You are on page 1of 119

1

PDF created with pdfFactory Pro trial version www.pdffactory.com



www.3asfh.com

.
Classical Method

)
(
.
.


)
Transposition ( Substitution
.
:


.
Introduction to Classical Cipher

Cryptanalysis .
2
PDF created with pdfFactory Pro trial version www.pdffactory.com

The Implementation ) ( C++



) .
( .
Introduction To Modern Cryptography
""
.




.
:
Introduction To Number Theory and it's Application
Primality Testing , Factorization Techniques ,Congruence Solving,
Random Number Generation
Introduction To Information & Coding Theory and it's Application
Huffman Code , Hamming Code , Error Correction Code , Entropy
Explain and Implementation for Most Crypto Cipher
RSA ,DES ,Triple DES, AES , Blowfish , ECC , ALGAMAL
History About Cryptography and Crypto Devices and Arabic
) Cryptographer (Alkindi, Taher Algamal
Addition Classical Cipher & More About Cryptanalysis cipher
" "
. .
:

SudanGeek@hotmail.com :
wajdyessam@hotmail.com
Romansy , at : 2-11-2007

3
PDF created with pdfFactory Pro trial version www.pdffactory.com

7 ............................................ Preliminaries :
7 ................................................ THE DIVISION ALGORITHM
8 ............................................................................ Prime Number
10 ............................................... Greatest Common Divisor
11 .............................................................. Euclidean Algorithm
12 .................................... Extended Euclidean Algorithm
16 .................... The Fundamental Theorem of Arithmetic
17 ............................................ Least Common Multiple
17 ........................................................................... XOR Exclusive-Or
18 ...................................................................................................Logarithms

20 .................................................. :
21 ............................................................................................... Coding
23 ........................................................ Classical Method
24 ...................................................... Monoalphabetic Substitution Cipher
24 ............................................................................... Caesar Cipher
29 ............................................................................... Atbash Cipher
29 ................................................................................................. ROT13
30 ........................................................................................ Affine Cipher
32 ....................................................... MONOALPHABETIC
34 ......................................................... Polyalphabetic substitution cipher
34 .................................................................. Simple Shift Vigenere Cipher
37 ................................................................... Vigenere
38 .................................... Key Length KAISISKI
42 ........................................ THE FULL VIGENERE CIPHER
43 ...................... THE AUTO-KEY VIGENERE CIPHER
44 .................... THE Running KEY VIGENERE CIPHER
45 ............................................................. PolyGram Substitution Cipher
46 ............................................................. THE PLAYFAIR CIPHER
48 ..................................................................................... Hill Cipher
54 ...................................... PolyGram Substitution Cipher
54 ........................................... THE JEFFERSON CYLINDER
56 .......................... HOMOPHONIC SUBSTITUTION CIPHERS

4
PDF created with pdfFactory Pro trial version www.pdffactory.com

58 .................................................... TRANSPOSITION CIPHERS


61 .................................................................. THE ONE-TIME PAD
63 ..................................................................................

66 ......................................... Implementation :
67 .......................................................................... characters
70 .......................................... Greatest Common Divisor
71 ...................................................................................
72 ............................................................. Trial Division
72 .........................................................................................
73 ...................................................................... Fast Exponentiation Algorithms
74 ............................................................................... Caesar Cipher
76 ................................................................................................. ROT13
77 ............................................................................ Affine Cipher
78 .............................................. Simple Shift Vigenere Cipher
79 ............................................................Full Vigenere Cipher
81 .......................................... Auto Key Vigenere Cipher
82 ................................. the Running key Vigenere Cipher
83 ............................................................................. Playfair Cipher
83 ...................................................................................... Reverse Cipher

84 ................................ :
85 ...................................................................... Why Cryptography
87 ......................................... Symmetric key Cryptography
91 .............................................................................
94 ......................................................................... Key Generation
100 .............................................................................. Block Cipher
102 .......................................................................... Stream Ciphers
103 .......................................................................... Block VS Stream
103 ................................................................................................. Triple DES
105 .................................................................... Advanced Encryption Standard
105 ............................................ Symmetric-Key Management
109 ............................................. Hardware-Based Key Storage
110 .................................................................................... Crypto Accelerators

5
PDF created with pdfFactory Pro trial version www.pdffactory.com

112 ........................... The Key Distribution Problem and Public-Key Cryptography


116 . History of Public-Key Cryptography

119 .....................................................................................

:
Preliminaries

6
PDF created with pdfFactory Pro trial version www.pdffactory.com

: Preliminaries
Number Theory
.
Prove
Affine Cipher .
a b ) a !=0 . (0 a b
c . b = a*c a b . a|b
:
3|27 . 27 = 9*3
5|32 32 = 4*c . c
x,y,z x|y y|z

. x|z

:
3|9 9|72 3 3|27 = 72

THE DIVISION ALGORITHM



b r . b
y,b b q,r
:
Y = b*q + r
q r . Quotient b . remainder Divisor
y . dividend
:
65 = 3*q + r
q ) 21 65 (3 r . 2
3*21+2 . 65
7
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
-21 = 5*q + r
-21 5 - 4 1-
r 5
1
. r = 4 q = -5
:
-21 = 5*-5+4 .

: Prime Number

:
integer 1
. 1 1 Composite Number
:
2 3 7 23 29 163 .
:
) 4 ( 2
) 100 2 . (5

0 1 . 21-
1 .
.
N n . N
x ) 2
( . x x

.

8
PDF created with pdfFactory Pro trial version www.pdffactory.com

101 2 101 . 10
101 . 2
101 3
101 4 5 6 7 8 . 9 10
101 .

. Trial Division
500 250
Trial Division
250 )
( .

. Trial Division
Sieve of Eratosthenes
2 3 5 7 .
2 99
) ( 2
3 :

2 99
.

9
PDF created with pdfFactory Pro trial version www.pdffactory.com

) Greatest Common Divisor ( GCD


.
. 18 30
:
30 1 2 3 5 6 10 15 30
18 1 2 3 6 9 18
. 6
GCD(30,18) = 6
" " Relatively Prime
. 1
: Relatively Prime
8 9 . 1
23 44
27 55
:
)|GCD(x,y) = GCD(x,-y) = GCD(-x,y) = GCD(-x,-y) = GCD(|x|,|y
:
GCD(18,-54) = GCD(18,54) = 9

.
: 20: 30 15 5 :
GCD(20,30) = 10
CGD(10,15) = 5

10
PDF created with pdfFactory Pro trial version www.pdffactory.com

= 1
) ( ) 1 (
mutually relatively prime
. pairwise relatively prime
: 28 126 21 : 10
= )( (28,126) , 21 , 10
= )(14 , 21 , 10
= )( (14,21) , 10
= )(7,10
=1

). 7 = (28,126
. mutually relatively prime
pairwise relatively
. prime
: 18 9 25 1 mutually relatively
prime 18,9 ) 9 ( .

Euclidean Algorithm
c,q c = q*d + r ). GCD(d,r) = GCD(c,q
.
: 132 55 :
132 = 55 * 2 + 22
55 = 22 * 2 + 11
22 = 11 * 2 + 0
11 :
GCD(132,55) = GCD(55,22) = GCD(22,11) = GCD(11,0) = 11
: ) GCD(252,198
252 = 198 * 1 + 54
198 = 54 * 3 + 36
54 = 36 * 1 + 18
36 = 18 * 2 + 0
11
PDF created with pdfFactory Pro trial version www.pdffactory.com

: 18
GCD(252,198) = (198,54) = (54,36) = (36,18) = (18,0) = 18

Extended Euclidean Algorithm

Linear Combination
GCD(x,y) = m*x + n*y :

m n .
) ( .
Backward
m . n
:
) GCD(26,21 Linear Combination 26 : 21
:
26 = 1* 21 + 5
21 = 4 * 5 + 1
5 = 5*1 +0
. )
( :
]1 = 21 4 * 5 [1
:
]5 = 26 1 * 21 [2
] [2 ]: [1
)1 = 21 4 * (26 1 * 21
:
1 = 21 -4*26 +4*21
4*21 + 21 :
1 = 5*21 + (-4)*26
5*21 + -4*26 .
m 5 n . 4-
) n m (.
12
PDF created with pdfFactory Pro trial version www.pdffactory.com

: a=3 MOD 26
3 . 26 :
2= 26 - 8*3
1= 3 2

26=8*3+2
3=1*2+1
2=2*1+0

1= 3 - 2 = 3 - (26 - 8*3) = 3 26 + 8 * 3 = 9*3 26


1 = 9*3+(-1)*26
3 . 9
:
) GCD(26,21 Linear Combination 26 : 21
:
X

Q
26
21

26 21 . 21
26 MOD 21 = 5
5 . 21
21 5 5 1
0 .
A
Q
X
26
21
5
1
0
26 21 ) q (
1 21 5
4 .

