Outline Polyalphabetic Cryptanalysis References
CPSC 467: Cryptography and Computer Security
Michael J. Fischer Lecture 3 September 3, 2014
CPSC 467, Lecture 3 1/38
CPSC 467: Cryptography and Computer Security Michael J. Fischer - - PowerPoint PPT Presentation
Outline Polyalphabetic Cryptanalysis References CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 3 September 3, 2014 CPSC 467, Lecture 3 1/38 Outline Polyalphabetic Cryptanalysis References Polyalphabetic
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 1/38
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 2/38
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 3/38
Outline Polyalphabetic Cryptanalysis References Classical polyalphabetic ciphers
CPSC 467, Lecture 3 4/38
Outline Polyalphabetic Cryptanalysis References Classical polyalphabetic ciphers
CPSC 467, Lecture 3 5/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
CPSC 467, Lecture 3 6/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
◮ Enigma machines are rotor
◮ They played an important role
◮ The Germans believed their Enigma
◮ The Allies, with great effort,
◮ This is said to have changed the
Image from Wikipedia CPSC 467, Lecture 3 7/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
◮ Uses electrical switches to create a permutation of 26 input
◮ Each input wire is attached to a key on a keyboard. ◮ Each output wire is attached to a lamp. ◮ The keys are associated with letters just like on a computer
◮ Each lamp is also labeled by a letter from the alphabet. ◮ Pressing a key on the keyboard causes a lamp to light,
CPSC 467, Lecture 3 8/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
◮ Each rotor is individually wired to produce some
◮ Several rotors stacked together produce the composition of
◮ In addition, the rotors can rotate relative to each other,
CPSC 467, Lecture 3 9/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
k . (Note that ρ−1 k
CPSC 467, Lecture 3 10/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
CPSC 467, Lecture 3 11/38
Outline Polyalphabetic Cryptanalysis References Rotor machines
CPSC 467, Lecture 3 12/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 13/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 14/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 15/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 16/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 17/38
Outline Polyalphabetic Cryptanalysis References One-time pad
◮ it is sometimes used in practice; ◮ it is the basis for many stream ciphers, where the truly
CPSC 467, Lecture 3 18/38
Outline Polyalphabetic Cryptanalysis References One-time pad
◮ It works for messages of any length (by choosing a key of the
◮ It is easy to encrypt and decrypt. ◮ It is information-theoretically secure.
CPSC 467, Lecture 3 19/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 20/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 21/38
Outline Polyalphabetic Cryptanalysis References One-time pad
CPSC 467, Lecture 3 22/38
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 23/38
Outline Polyalphabetic Cryptanalysis References Caesar
CPSC 467, Lecture 3 24/38
Outline Polyalphabetic Cryptanalysis References Caesar
CPSC 467, Lecture 3 25/38
Outline Polyalphabetic Cryptanalysis References Caesar
There is a whole theory of redundancy of natural language that allows one to calculate a number called the “unicity distance” for a given cryptosystem. If a message is longer than the unicity distance, there is a high probability that it is the only meaningful message with a given ciphertext and hence can be recovered uniquely, as we were able to recover “BUY GUN” from the ciphertext “EXB JXW” in the example. See [Sti06, section 2.6] for more information on this interesting topic.
CPSC 467, Lecture 3 26/38
Outline Polyalphabetic Cryptanalysis References Brute force attack
CPSC 467, Lecture 3 27/38
Outline Polyalphabetic Cryptanalysis References Brute force attack
CPSC 467, Lecture 3 28/38
Outline Polyalphabetic Cryptanalysis References Letter frequencies
CPSC 467, Lecture 3 29/38
Outline Polyalphabetic Cryptanalysis References Letter frequencies
CPSC 467, Lecture 3 30/38
Outline Polyalphabetic Cryptanalysis References Key length
CPSC 467, Lecture 3 31/38
Outline Polyalphabetic Cryptanalysis References Key length
CPSC 467, Lecture 3 32/38
Outline Polyalphabetic Cryptanalysis References Manual attacks
CPSC 467, Lecture 3 33/38
Outline Polyalphabetic Cryptanalysis References Manual attacks
CPSC 467, Lecture 3 34/38
Outline Polyalphabetic Cryptanalysis References Manual attacks
CPSC 467, Lecture 3 35/38
Outline Polyalphabetic Cryptanalysis References Manual attacks
CPSC 467, Lecture 3 36/38
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 37/38
Outline Polyalphabetic Cryptanalysis References
CPSC 467, Lecture 3 38/38