryptanalysis

The Science of Unscrambling a message without knowledge of the key.

Page 14: Cryptography &  Cryptanalysis

Frequency Analysis

al-Kindı’s“A Manuscript on Deciphering Cryptographic

Messages”

Page 15: Cryptography &  Cryptanalysis

English

Page 16: Cryptography &  Cryptanalysis
Page 17: Cryptography &  Cryptanalysis
Page 18: Cryptography &  Cryptanalysis
Page 19: Cryptography &  Cryptanalysis

P is a consonant.

Page 20: Cryptography &  Cryptanalysis

• Combination OO appears twice, whereas XX does not appear at all.• X and Y appear on their own in the ciphertext. (a and I are the only English

word that consisit of a single letter)• In the English language, the letter h frequently goes before the letter e (as

in the, then, they, etc.), but rarely after e.

h

Page 21: Cryptography &  Cryptanalysis

O=e, X=a, Y=i, B=h.

the most common three-letter words in English are the and and, and these are relatively easy to spot—Lhe, which appears six times, and aPV, which appears five times.

P=n, V=d, L=t.

Page 22: Cryptography &  Cryptanalysis

• Every word has a vowel in it, so C in Cn is a vowel. The only vowels remaining are o and u. u does not fit so C = o.

• We also have the word Khe, which implies that K represents either t or s. But we already know that L = t, so it becomes clear that K = s.

• thoMsand and one niDhts thousand and one nights

Page 23: Cryptography &  Cryptanalysis

A VOID BY GEORGES PEREC AVOIDBYGERSPC

Page 24: Cryptography &  Cryptanalysis
Page 25: Cryptography &  Cryptanalysis

1. Begin by counting up the frequencies of all the letters in the ciphertext. About five of the letters should have a frequency of less than 1 percent, and these probably represent j, k, q, x and z. One of the letters should have a frequency greater than 10 percent, and it probably represents e. If the cipher-text does not obey this distribution of frequencies, then con-sider the possibility that the original message was not written in English.

2. the most common repeated letters are ss, ee, tt, ff, ll, mm and oo.3. The only one-letter words in English are a and I. The commonest two-letter

words are of, to, in, it, is, be, as, at, so, we, he,by, or, on, do, if,me,my, up, an, go, no, us, am . The most common three-letter words are the and and.

Page 26: Cryptography &  Cryptanalysis

Code

• One of the simplest improvements to the security of the monoalphabetic substitution cipher was the introduction of nulls, symbols or letters that were not substitutes for actual letters, merely blanks that represented nothing.

Page 27: Cryptography &  Cryptanalysis
Page 28: Cryptography &  Cryptanalysis
Page 29: Cryptography &  Cryptanalysis

The Pigpen Cipher

Page 30: Cryptography &  Cryptanalysis

New Ciphers

Leon Battista Alberti

hello AFPAD

Page 31: Cryptography &  Cryptanalysis
Page 32: Cryptography &  Cryptanalysis
Page 33: Cryptography &  Cryptanalysis
Page 34: Cryptography &  Cryptanalysis
Page 35: Cryptography &  Cryptanalysis
Page 36: Cryptography &  Cryptanalysis

L1-L2-L3-L4-L5

Page 37: Cryptography &  Cryptanalysis
Page 38: Cryptography &  Cryptanalysis
Page 39: Cryptography &  Cryptanalysis
Page 40: Cryptography &  Cryptanalysis

EMILY

Page 41: Cryptography &  Cryptanalysis

THANK YOU!!