13
PDF created with pdfFactory Pro trial version www.pdffactory.com

X
1
4
5

A
26
21
5
1
0

x 0 1
26
21
5
1
0

1
4
5

1
0

x 4 = 0 + 1*4

x .
4 = 4*1 + 0
26
21
1
4
5
4
1
0

0
5 = 4*1 + 1 :
5
4
1
0

26
21
5
1
0

1
4
5

:
Q

X
5
4

A
26
21

1 = 5 * 21 4 * 26
1 = 5*21 + (-4)*26
) m . ( n

14
PDF created with pdfFactory Pro trial version www.pdffactory.com

/ 23 MOD 26
Q

X
9
8
1
1
0

1
7
1

A
26
23
3
2
1

1 = 8 * 26 9 * 23. Correct
23
9- . 9
1 = 8 * 26 + (- 9) * 23
:

GCD (x, y) = snx + tny


s t :

) GCD(252,198 Linear Combination 252 . 198


j q r
s,t .

252 198 . r

15
PDF created with pdfFactory Pro trial version www.pdffactory.com

252 198 ) ( q 1
252 198 54 r .
198 54 q 3 198 54
36 . r
54 36 1 q 18 r
36 18 2 q 0 . r
. . s ,t
s0 = 1 , s1= 0 : . t0 =0 , t1= 1
.
si ) s i-2 (
. si-1 * qi-1
:
Si= si-2 si-1*qi-1
= 1 - 0*1
=1
. t s
t s=4 : . t=-5
:
GCD(252,198) = 4*252 + (-5)*198
4*252 + (-5)*198 18
252 . 198
) ) s,t (
Affine Cipher (.

The Fundamental Theorem of


Arithmetic
1 n = p1*p2*p3*pn :
P
. Prime Power Factorization of an integer
:
16
PDF created with pdfFactory Pro trial version www.pdffactory.com

) Least Common Multiple (LCM


.

:
)LCM(x,y) = x*y / GCD(x,y
:
lcm(36, 78) = 36 78/(36, 78) = 36 78/6 = 6 78 = 468
lcm(21, 56) = 21 56/(21, 56) = 21 56/7 = 3 56 = 168
lcm(100, 2050) = 100 2050/(100, 2050) = 100 2050/50 = 2 2050 = 4100

XOR Exclusive-Or
:

. 2
0 + 0 MOD 2 = 0
0 + 1 MOD 2 = 1
1 + 0 MOD 2 = 1
1 + 1 MOD 2 = 0
:

17
PDF created with pdfFactory Pro trial version www.pdffactory.com

XOR
swap :
:
;temp = a
;a = b
;b = temp
:
;a = a xor b
;b = a xor b
;a = a xor b
:

) r p ( .

C = r XOR p
:
c ) P = r XOR c ( .

XOR .
An XOR might keep your kid sister from reading your files, but it
wont stop a cryptanalyst for more than a few minutes

Logarithms

18
PDF created with pdfFactory Pro trial version www.pdffactory.com

log log e
log2 . log10
log e log 2 log2 x = log(x) / log(2) :
log e log 10 log10 x = log(x) / log(10) :
log10 log2 log2 x = 3.322 * log10 (x) :
log2 bit . x
Log2(10000) = 13.28771
14 10000
log10 . x

19
PDF created with pdfFactory Pro trial version www.pdffactory.com

Classical Cipher

20
PDF created with pdfFactory Pro trial version www.pdffactory.com

: Coding

Encryption

. Codebook

) ( .


: Code Book

Word
Codeword .
Codeword Word
.

21
PDF created with pdfFactory Pro trial version www.pdffactory.com


ATTACK ENEMY AT DAWN
Codebook :
ATTACK RUN
ENEMY EXPLODE
:
RUN EXPLODE LION COMPUTER
) Codeword
( . Code Number
Codeword
Jargon codes
) ( .
A Codeword
B ) ( .
:
BOXER SEVEN SEEK TIGER5 AT RED CORAL

BOXER SEVEN A SEEK
TIGER B RED CORAL
. AT
Codeword
. CodeNumber
CodeNumber
85772 24799 10090 59980 12487
85772 BOXER SEVEN
24799 SEEK

.
Word
CodeNumber CodeWord
one-part-Code
" " .

22
PDF created with pdfFactory Pro trial version www.pdffactory.com

)
(
) ( A CodeNumber 20 B 21
C 22
A Z Two-
Part-Code
.

Two-Part-Code

)
( .

: Classical Method



Character-Based 26
0) Bit ( 1
:
: Substitution Cipher

Plaintext cipher char
.
: Transposition

) . Permutation ( .
: XOR


) ( .
:

23
PDF created with pdfFactory Pro trial version www.pdffactory.com

Substitution Cipher :
Monoalphabetic Substitution Cipher :
Polyalphabetic Substitution Cipher :
PolyGram Substitution Cipher :
Homophonic Substitution Cipher :

.
: Monoalphabetic Substitution Cipher

Substitution .
frequency
analysis
Cryptanalysis
.
: Monoalphabetic Substitution
Caesar Cipher
Affine Cipher
ROT13 Cipher
Abash Cipher
: Caesar Cipher


)
3 ( .
.
)
( .
:

24
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
:
FIRE MISSILE
+ ) (3
Z .
3 ) 3( :
F+3 = I
I+3 = L
.
:
ILUH PLVVLOH

block 5
) ( .

:
ILUHP LVVLO H

.

.
)
Symmetric Key
(Cryptography .
) 3 Shift (3
.

FREQUENCY ANALYSIS
) (
..
E .

25
PDF created with pdfFactory Pro trial version www.pdffactory.com



E .

.
:
KYJVE
YZEXJ
KGLIV
FWFID
EFVPV
AVTKF
FVEUK
EXLZJ
KJZET
EFYZE
UVUKY

KZJNZ
JRCCK
EVUEF
IVZJE
JEVJJ
LTYFS
VREUE
KYEFR
ZEDVE
JNZKY
UUVCL

IDJFZ
LJEVJ
KJKRZ
JJKYV
JTZFL
JKVKF
FIRET
EUUVR
FRKKR
VJKYL
SVPFE

KCPWF
EJTZF
PVUEF
GKZEV
FITFE
VCCKR
EFZXE
URXVR
DREUE
MRCZM
RIWRI

JVORT
REUTF
VJKIF
VZEVD
TKZFE
LEUJD
EBZEX
UKFFC
NZJUF
ZJRKK
VEFWV

KZEVJ
TKZFE
EEFKU
IVWFI
RCIVR
CFIJF
EFKYZ
YEFVE
RKYEF
VSFUY
UYVET

JJVDG
RCIVR
FKSFI
ZEKYV
EDVEK
UEFTF
FFEKF
UUVRK
KZFEG
RZEKY
ETVRE
RER

GKZEV
EDVEK
DGKPE
FLKXR
VGKZF
UPDZE
XREUJ
RXVRE
TVJJR
KFRKK
ZEUIR
JEZIM

KCPVD
VGKZF
RCCPV
JNZKY
EGVIT
XLVSF
JVVZE
EFFCU
XLZJY
KYZEX
EUEFY
YVIVZ

JVORT
EGVIT
JVEKZ
LKCFJ
JRKZF
JVKFE
XYKEF
IRETV
VFWRE
VZJEF
VFWDZ
IZXYK

WFIDZ
JRKZF
RIVVJ
NZKYF
EFJVE
VRIEF
WKYFL
FZXEF
YTRLJ
VKYVI
UIRET
FLXYK



W .....
W 9 F
.
:
A: 1 B: 1 C: 16 D: 14 E: 82 F: 69 G: 10 H: 0 I: 27 J: 47 K: 61
L: 15 M: 3 N: 5 O: 2 P: 8 Q: 0 R: 45 S: 5 T: 21 U: 28 V: 69
W: 9 X: 15 Y: 28 Z: 47
E ) 82
( E
E E
. E
F,V 69 . E
F E ) 1 F . ( E
V E ) . 17
V 17 . ( E

