CSIS 5857: Encoding and Encryption - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

CSIS 5857: Encoding and Encryption

Description:

(that is, number of characters before repetition) Enigma. Developed by Germany in WW2 ... 26 x 26 x 26 = 17,576 characters entered before repetition ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 15
Provided by: AmyandJoh6
Category:

less

Transcript and Presenter's Notes

Title: CSIS 5857: Encoding and Encryption


1
CSIS 5857 Encoding and Encryption
  • Lecture 4
  • History and Background Part 2 -- Polyalphabetic
    Substitution Ciphers

2
Polyalphabetic Substitution
  • Single plaintext character may map to multiple
    possible ciphertext characters
  • Frequency analysis attacks much harder
  • Example Vigenére cipher
  • Key some word or phrase of length n
  • Ci (Pi Ki mod n) mod 26

3
Vigenére cipher
4
Vigenére cipher
  • Example
  • Key python
  • Plaintext rabbitwithbigpointyteeth
  • Ciphertext

5
Polyalphabetic Substitution
  • Vigenére cipher still vulnerable to
    frequency-based cryptanalysis
  • Guess key size n
  • Treat like n different monoalphabetic
    substitutions
  • General principleLarger n ? more secure

(that is, number of characters before repetition)
6
Enigma
  • Developed by Germany in WW2
  • Arguably most complex pre-computer substitution
    cipher

Flash simulation at http//enigmaco.de/enigma/eni
gma.html
7
Enigma
8
Enigma
  • Consists of 3 to 5 rotors
  • Each rotor is a monoalphabetic mapping of a
    plaintext character to a ciphertext character
  • Output of one rotor fed into input of next rotor
    so final output the result of 3 to 5
    monoalphabetic substitutions
  • Rotors turn after each character!
  • Fast rotor every character
  • Middle rotor every 26 characters
  • Slow rotor every 26 x 26 676 characters

9
Enigma
10
Enigma
  • C typed as first character
  • C connected to 26 on fast rotor ?
  • 26 connected to 7 on middle rotor ?
  • 7 connected to 20 on slow rotor ?
  • 20 connected to E (then reflected back through)
  • C typed as second character (after fast rotator
    turns one character)
  • C connected to 25 on fast rotor ?
  • 25 connected to 23 on middle rotor ?
  • 23 connected to 9 on slow rotor ?
  • 9 connected to O (then reflected back through)

11
Enigma
  • 26 x 26 x 26 17,576 characters entered before
    repetition
  • Essentially invulnerable to frequency-based
    cryptanalysis (particularly if rotors changed at
    regular intervals)
  • Required Alan Turings Bletchley Group to crack
  • Captured machines to understand patterns
  • Large numbers of known plaintexts
  • Exhaustive searches using primitive computers

12
One-Time Pad
  • Idea Make key as long as the message
    itself!(Joseph Mauborgne)
  • Unconditionally securesince inherently ambiguous
    for attacker

13
One-Time Pad
  • Example
  • Ciphertext NZAKBMK
  • Possible Vigenére keys wtnkxmm and nlvwker
    Ciphertext NZAKBMK NZAKBMK Possible keys
    nlvwker wtnkxmmPlaintext goforit runaway
  • Which key is correct?We have no way of
    knowingsince both are plausible plaintext!

???
14
One-Time Pad
  • Only get to use a key for one message
  • Unlikely that different possible keys would still
    both result in plausible plaintext for more than
    one message
  • Adversary could find correct key by process of
    elimination
  • Ciphertext WMGKZX WMGKZX Possible
    keys nlvwke wtnkxm Plaintext jblopt
    attack
  • Would need to securely distribute a new key for
    each message!

This is the one!
Write a Comment
User Comments (0)
About PowerShow.com