Title: FNNC LNQMHMG
1FNNC LNQMHMG !
- Sghr kdbstqd hr zants dmbqxoshnm
2The Caesar Cipher (Suetonius)
- If Caesar had anything confidential to say, he
wrote it in cipher, that is, by so changing the
order of the letters of the alphabet, that not a
word could be made out. If anyone wishes to
decipher these, and get at their meaning, he must
substitute the fourth letter of the alphabet,
namely D, for A, and so with the others.
3Caesar cipher
- Replace each letter by the letter that comes some
fixed distance before or after it in the
alphabet.
Shift 3
Gallia est omnis divisa in partes tres JDOOLD
HVW RPQLV GLYLVD LQ SDUWHV WUHV
4Cryptography and National Security
5 Unless the issue of encryption is resolved soon,
criminal conversations over the telephone will
become indecipherable by law enforcement. This,
as much as any issue, jeopardizes the public
safety and national security of this country.
FBI Director Louis Freeh, March 30, 1995
6The Stakes Rise After 9/11
- Sept. 13, 2001 Sen. Judd Gregg (NH) calls for
encryption regulations, saying encryption makers
should be required to include decryption methods
for government agents. - US market force would be used to constrain
foreign makers of encryption products
7A month later, encryption is OK!
- October 24, 2001 USA PATRIOT Act passes
- Vastly enhanced authorization for government
surveillance in the interest of national security - Not one word about encryption!
- Why did US Congress drop its efforts to control
encryption, barely a month after the attack on
the US?
8Electronic Commerce!
9Geoffrey Chaucer, Treatise on the Astrolabe, 1391
10Letter Frequencies
Source Wikipedia
11Geoffrey Chaucer, Treatise on the Astrolabe, 1391
12Geoffrey Chaucer, Treatise on the Astrolabe, 1391
13e
e
e
e
e
e
e
e
e
e
e
e
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
14e
t
t
e
t
t
e
t
t
e
e
e
t
e
t
t
e
e
e
e
e
t
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
15e
t
t
h
h
e
t
t
e
t
t
e
e
e
t
e
h
t
t
h
e
e
e
e
e
t
h
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
16e
t
t
h
h
e
t
o
t
e
t
o
o
t
e
e
e
t
o
e
h
t
t
h
e
o
e
o
o
e
e
e
t
h
o
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
17e
i
s
s
t
t
h
h
i
e
t
o
t
e
t
o
o
t
i
e
e
e
t
o
e
h
t
t
h
e
o
e
o
i
o
e
e
i
s
e
t
h
o
i
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
18e
i
s
s
r
t
t
h
h
i
e
t
o
t
r
e
t
o
o
r
t
i
e
e
e
t
o
e
h
t
t
h
e
o
e
o
i
o
e
e
i
s
r
e
t
h
o
i
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
19e
i
s
s
r
a
t
t
h
b
l
v
i
h
e
t
o
t
r
e
t
o
o
r
t
i
n
e
n
f
e
e
t
o
a
e
h
a
b
l
u
q
t
f
t
h
e
o
e
o
i
n
c
o
n
m
f
e
e
i
s
r
e
t
h
o
i
d
n
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
20Substitution cipher
- Replace each character of the message by another
character - In general
- Original message is called the plaintext
- Encrypted result is called the ciphertext
- Substitution ciphers easily cracked by frequency
analysis
21Cryptosystems
22Cracking ciphers
- Frequency analysis has been known since the 9th
century. - Al Kindis Manuscript on Deciphering
Cryptographic Messages
Yaqub Ibn Ishaq al-Kindi (801-873)
23Mary Stuart, 1587
24- Russian monoalphabetic substitution key,
recovered by Englands Decyphering Branch, 1728 - From David Kahn, The Codebreakers
25(No Transcript)
26The so-called Binnu code assigns a number in
order to each letter in the Italian alphabet and
adds three to that number in the ciphertext so
that "A" is 4, "B" is 5 and so on. -- The
Register
- If Caesar had anything confidential to say, he
wrote it in cipher, that is, by so changing the
order of the letters of the alphabet, that not a
word could be made out. If anyone wishes to
decipher these, and get at their meaning, he must
substitute the fourth letter of the alphabet,
namely D, for A, and so with the others.
27The Koan of the Yogi
- In theory there is no difference between theory
and practice. In practice, there is.
28Cryptologic lessons
- Breakthroughs can render previously reliable
cryptographic methods insecure - News of cryptanalytic breakthroughs travels
slowly - Making strong encryption systems available does
not guarantee they will be used
29Vigenère Encryption
- Use several Caesar substitutions and cycle
through them - Sequence of substitutions determined by a secret
key
Blaise de Vigenere (1523-1596)
30Fight fiercely, Harvard! Fight! Fight! Fight!
X
W
T
N
U
N
Z
H JQRR ZPRU NOEJ GQXK LTVM IBWL YVG
31Breaking Vigenère (1)
- If the key has length K, then the ciphertext
letters K positions apart are specified by the
same character in the key - And thus is the result of a simple substitution
- And thus can be attacked by frequency analysis
- Example Suppose the key length is three
DJBK FJWO VJSW FKDS GFJD RKEM CNEJ JKSJ FKDJ SJSS
So the decryption reduces to doing frequency
analysis K times provided we know K
32Breaking Vigenère (2)
- To find the length of the key
- Try different values for K, looking at every Kth
letter of the ciphertext, and pick the one for
which the frequency distribution looks like the
frequency distribution for English. - Clever methods to do this by hand
- Babbage, Kasiski counting double letters (1850s,
1860s) - Friedman Index of Coincidence (1920s)
- With computers, we dont need to be clever Can
do brute-force statistics
33Theory vs. Practice1917
34One-Time Pad Key as long as plaintext
- The Only Provably Secure Cryptosystem
- No patterns, so nothing to analyze
- But getting the keys from Alice to Bob securely
is just as hard as getting an unencrypted
message! - Unsuitable for e-commerce
- Meet Amazon to get a key?
35Beware Security Through Obscurity
- Kerckhoffs Principle (1883)
- The system must not require secrecy, and it
could fall into the hands of the enemy without
causing trouble. If a system requiring secrecy
were to find itself in the hands of too many
individuals, it could be compromised upon each
engagement in which any of them take part. - Still regularly violated by Internet security
start-ups and their credulous investors
36DES The Data Encryption Standard
- A 1976 public standard
- 56 bit key
- Long enough in 1976
- With todays more powerful computers a brute
force search through possible keys takes only a
day - Superceded by Advanced Encryption Standard or
AES 128, 192, or 256 bit key - AES not cracked as far as we know
37But the Big Problem Remains
- How to Get the Key securely from Alice to Bob?
??
To be continued