26
PDF created with pdfFactory Pro trial version www.pdffactory.com

.17 1
( ) 1
. 1
: 17
FORMI
SATIO
AREES
WITHO
NOSEN
EARNO
FTHOU
OIGNO
HCAUS
ETHER
DRANC
OUGHT

SEXAC
NPERC
SENTI
UTLOS
SATIO
SETON
GHTNO
RANCE
EOFAN
EISNO
EOFMI
RIGHT

TLYEM
EPTIO
ALLYE
SWITH
NPERC
GUEBO
SEEIN
NOOLD
GUISH
THING
NDNOH
HEREI

PTINE
NMENT
MPTYN
OUTGA
EPTIO
DYMIN
GANDS
AGEAN
CESSA
TOATT
INDRA
SNIRV

SSEMP
ALREA
OTBOR
INTHE
NMENT
DNOCO
OONTO
DDEAT
TIONP
AINTH
NCEAN
ANA

TINES
CTION
NNOTD
REFOR
ALREA
LORSO
NOTHI
HNOEN
ATHNO
EBODH
DHENC

SEXAC
ANDCO
ESTRO
EINEM
CTION
UNDSM
NKING
DTOOL
WISDO
ISATT
ENOFE

TLYFO
NSCIO
YEDNO
PTINE
ORCON
ELLTA
NOIGN
DAGEA
MANDN
VALIV
ARFAR

RMSOI
USNES
TSTAI
SSTHE
SCIOU
STETO
ORANC
NDDEA
OATTA
ESTHU
BEYON

TISWI
SALLT
NEDNO
REISN
SNESS
UCHOB
EANDN
THNOA
INMEN
SWITH
DDELU

THSEN
HINGS
TPURE
OFORM
NOEYE
JECTO
OENDT
NGUIS
TSINC
NOHIN
DEDTH


.

.
Key Phrase Monoalphabetic
. ( )
: Key Phrase
THE HILLS ARE ALIVE
A A
. T
... E C H B

:
)(
WAJDY :
STOP FIRE :
:
Plaintext : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher text : WAJDYBCEFGHIKLMNOPQRSTUVXZ

27
PDF created with pdfFactory Pro trial version www.pdffactory.com

STOP FIRE QRMN BFPY :


Block
. QRMNB FPY

28
PDF created with pdfFactory Pro trial version www.pdffactory.com

Atbash Cipher

.

...
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: ZYXWVUTSRQPONMLKJIHGFEDCBA
money . nlmvb
:
= " "hob " "sly
= " "hold ""slow
= " "holy ""slob
""horn" = "slim
""irk" = "rip
""low" = "old
""glow" = "told
"grog" = "tilt".
!

ROT13
) ( Monoalphabetic
13 13
13
.
))P = ROT13 (ROT13 (P
p Plaintext 13
D D 3
) 26%(13+3 16 13 D
. Q

:

29
PDF created with pdfFactory Pro trial version www.pdffactory.com

13 ) 13
( . Q (16+13)%26 = 3
13 . D
ROT13 Unix
Puzzle )(
.

Affine Cipher
) Affine Cipher
product
( Cipher
:
c = p + key MOD n
) key ( .
:
C = p * key MOD n
) Affine (
.
C = m*p + key MOD n
m n
m n . 1 ) .
( .
) m GCD(m,n) = 1

(.
:
)P = m` * (c key) (MOD n
:

30
PDF created with pdfFactory Pro trial version www.pdffactory.com

WAR LOST :
key 10 m . 7
m .
m 26) n ( .
GCD(7,26) = 1 . M
:

:
22 0 17 11 14 18 19
:
C = m * p + key MOD 26
C1 = 7 * 22 + 10 MOD 26 = 8
C2 = 7 * 0 + 10 MOD 26 = 10
C3 = 7 * 17 + 10 MOD 26 = 25
C4 = 7 * 11 + 10 MOD 26 = 9
C5 = 7 * 14 + 10 MOD 26 = 4
C6 = 7 * 18 + 10 MOD 26 = 6
C7 = 7 * 19 + 10 MOD 26 = 13
:
8 10 25 9 4 6 13
IKZJE GN :
m :
)P = m` * (c key) (MOD 26
)
( .
7 26 15 :
:
P1 = 15 * ( 8 10 ) MOD 26 = 22
P2 = 15 * ( 10 10 ) MOD 26 = 0
31
PDF created with pdfFactory Pro trial version www.pdffactory.com

P3 = 15 * ( 25 10 ) MOD 26 = 17
P4 = 15 * ( 9 10 ) MOD 26 = 11
P5 = 15 * ( 4 10 ) MOD 26 = 14
P6 = 15 * ( 6 10 ) MOD 26 = 18
P7 = 15 * ( 13 10 ) MOD 26 = 19
22 0 17 11 14 18 19 : :
) WARLO ST ( .

MONOALPHABETIC
)
- - ( .
.

10 ) ( .
:

:
fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc
:

. E

32
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
a:2 , b:5 , c:3 , d:0 , e:0 , f:3 , g:0 , h:2 , i:0 , j:7 , k:1 , l:0 , m:1 , n :7

) w ( .
j n 7.
j E 5 5
:
5:
f-5 = a
q-5 = l
j-5 = e
c-5 = x
b-5 =w
:
alexw mrere ajevs .
. N
e-n=9 E . 9
9....
f-9 = w
q-9 = h
j-9 = a
c-9 = t
b-9 = s
:
whats inana mearo sebya nyoth ernam ewoul dsmel lassw eet

what's in a name a rose by any other name would smell as sweet

: ""monalphbetic
jmjmj gsmsg lrjgu csqyj quflr mfajq erdmc cmqlv lqyhg gawgq arpgq
sblce jrlrj lnmec cyjqu flrmf ajqer d

:
33
PDF created with pdfFactory Pro trial version www.pdffactory.com

a b c d e f g h I j k lm no p q r s tuvwxyz
m o n a l p h b e t I c d f g j k q r suvwxyz
j j
j p m a
.
:
Papap otato espou ltryp runes andpr ismar eallv erygo odwor dsfor theli
psesp ecial lypru nesan dpris m
:
Papa potatoes poultry prunes and prism are all very good words for the
lips especially prunes and prism
) www.arabteam2000.com
( MEMONONO

Polyalphabetic substitution cipher


Monoalphabetic
. 4
.
.
Vigenere Cipher

Engima . :
Simple Shift Vigenere Cipher
Full Vigenere Cipher
Auto-Key Vigenere Cipher
Running Key Vigenere Cipher

Simple Shift Vigenere Cipher



..
.
:

34
PDF created with pdfFactory Pro trial version www.pdffactory.com

) ( :
DEFCON FOUR

.
:
5 :
13 :
2 :
7:
) ( Key Length 5 13 2 7 :
:



D 5
= D + 5 ) I D 3 5
26 % 9 . ( I
E 13
R
....


:

Block 5:
:
IRHJT AHVZE

35
PDF created with pdfFactory Pro trial version www.pdffactory.com



A
0 B 1...
)( 1 12 0 18 19 14 5 5 :
BLAST OFF :
.
: Code Wheel
) (


- - :

36
PDF created with pdfFactory Pro trial version www.pdffactory.com


. S
) ( S
A ) ( .
G G
Y . .
H H
. p...
Vigenere
)
Period
(

Key Length .
Key Length

) E
( Monoalphabetic .

37
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
XZQTY IISTN PAWRT GSGPO LNOXF
5
Block
.
X
I
P
G
L
1 n
XIPGL
....
:

) (

.
)
( .

KAISISKI Key Length



XYZ

XYZ XYZ
.

38
PDF created with pdfFactory Pro trial version www.pdffactory.com

FSI FSI
:

F F FSI - 7 3
F
FSI .
:

:
LJVBQ STNEZ LQMED LJVMA MPKAU FAVAT LJVDA YYVNF
JQLNP LJVHK VTRNF LJVCM LKETA LJVHU YJVSF KRFTT
WEFUX VHZNP
Key Length
.
LJV .
LJV
39
PDF created with pdfFactory Pro trial version www.pdffactory.com

L L 15
L L 15.
.
L :

10,15,15
) ( 5.
5

.

