22
CIS 628 Intro to Crypto Dr. Leonard Popyack Dr. Leonard Popyack Fall 2007 Fall 2007

CIS 628 Intro to Crypto

  • Upload
    phiala

  • View
    48

  • Download
    0

Embed Size (px)

DESCRIPTION

CIS 628 Intro to Crypto . Dr. Leonard Popyack Fall 2007. Polyalphabetic Substitution Ciphers. Flattens the frequency distribution of the ciphertext. Many ways to do this: Map high distribution plain text to multiple low distribution ciphertext. - PowerPoint PPT Presentation

Citation preview

Page 1: CIS 628 Intro to Crypto

CIS 628 Intro to Crypto

Dr. Leonard PopyackDr. Leonard PopyackFall 2007Fall 2007

Page 2: CIS 628 Intro to Crypto

Polyalphabetic Substitution Ciphers

• Flattens the frequency distribution of the ciphertext.

• Many ways to do this:– Map high distribution plain text to multiple low

distribution ciphertext.– Use multiple monoalphabetic substitutions

(with different permutations) (even/odd)– Use Vigenère Tableaux (26 permutations)

Page 3: CIS 628 Intro to Crypto

Frequencies of Chars in Text

Page 4: CIS 628 Intro to Crypto

Vigenère Tableaux

Page 5: CIS 628 Intro to Crypto

Exam

ple

Page 6: CIS 628 Intro to Crypto

Methods to Crack Polyalphabetic Ciphers

• Kasiski Method– Developed by Prussian Military Officer

• Index of Coincidence– Developed by Sinkov

Page 7: CIS 628 Intro to Crypto

Kasiski MethodExploits the fact that many English words have common plaintext forms in them, particularly parts equal or greater than 3 letters. (-ing, -tion, -ation, with, the, them, that).

Method tries to factor the key length.

dicke nsdic kensd icken sdick ensdi ckens dickeITWAS THEBE STOFT IMESI TWAST HEWOR STOFT IMESI

nsdic kensd icken sdick ensdi ckens dicke nsdicTWAST HEAGE OFWIS DOMIT WASTH EAGEO FFOOL ISHNE

kensd icken sdick ensdi ckens dicke nsdic kensdSSITW ASTHE EPOCH OFBEL IEFIT WASTH EEPOC HOFIN

Page 8: CIS 628 Intro to Crypto

Kasiski Steps• 1. Identify repeated patterns of three

or more characters.• 2. For each pattern write down the

position at which each instance of the pattern begins.

• 3. Compute the difference between the starting points of successive instances.

• 4. Determine all factors of each difference.

• 5. If a polyalphabetic substitution cipher was used, the key length will be one of the factors that appears often in step 4.

Finally, create sets, then use mono-alphabetic cracking methods.

Page 9: CIS 628 Intro to Crypto

Index of Coinidence

• Sinkov [1966]• Exploits the variance of the ciphertext

distribution to attempt to identify the keysize.

Page 10: CIS 628 Intro to Crypto

1/26 = 0.0384 or 3.84%

Page 11: CIS 628 Intro to Crypto

Index of Coincidence

n number of observed sample ciphertext letters

Freq is instances of the character

IC can range from 0.0384 for perfect flat polysubstitution. To 0.0680 for mono substitution from common English

Page 12: CIS 628 Intro to Crypto

What IC tells us

• If the key size is small or large.• Small number of enciphering alphabets can be

readily discerned• Larger key sizes approach the “perfect”

distribution (With IC0.038)• Use in combination with the sets generated by

Kasiski method (as a test for likely key size)

Page 13: CIS 628 Intro to Crypto

Steps in analyzing a polyalphabetic cipher

• 1. Use the Kasiski method to predict likely numbers of enciphering alphabets. If no numbers emerge fairly regularly, the encryption is probably not simply a polyalphabetic substitution.

• 2. Compute the index of coincidence to validate the predictions from step 1.

• 3. Where steps 1 and 2 indicate a promising value, separate the ciphertext into appropriate subsets and independently compute the index of coincidence of each subset.

Page 14: CIS 628 Intro to Crypto

Perfect substitution Ciphers

• IC0.038• One-Time Pad

– Problems: synchronization, materials & control (printing, storing)

• Long random number sequences• Gilbert Vernam cipher (AT&T) (phone book)

• Binary Vernam

Page 15: CIS 628 Intro to Crypto

Vernam Cipher

Page 16: CIS 628 Intro to Crypto

Random Number Generators

• GOALS: – Reproducible Random Number Generator– Not Predictable

• WHERE?:– Seeded from Phone Books– Generators– Irrational numbers and functions

Page 17: CIS 628 Intro to Crypto

Transpositions (Permutations)

• Letters of plaintext message are re-arranged

Page 18: CIS 628 Intro to Crypto

Transpositions (Permutations)

Page 19: CIS 628 Intro to Crypto

Transpositions - Concerns

1. Need for storage

2. Wait for complete message to begin encoding or sending

Page 20: CIS 628 Intro to Crypto

Cracking Transpositions

• Knowledge of Digrams and Trigrams

• Computer methods– sliding windows, etc

Page 21: CIS 628 Intro to Crypto
Page 22: CIS 628 Intro to Crypto