.
5 Monoalphabetic
.
:

:
LSLLM FLYJL VLLLY KWV

40
PDF created with pdfFactory Pro trial version www.pdffactory.com

L
E T R

E L
J E !


THE
L T
j H
V . E
T L ) 18 ( S
H J ) 2 .( C
E V ) 17 . (R
SCR
N
. A )(
. A,B
SCRAB
26*26

.
A,M
. SCRAM

SCRAM :
41
PDF created with pdfFactory Pro trial version www.pdffactory.com

THEBE ARWEN TOVER THEMO UNTAI NYEAH THEDO GWENT


ROUND THEHY DRANT THECA TINTO THEHI GHEST SPOTH
ECOUL DFIND
:
THE BEAR WENT OVER THE MOUNTAIN YEAH THE DOG WENT
ROUND THE HYDRANT THE CAT INTO THE HIGH EST SPOT HE
COULD FIND

THE FULL VIGENERE CIPHER


) (

a tabular recta
:

:
HARKONNEN RULZ
SPICE :

.

42
PDF created with pdfFactory Pro trial version www.pdffactory.com

.
H S
H S . O
A P . Z
.
OZTJYJTZGDKPX :
OZTJY JTZGD KPX :

) (

.
:
OZTJY JTZGD KPX :
SPICE :
S
S O
. H .

THE AUTO-KEY VIGENERE CIPHER





.
:
LIGHT SPEED CHEWIE NOW
) ( ARGH :

L+A=L
I+R=Z
G+G=M
H+H=O
) (
43
PDF created with pdfFactory Pro trial version www.pdffactory.com


L
L + T =E
I
I+S=A
.
:


... .
) (
) ( .
) (
) . ( .


.

THE Running KEY VIGENERE CIPHER


) (
)(
) (

) (.
TORA TORA TORA :
:
AND GOD SAID LET THERE BE LIGHT
.
:

44
PDF created with pdfFactory Pro trial version www.pdffactory.com

AUTO-KEY AND RUNNING KEY VIGENERE CIPHERS


Monoalphabetic

)
( .

PolyGram Substitution Cipher


) ( Polygraphic

POLYGRAM
Block .
.
8 8
:

Brute-Force 26 8 ) (8^26
26^8 = 208,827,064,576
.

8
.
.

45
PDF created with pdfFactory Pro trial version www.pdffactory.com

Polygraphic
Playfair
Hill Cipher
Jifferson Cylinder THE BAZERIES
. CYLINDER

THE PLAYFAIR CIPHER


Block
25 ) (5 *5 A B
) ( 26
I,J .
5*5 :

) (
:
The quick brown fox jumped over the lazy dogs
5 *5 T
H ) (

.

46
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
Since by man came death

:
Blocks .
A,B


.X
. X
:
A B )
(.
A B A B
) Wrap
.
A B A B
. ) Wrapping (.
) (:

:
AMBASSADOR SHOT
:
47
PDF created with pdfFactory Pro trial version www.pdffactory.com

.
AM BA SS AD OR SH OT

X SS : X
AM BA SX SA DO RS HO T
X :
AM BA SX SA DO RS HO TX
A M
.
A M M . N
B A
.
B U A . D
S X
S S X Q
X X X . N
.
:
MN UD QN AM BA MP ID FE




.
MN :
M A
N . M

Hill Cipher
3
Lester S Hill .
48
PDF created with pdfFactory Pro trial version www.pdffactory.com

)
( .
.

)
( 3*3 .
GYBNQKURP :
3*3
:

ACT :
.
:3*1


.
. . MOD 26

) (
POH :

26 :

49
PDF created with pdfFactory Pro trial version www.pdffactory.com

3-Hill Cipher
3*3 2-Hill
Cipher 2*2 n-Hill Cipher
. n*n
2-Hill Cipher 2*2
26 .
" " Determinant
26 Determinant 26
.1
:



. 2*2 :

50
PDF created with pdfFactory Pro trial version www.pdffactory.com

Determinant of a matrix A, denoted by det A :


-- if A(aij) is 22, then det A =a11a22 a12a21
-- if A(aij) is 33, then det A =
a11a22a33 + a12a23a31 + a13a21a32 - a13a22a31 - a12a21a33 a11a23a32
( d )d^-1
. 1 26 mod d
d * d` = 1 (mod 26)
: 26 2 ""

51
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
THE PROFESSOR IS EVIL :
. J
hill 2 3 . 4
2-Hill Cipher .
Block
) 2-Hill Cipher n
n ( .
) A 1 0
A . ( 0

. P

. .

) det )(
26 mod 1
( .
p A ) c(

52
PDF created with pdfFactory Pro trial version www.pdffactory.com

) 26 mod ( . :

:
RLQFXCHAAQAFCWAXMB
) (
)
26 . 26
N
n .( modular arithmetic
26 mod :

: :
THE PROFESSOR IS EVIL

row reduction
( .

53
PDF created with pdfFactory Pro trial version www.pdffactory.com

PolyGram Substitution Cipher


)
(

TH HE Digraphs

3 trigraphs
THA THE AND .
Modern Cryptography
8 .

THE JEFFERSON CYLINDER




. Thomas Jefferson
36 26 36
) ( .



.
25
25 .
25

.

54
PDF created with pdfFactory Pro trial version www.pdffactory.com

Hard to
Implementation
.

55
PDF created with pdfFactory Pro trial version www.pdffactory.com

HOMOPHONIC SUBSTITUTION CIPHERS


HOMOPHONIC


.
.

E 13 T 9
Homophonic E 13 T9

. onetomany mapping
: Homophonic

56
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
RETREAT
R 8 .
E 13 .
:
DQ AW CC AQ CO BS DB
) ( .
inverse mappings
:


. !



57
PDF created with pdfFactory Pro trial version www.pdffactory.com

TRANSPOSITION CIPHERS

:
: Reversing


!
:
Wajdy Essam Is Java Developer :
repoleveD vavJ sI massE ydjaW :
) 5( :
repol eveDv avJsI massE ydjaW
:
:
1 4 2 3 3 1 4
. 5 5 2
:
1 4
4 5
5 2
2 3
3 1
1 4
) (.
THE SKY FALLING PLEASE ADVISE :
5
THESK YFALL INGPL EASEA DVISE :

58
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
1 4 : T S
4 5 : S K
Blocks
:
EKHTS ALFYL GLNIP SAAEE IEVDS



) Transposition . ( Substitution

COMBINATION
SUBSTITUTION/TRANSPOSITION CIPHERS


.
:

A
. A ) AA
(.
"" . Maps
B maps to AB
C maps to AC
...
Q maps to DB
...
Y maps to EE
Z maps to DB
59
PDF created with pdfFactory Pro trial version www.pdffactory.com

) ( TAKE ME TO YOUR LEADER :


T maps . DE A Maps
. AA :
DE AA CA AE CC AE DE CE EE CE EA DC CB AE AA AD AE DC
.
) (

....
:
DE AA CA AE CC AE DE CE EE CE EA DC CB AE AA AD AE DC
:
DE AA CA AE CC AE DE CE EE
CE EA DC CB AE AA AD AE DC
D C E E :
DC EE AE AA CD AC AC EB CA CE AA EA DA ED CA EE ED EC

:
DC . R
EE . Y
:
RYEANCCVKOAUPXKYXW
Block 5:
RYEAN CCVKO AUPXK YXW
! .
:
RYEAN CCVKO AUPXK YXW


R D C R
D C
. :
60
PDF created with pdfFactory Pro trial version www.pdffactory.com

DE AA CA AE CC AE DE CE EE
CE EA DC CB AE AA AD AE DC

:
DE map to T
AA map to A
CA map to K
...
TAKEMETOYOURLEADER :
TAKE ME TO YOUR LEADER :
ADFGVX
.
.

THE ONE-TIME PAD


) " "
( .


.
) ( one-time pad
Sheets
) ( .

J .
one-time pad


ENGAGE WARP DRIVE :

61
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
9 20 13 0 21 1 13 19 9 5 25 12 25 4 7 25 0 8 8 7 24 2 6 18 16 10 23 5 11
12 13 6 22 22 17 3 8 0 0 19 4 15

E 9 N N
20 . H....

:


.

.

)! ( one-time pad

62
PDF created with pdfFactory Pro trial version www.pdffactory.com


:
MXXFT QQHUX WMDYM QHQDO DQMFQ PNKYQ EUZOQ ARAXP AZMOO AGZFA RYKNQ
SUZZU ZSXQE ESDQQ PTMFD QPMZP USZAD MZOQN ADZAR YKOAZ PGOFE BQQOT
MZPFT AGSTF UZAIO AZRQE EABQZ XKMZP RGXXK

simple Vigenere cipher


()
SSQYN
QSOSF
MWQGP
OXKOJ
SGSSO
FSOUS
FGQYU
BXFHV
OORNJ
JODFM
DFMZU
DDPUF
FFDBF
SXOWO
PQFIQ
WMFVO
IWZVB

ASXES
WJYSX
FZNVD
KDFMZ
BIWCS
BWSFV
HVKOR
OMSAO
GCXXS
ZUCUB
CUBBD
KQVMK
BHSDS
VUFOZ
HCQSO
VMKOI
DDBPT

RBFOR
FHKYS
DOSGO
UCUBB
FDISC
BUAOO
PYPYC
OHOBZ
GVFMF
BDVIH
VICCG
ORBOU
VKMZG
QSKKE
DRZKW
OSFZF
SCTWC

SOUYK
YGODI
NEZSB
DVITS
BZOBN
SNOTO
PBDDV
BIWCS
YTWBQ
FSOOK
DPBON
KCBLG
DFDSX
SOXEK
DIQCN
HSBEW
XBZ

VTAKO
FSUMD
JJSBQ
PKTHC
DFMZU
ZPSSR
JSRMS
FDISC
NWQRB
WMIAO
EWGYO
SMVFW
TCBXF
OCIWB
JBUDI
GKQDS

QVKSZ
BJJOD
FSXUW
ZPZCB
CUBBD
FBBCY
MDDPU
BZOBN
SZSND
XOWBQ
KSCMS
DZBRO
OZMSM
QUCBV
SCBZI
KSWBQ

WOQSF
FQCWN
QOIOZ
FWZVZ
VIORS
SGQRP
FKQVM
JHGKQ
ZONSB
TAWDI
MCUOZ
EWHSP
DDPBC
BKFOO
DZFFG
DFMZU

VNOBB
IBSDO
VLBIN
YCLMW
NJHWY
HDKVZ
MSQDB
DZSDO
DJBUO
FWMIO
VJBUC
BIZQS
WJQCX
QSSOH
KERZO
CUBBD

BRWKB
HSPBW
TSBTP
HJOSO
OBSGZ
OXEJO
FGGBP
HSPBG
MZWZU
FNJBH
XWZVJ
FCBRR
OSKIP
FYEIQ
SWJOS
VIDVS

BRCQS
XBDIL
VBKUV
VBQCE
CFUTD
XTHCX
GSXLS
LPGHY
WQMVF
OSBSD
OAMSM
VFFWF
FYZFF
DJCBD
DFOOH
CUBID

Auto-Key Vigenere Cipher


:
TVWFP
PIOBZ
ZMEAD
EAPKH
FSSSW

VVHZD
TALSV
XUXCM
HRTAL
BWKAA

PZXLX
XUIFW
RSJHZ
SVXUI
BS

ADBSS
AYEMU
XLXCW
FWAYE

SSWBW
MFWAY
HKNEH
MUMFW

KAABS
EMWLT
YKZMB
AYEMW

DXZFG
AMMNL
OEDXZ
LTAMM

ANWTZ
HGAHX
FGANW
NLHGA

PWEKV
QILIG
TZPWE
HXQIL

AEOEA
PPXFQ
MOGWO
IGPPX

: Monoalphabetic Cipher
ULNEA
NUULN
NKULN
WULPU
NXEUL
ULNBA
WNXEE
ULNWN
NULPU
NPKXE
ULPWS

YTWPX
BKRFN
FXZNW
BYZNP
NXBPA
YTGFN
RBGNK
PPETU
BYZNW
AMFPE
KRXUD

TFNUR
YZNKU
UYIHY
FYEAU
NYSAY
WWNTU
SXFFU
LNGXK
YEULN
UYEUL
XULWN

WBPHN
LNSXW
ZNKPF
LNAKY
TLNIK
LNBPE
LNNPK
TWYSU
AKYRE
NSPIN
NTXEX

BPEXE
LYSUL
FULNN
RETWY
NPUNT
TWPXT
ULPET
LNPXK
TULNE
YSULN
UULNJ

YRKXB
NWNPP
PKULP
AYTIK
LXBBP
UYULN
WRGTR
PETYZ
AYTWP
DLYFN
DXFFG

PANXE
ETULN
ETYZN
NPUNT
FNPET
BGNSK
NXUKR
NKNZN
XTXAX
NPKUL
NJYRK

YRKFX
GXKTW
KPFFU
BPEXE
SNBPF
RXUSR
FNYZN
KJFXZ
ZNJYR
PETNZ
WSYKS

63
PDF created with pdfFactory Pro trial version www.pdffactory.com

HNENW
YSULN
LNIKN
LXWYD
NLNIK
FPETX
KULNS
XEAIK
NZNKJ
NKJUK
YYTPE

WPETF
PXKYZ
PURKN
EXBPA
NPUNT
EIKNP
XWLYS
NPURK
WNNTG
NNULP
TUYPF

FULNG
NIKNP
KNPUL
WYAYT
WNZNE

NPWUW
URKNW
YSFXS
WPDPF
XEAPE

YSULN
ULPUB
NXEXU
FULPU
TULNK

NPKUL
YZNYE
XAXZN
LNLPT
NDPWB

PETPF
ULNAK
NZNKJ
BPTNP
YKEXE

FULNG
YRETN
AKNNE
ETXUD
AULNW

XKTWY
ZNKJU
MFPEU
PWZNK
XOULT

SULNP
LXEAU
SYKSY
JAYYT
PJ

XKPET
LPULP
YTPET
PETUL

PFFUL
WULNG
XUDPW
NKNDP

: Playfair Cipher
PK
OR
AT
AI
EK
RQ
QE
EK
IH
FL
KR
KR
OW
HY
AF
ER
EF
MK
OL
SL
EH
BD
SL
DB
ZN
NR
LO
OD
FD
BX
OX
EK
RH
SZ
RP
HE
XZ
IH
CV
HR
OK
RU
BZ
TX
OW
OF
KR
KR
BZ
DZ

QT
HY
VA
EK
RQ
LO
FW
HU
KR
FU
AF
YK
UK
EK
AG
EA
MK
UA
CI
CI
KY
NL
CI
AT
KL
RL
ZA
VK
TA
RU
ON
OW
OD
LZ
ZO
KE
KE
KR
UF
OR
KR
EO
NF
CI
XV
XC
AF
YK
EK
ZO

OX
EK
KU
HY
OR
OD
OR
XZ
HR
CI
ER
YG
MW
KY
AT
CI
UA
CI
ZS
ME
KU
HF
ME
XY
KY
NZ
TW
KO
ZR
OU
KR
XY
VK
RH
EK
SZ
MW
HR
OW
AE
YK
HR
EK
OL
LI
RY
ER
FW
RY
VB

OK
RK
GX
KY
RH
VK
HY
KE
AF
ZS
KA
OW
AZ
KY
OZ
RH
CI
SL
XL
LI
IO
ZO
LI
BZ
HY
RN
ZO
ZO
KR
BO
YK
RN
KI
ON
KY
LZ
AZ
AF
XV
KU
YG
OU
CR
CI
OL
EA
TF
EK
YD
HR

KR
RU
OW
QE
OL
KZ
EK
FL
UK
XL
NI
UK
EK
MU
BZ
EK
UM
CI
FA
LQ
EK
ZK
LQ
NI
ZO
LO
ZK
EK
OZ
OW
YG
LO
NI
KR
KY
RH
FL
UK
LI
OW
OW
IR
DN
HP
NR
ZN
ON
OW
EK
OR

QK
PH
YH
OW
CI
LI
HU
FU
PH
OF
UK
OW
RQ
BO
EK
KU
YG
OW
EK
HP
HU
IN
HY
EK
ZN
ZS
KR
KY
VK
XI
OW
GX
ZS
OZ
MU
ON
HT
PH
OL
VD
UK
KR
KE
RH
RL
YA
KR
IH
FL
AE

ZX
BO
VM
IH
ZS
OL
XZ
CI
OZ
VD
MU
XL
OR
KU
KU
EX
RU
IH
OR
KP
OW
KR
PH
TY
LW
IS
EK
KY
RO
FL
UK
SZ
PH
VK
BO
KR
QT
OZ
YX
RE
AI
UK
KR
FQ
NZ
SL
UK
KR
FU
KU

BI
OW
EI
KR
XL
NR
KE
EK
BZ
RE
WF
QE
RH
EX
HQ
QK
WF
KR
ZN
RE
IH
FT
PK
HT
DB
FL
FT
MU
CI
XU
AI
LI
TW
EK
TU
FL
XG
BZ
UH
NX
EK
SF
AF
ZO
RN
CI
LO
HR
CI
LW

OZ
IH
FL
UG
OF
RL
MW
HY
OW
IK
ER
FW
SW
OW
IO
MS
CI
MS
AF
OR
RL
ML
RO
ZO
AT
CI
XI
BO
UH
OW
EK
RF
EK
RU
IR
FU
OL
OW
KI
HF
KU
OW
ER
PK
LO
ZO
OW
AF
ZS
DB

BZ
KR
HT
FT
VD
KI
AZ
FW
IH
KR
AF
OR
LZ
IH
XI
EK
ZN
EK
XK
ZI
KN
TF
NZ
XL
XY
EK
FL
TU
KI
XF
KU
YH
HY
SO
KR
CI
CI
IH
EK
AX
EX
YH
HE
XC
ZS
WH
VD
UK
XL
AT

ZO
YK
QT
ZN
RE
EK
EK
TB
KR
HR
ER
HY
TY
KR
FL
RH
AF
RH
SI
BO
RU
UA
IO
OW
BZ
RH
FU
IR
EK
RU
EX
RN
UF
AZ
XB
EK
ZS
KR
RQ
UD
OU
PH
KY
FT
IS
RU
RE
PH
OF
XY

EK
FW
XG
AI
IK
HU
HY
KU
HR
QK
WM
EK
RO
HR
FU
HY
XG
HY
LI
KY
WM
XB
VU
IH
NI
RQ
CI
KR
RP
KA
NI
SZ
OW
LF
IE
TQ
XL
HR
OR
SW
ZS
EF
RP
FL
XV
UK
IK
OZ
VD
BZ

KQ
EK
AB
ZS
KR
XZ
FW
GX
AF
OW
TA
RQ
CI
AF
CI
NI
OU
AF
EK
HY
EA
ZO
OW
HR
EK
LO
ZS
XB
UK
OW
ZX
HR
IH
RE
SZ
XZ
FA
AF
RH
LZ
VL
OD
OL
BD
LI
ZO
KR
BZ
RE
NI

KP
OI
LO
FC
HR
KE
TB
KR
AG
KY
RA
OR
ZN
UK
ZS
IS
ZS
ER
TQ
QK
ZN
XL
KO
YK
TY
HP
XL
IE
HM
VD
PH
OR
KR
KR
DZ
KE
EK
AG
ER
RE
HR
ZD
BD
NL
CS
IB
NX
OW
IK
EK

ZO
NR
LZ
LO
QK
AF
KU
WL
AT
MU
OR
RH
AF
PH
XL
QT
VL
KA
ZS
FW
NF
OW
QK
XS
HT
TQ
OF
UO
RU
RE
OD
OD
UH
OK
HU
OW
OR
AT
YK
KR
OR
BZ
NL
HF
KU
AP
HF
IH
KR
TY

IB
KR
RH
TL
OD
XK
GX
SD
OZ
BO
RH
OQ
XG
OZ
OF
VU
LS
KR
XL
ZO
EK
XY
FW
RU
ZO
ZO
VD
QE
XG
IK
VK
VK
XG
FW
XZ
IH
ZN
OZ
RA
YK
HY
OW
HF
ZO
GX
QK
OX
KR
SL
HT

64
PDF created with pdfFactory Pro trial version www.pdffactory.com

ZO
YK
EK
PH
VK
SI
ZS
UH
BZ
KQ
OU
YH
OU
BZ
VD
LW
DS
WL
OF
ZM
UK
RN
ZO
TF
XL
MS
RE
FW
OX
KR
NI
KO
UK
XK
KE
UO
AF
BZ
ZN
FW
EK
FV
ZO
ZK
HY
WF
QB
HR
CI
ZO

KG
FW
KU
TF
RO
LI
VL
IC
EK
RE
ZS
HE
ZS
OW
RE
RU
HY
SD
VD
SL
YK
LO
KX
BZ
OW
CI
IK
OR
ZB
GW
ON
EK
HA
LI
IO
QE
XK
EK
CD
EK
KP
LZ
ZK
IZ
EK
CI
HR
AF
ME
XL

ZS
EK
AE
BZ
CI
OW
LS
XZ
RY
QR
FV
KR
VL
IH
IK
CI
EK
UH
RE
ON
XY
GX
KY
MW
XV
EK
KR
RE
OK
HU
KR
KP
XZ
UK
EK
FW
SI
RY
DZ
LW
HR
ZO
IN
KO
RP
DY
LO
AG
LI
OD

VL
AF
MF
LZ
EK
VC
DS
KE
FT
YK
LF
YK
LS
KR
KR
UH
HY
XL
IK
OL
OZ
IN
HY
OY
LI
RH
HR
KR
AZ
XZ
YK
HR
KE
KI
KY
OR
LI
UA
ZO
TA
OR
ZK
KR
TX
OW
SD
TU
AT
LQ
PH

HR
AX
QH
RH
RH
KU
HY
OW
OK
ON
RE
YG
DS
HR
AF
HI
EF
RU
KR
CI
RO
KR
LW
RN
OL
RQ
QK
FL
FW
KE
FW
OR
IK
EK
RU
HU
OW
HE
VB
XG
WH
TD
FT
CI
XL
OH
ON
OZ
HU
OK

LN
OZ
FV
KR
HQ
NI
OL
VD
XL
RL
UA
AI
RP
XY
EH
FT
MK
VU
RE
AX
SD
ZA
DA
ZN
XP
EK

HB
RF
LF
OD
HR
EK
YX
RE
AI
CI
CI
ZS
ZS
QB
AS
OW
UA
OW
RL
AT
OH
PH
YD
AF
SI
KU

HR
SO
RE
PH
OR
TY
UH
IK
EK
LZ
OU
VC
XC
HR
TU
IL
CI
NI
EK
IA
KR
IO
TY
XG
LI
YI

OR
RU
KR
OK
AE
HT
EO
KR
RU
RH
ZS
HQ
UH
LO
PH
PH
EK
ON
LO
IS
NX
EK
OZ
OU
OW
EK

AE
LC
NF
LN
KU
ZO
AG
RW
FT
LS
VL
HR
XG
TY
HE
HR
TQ
KR
MW
FL
HF
KP
NZ
ZS
IH
FL

KU
LW
DV
RS
EK
XL
SR
AS
LZ
DS
HR
OR
UK
BI
KR
PH
ZS
MF
OY
CI
OU
TA
ZX
XL
KR
FI

EK
DB
OW
BD
OR
OW
RP
TU
RH
EK
OR
HY
IH
QO
DY
EF
XL
QH
RN
NI
IR
OQ
PH
FA
HR

OR
AT
FZ
NL
ZA
XV
OW
PH
EK
HQ
HY
TD
KR
GW
LK
OD
OF
AI
ZN
LS
KR
YH
YK
LS
AF

ZA
XY
LS
HF
PH
LI
ZO
HE
HU
HR
RF
GF
RF
RH
AI
ZD
XY
EK
KL
DS
OF
PH
PH
DS
UK

PH
BZ
OL
ZO
LS
OL
UA
KR
DZ
OR
OZ
RF
CI
DY
EK
BZ
ZX
RQ
KY
EK
WF
EF
EF
EK
PH

LS
NI
BD
ZK
IO
NR
TF
DY
KU
AE
CT
UH
OL
SD
KU
WH
PH
TL
HY
KQ
CI
EK
MK
OR
OZ

IO
ZN
NL
IN
ZK
RL
RF
LK
NI
KU
XO
OW
YX
OH
RU
RU
IU
UH
ZO
RU
LS
ZO
KY
KR
BZ

ZK
XB
HF
KR
KR
NZ
PK
AI
BH
EK
AN
XD
NI
KR
FS
EO
YQ
YK
ZN
OK
DS
ZK
TQ
RL
OW

KR
ZO
ZO
FT
MK
RN
ZO
EK
LZ
OR
OZ
RP
EK
YK
CI
HR
PH
FW
IK
OU
EK
RL
VU
FV
IH

MK
FL
ZK
TX
UA
LO
UA
KU
RH
ZA
RF
LS
RP
FW
EK
EK
EF
EK
KR
IR
HQ
EK
OW
LF
KR

UA
CI
IN
CI
CI
ZS
HA
RU
LS
PH
PK
RK
QK
EK
KQ
OR
UK
OW
FQ
KR
HR
LO
RI
RU
HR

CI
ZN
KR
OL
LW
IS
XT
FS
DS
LS
ZO
HQ
MW
OW
FT
ZA
YK
YH
DO
YK
OR
EK
AT
CI
AF

OW
AF
FT
CI
DB
IH
TQ
CI
EK
IO
EK
HR
OY
XL
XL
PH
XC
PH
DS
FW
AE
KQ
IA
ZN
AG

FC
XG
TX
LS
AT
KR
KU
EK
KY
ZK
TY
OR
RI
SQ
AI
OU
RU
EF
QK
EK
KU
HR
IS
AF
AT

DO
OU
CI
DS
XY
BZ
GX
KQ
RU
KR
RF
HY
AS
YL
EK
ON
TF
EH
IU
OW
EK
OR
FL
LG
OZ

FL
ZS
OK
EK
BZ
LI
OW
FT
HE
MK
PK
EK
OW
TY
RU
KR
BZ
KY
AE
FL
OR
TL
CI
RH
BZ

65
PDF created with pdfFactory Pro trial version www.pdffactory.com

: Implementation


++
) ( Exception , Template , oop
.
.
(Keep It Simple Stupid) KISS
.J Quick And Dirty
.

Capital Letter 65
. 97
if 65 capital 97 . small Letter
.



.
.
.

66
PDF created with pdfFactory Pro trial version www.pdffactory.com

: characters
)
(
) ( .
.

Characters
. ++ char
. string
. array of char
) string ( .
:


overflow 200

overflow .
cin enter
. )( getche
)( getche )( getch .
)(: getche


3 10
10 J

67
PDF created with pdfFactory Pro trial version www.pdffactory.com

.
:


carriage return . enter
) strlen(array . )( getche
> #include <conio.h .

wajdy essam
.

.
)( getch cin.get(array,size,endchar):


)' cin.get(plaintext,100,'$ $
:
68
PDF created with pdfFactory Pro trial version www.pdffactory.com

)' cin.getline(plaintext,100,'$
:

string
.
) cin ( object string
wajdy essam
wajdy cin .


)( getche enter .

) ( .

69
PDF created with pdfFactory Pro trial version www.pdffactory.com

string
] str[i . index
:

Greatest Common Divisor


: Classical


0
.
implementation
Recursion Function

70
PDF created with pdfFactory Pro trial version www.pdffactory.com

71
PDF created with pdfFactory Pro trial version www.pdffactory.com

Trial Division

72
PDF created with pdfFactory Pro trial version www.pdffactory.com

Fast Exponentiation Algorithms


x^y y :
y x
.
__int64 long long int . 2^64 -1
y y
. 2^1024

73
PDF created with pdfFactory Pro trial version www.pdffactory.com

hex , binary ,
decimal , octal
.

" " .

Caesar Cipher
) ( . 3
.

:
:
) (
A Z D
Z . A,B,C
char normalChar[26] ; // contain the character alphabetic form A-Z
char cipherChar[26] ; // container character from D-Z+A,B,C

:
// initializing normalChar and cipherChar
; int i
)for (char ch='A' , i=0 ; i<26 ; i++,ch++

74
PDF created with pdfFactory Pro trial version www.pdffactory.com

normalChar[i] = ch ;
for (i=0 ; i<26 ; i++)
cipherChar[i] = normalChar[(i+3)%26];

inputChar
: outputChar
for (i=0 ; i<length ; i++)
{
if ( inputChar[i] == ' ' )
{
outputChar[i] = ' ' ;
continue;
}

// if it's space , ignore it

int x = (int)inputChar[i] ;

// take the character as number

x = x -

// make the number from 0-25

65 ;

outputChar[i] = cipherChar[x] ;
cout << outputChar[i] ;
}

// assign the cipher char to output

int
. 66 B
25 0 65
cipherChar index
.
outputChar
newNormal
for (int i=0 ; i<length ; i++)
{
if ( outputChar[i] == ' ' )
{
newNormal[i] = ' ' ;
continue;
}
int x = (int)outputChar[i] ;

// get cipher char , convert to int

x = x - 65 ;
x = x - key ;

// return it to number
// sub from it the key

// if it's negative make it from the begin of array


if ( x<0) x = 26-abs(x) ;
newNormal[i] = normalChar[x] ;
cout << newNormal[i] ;
}

75
PDF created with pdfFactory Pro trial version www.pdffactory.com


int
65 0 25
3 26
65 .
.
:


) (x 0 26
:
E 69 65 4
3 1 1 26 .
. 0
A 65 65 0
3 3- 23 = 3- 26
X .

ROT13
13
.

76
PDF created with pdfFactory Pro trial version www.pdffactory.com

Affine Cipher
:

m n
GCD ) (
.

77
PDF created with pdfFactory Pro trial version www.pdffactory.com

extended Euclid
:

: Vigenere
) (
)
( .

Simple Shift Vigenere Cipher


) 26 % (
) (
)
( :
:

78
PDF created with pdfFactory Pro trial version www.pdffactory.com

Full Vigenere Cipher


a tabular recta

) ( :

) :
( . :

79
PDF created with pdfFactory Pro trial version www.pdffactory.com

80
PDF created with pdfFactory Pro trial version www.pdffactory.com

Auto Key Vigenere Cipher



.
)
( .



.

81
PDF created with pdfFactory Pro trial version www.pdffactory.com

) (
:

the Running key Vigenere Cipher


) ( . .

:

82
PDF created with pdfFactory Pro trial version www.pdffactory.com

Playfair Cipher


. .

Reverse Cipher
) (
5 ) (
J

83
PDF created with pdfFactory Pro trial version www.pdffactory.com

Introduction to Modern
Cryptography

84
PDF created with pdfFactory Pro trial version www.pdffactory.com

Why Cryptography
"
"

)(
.


) ( ..


. J $1000
)
( " "
) (
) " "( .
:

!! " "

CD

permissions
) (login

)
Unix-Like (
administrator root

.


xp home safe Mode
!! ..
85
PDF created with pdfFactory Pro trial version www.pdffactory.com


preset account
administrator

. J



) ( .



.


!
password cracker
.
l0phtCrack
) (

Data Recovery Attack


System Crash Bad Sector
) (
.
..
Memory Reconstruction Attack




..
) ( .
Virtual Memory
86
PDF created with pdfFactory Pro trial version www.pdffactory.com



) ( Swap
1999
.
" "


gibberish
my name is wajdy , im a Beginer in java programming :
kjdkp isjeu epdmp owdkl kld dkl kqklq ds :

.
) (:
* Privacy
) ( !
* Data Integrity
) (
.
* Authentication

* : nonrepudiation

.
: Symmetric key Cryptography

Gibberish
.
:
) (
) .
"" ( .
87
PDF created with pdfFactory Pro trial version www.pdffactory.com

:


.

)
( ) (
) ... ( .


.

romansy User-
friendly
)(
Encryption )(
..

) (
..

88
PDF created with pdfFactory Pro trial version www.pdffactory.com


Romansy
!! " "

Romansy .

. Secret Key
romansy
)( )
( ) (.


) ( .

89
PDF created with pdfFactory Pro trial version www.pdffactory.com

)
(Symmetric key Cryptography Secret key Cryptography
) ( Conventional Encryption
.

.

Encryption

Decryption
Algorithm


XOR
) bit
. (Bitwise operation

90
PDF created with pdfFactory Pro trial version www.pdffactory.com

) ( ) plain text
.( clear text
) . ( cipher text
Key
.
attacker
. J
Cryptanalysis
) cryptanalyst ( .

. too late
cryptanalyst
!! cryptanalyst
.
cryptographer cryptanalyst

.

Symmetric
) (
:

91
PDF created with pdfFactory Pro trial version www.pdffactory.com

) ( DES ) (10

.

) (
) (
.
"
"

) (
) (
)( ) ( Romansy
.


.


.


.

92
PDF created with pdfFactory Pro trial version www.pdffactory.com

"
"
:
: :



.

) ( Engima )(
!!
cryptanalysts
) ( Code breaker
) ( .
RC4 RSA 1987
cryptanalysts
)
( 1994
! Disassembly
And Debugger
. RC4
SSL .

Navajo
.
.
: :

) . ( RC4
. J
: :
cryptanalysts
93
PDF created with pdfFactory Pro trial version www.pdffactory.com

cryptanalysts
.

.
: Key Generation
) 64
(
) (1005 13

Game Simulation And Modeling
Cryptography .


) ( ..
) (
" " )(
Binary Format 0 1
:
1 0
1 0 ) 1 (0
....


!! %100
.

94
PDF created with pdfFactory Pro trial version www.pdffactory.com

A Random Number Generator : RNG



:
:
RNG True RNG
) (

..

)( ) (

. True Random Number
Intel RNG
)
( .
: nCipher, Chrysalis cryptographic
accelerators ) RNG
cryptographic accelerators ( .
Pseudo -Random Number Generator
) ( :

""
"" .
) (

) ( T-RNG .
) (

.

. %100

.
95
PDF created with pdfFactory Pro trial version www.pdffactory.com

PRNG
) Seed
( RNG ) (
PRNG ) .( Seed Seed
RNG PRNG
Seed .
Seed
) ( millisecond
)
( .

" : Seed " PRNG


Seed
Seed
!! Seed ) (
1000 1000 .
PRNG Seed ) 160 (
Seed
.

96
PDF created with pdfFactory Pro trial version www.pdffactory.com

) (entropy PRNG
.
PRNG message digests
blenders
message digests
.
) (
LCG rand , random
random .

Attacks on Encrypted Data




.
Attacks on Keys :
brute-force attack
.
0 ) 100,000,000,000 (
0
0
1 2 100 .100,000,000,000 ...

97
PDF created with pdfFactory Pro trial version www.pdffactory.com



)
( ...
100
50
50 3 3 3
3 50
3 0 100
..
Key Size
bits bit 40
bit 56 ) bit 128 ( . ...
40 0 1
56 0 72 quadrillion
128 0 ..... 128

.
1997 40 48 280 ..
) 40 3 41 6
( .
1999 56 24 ) Electronic Frontier
Foundation . ( DES

FPI .
128 512
) ) (brute-force attack ( .

PRNG Seed PRNG Seed
Seed )
( Seed
...

98
PDF created with pdfFactory Pro trial version www.pdffactory.com

: Netscapes Seed
SSL
)
ELGAMAL
( SSL
PRNG ) + ( process ID
Seed . PRNG
process ID
brute-force attack 15
) ( 60 .
1995 Goldberg Wagner Seed
40 128 !!
Seed :
. mouse position, memory status, last key pressed, audio volume, and
many others
. Seed
: Breaking the Algorithm


.

99
PDF created with pdfFactory Pro trial version www.pdffactory.com


)
( .
Symmetric Key Cryptography
:
* Block Cipher
* Stream Cipher

Block Cipher
) ( ) Block(
) (
64 128 ) 16(

:
227 16
) 16(
16 . ) 16 (
16 14
) 224 (.
3 16
Padding
.
100
PDF created with pdfFactory Pro trial version www.pdffactory.com


.
:
) 13 (
" "13 PKC#5

.
16 )
(.

" " Block Cipher


.
" " wajdy essam 3 )
( . ) 16( ) 16(
) 16(.

" "Wajdy Essam ""Selrurjgqm
" "Wajdy Essam " " Selrurjgqm
" "Wajdy Essam " " Selrurjgqm
" " Selrurjgqm
.
" Mode Of Operation
" Feedback Modes
.
cipher block chaining ) (CBC
XOR .
101
PDF created with pdfFactory Pro trial version www.pdffactory.com

XOR
.

initialization vector . IV

Stream Ciphers

Key Stream
)
( .

102
PDF created with pdfFactory Pro trial version www.pdffactory.com

Block VS Stream

RC4
30 . 400-200
.

.

)(


. .
Block Cipher
.

Digital Encryption Standard



IBM
) Lucifer ( Horst Feistel
NSA . DES
DES Block Cipher 56
64 .
DES
brute-force
56 ) 0 72(
.
1999 24 the
Foundation Electronic Frontier .

Triple DES
Triple DES 3DES DES
) 16(
.

103
PDF created with pdfFactory Pro trial version www.pdffactory.com

56 ) 168(
" 24 72"

:
A , b , c 0 quadrillion ..72
:
A=1
B = 33,717
C = 1,419,222
b=0 , c=0 a=0 , ..
c=0 a=1, b=0 , ..
) a(
.

104
PDF created with pdfFactory Pro trial version www.pdffactory.com

DES 3 DES
DES
!!
:
DES 3

) ( DES
. RC2, RC5, IDEA, CAST, SAFER, Blowfish
DES . Triple DES
DES

Advanced Encryption Standard


National Institute of Standards and
Technology NIST
AES
15 ) ( .
1999 NIST 5
2000 Rijndael
. AES
: Symmetric-Key Management



. Symmetric-Key Management
"
"
) 56 ( )
( MB
.

Password-Based Encryption
" session
"key )
( .
105
PDF created with pdfFactory Pro trial version www.pdffactory.com

password-based encryption . PBE


session key
key encryption key
. KEK

) KEK (
KEK
)
(

.
Session key
.
KEK password-based
.encryption
: KEK
-1 -2 ) salt( . -3 blender blender .
-4 KEK KEK KEK .
-5 . .

106
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
-1 -2 -3 KEK
KEK
-4 KEK .. :

:
Mixing Algorithms and KEK
KEK
Entropy
..

107
PDF created with pdfFactory Pro trial version www.pdffactory.com

The Necessity of Salt



KEK
) KEK dictionary
. ( attack
KEK


) (J ..

KEK

) KEK ( Brute
Force attack .
) ( Brute Force Attack
KEK
.
Brute Force
in parallel
.

108
PDF created with pdfFactory Pro trial version www.pdffactory.com

dictionary Attack
.
Brute Force
.

14G:c*%3 wM*-l6g]_Bnp? d86


.

10
.

Hardware-Based Key Storage


PBE
Token
. crypto accelerators
Token ) (
USB Token

Token . 1970s era PC :

109
PDF created with pdfFactory Pro trial version www.pdffactory.com

Token
PIN
.
Token

Token
Token .

Crypto Accelerators
crypto accelerators


.

110
PDF created with pdfFactory Pro trial version www.pdffactory.com

RNG
PRNG Seed )
. ( Pseudo

Biometrics
Token crypto accelerators


.
Biometrics

) (
!

DNA )(
111
PDF created with pdfFactory Pro trial version www.pdffactory.com



!

)
( .

The Key Distribution Problem and Public-Key Cryptography


) (
) (PBE
Token
)
(.



)
(
.


Key Distribution Problem
Asymmetric
. key Cryptography

) ( :
Trusted Third PartyTTP : :


.


112
PDF created with pdfFactory Pro trial version www.pdffactory.com

. )
key logger
( .

.



) KEK (




.
) (

!







.

) (
)
( :
n ) 1/2 * (n^2 - n..
10 90/2 = 45 90 = 10- 100 45 20
190 1000
499500 !!

113
PDF created with pdfFactory Pro trial version www.pdffactory.com



) (
"" .

) 128
( )
(
. " " .

) ( .
: TTP
.
.
KEK
KEK .
KEK
.

KEK

.

114
PDF created with pdfFactory Pro trial version www.pdffactory.com




..
Asymmetric
key Cryptography
) ( Public-Key Cryptography
.
Public-Key Cryptography and the Digital Envelope
:
public Key
private Key
) (

..
public Key )
( .
private Key ) (

!!
...


) ( )
( )(

..

115
PDF created with pdfFactory Pro trial version www.pdffactory.com




MB 50
KB 200-20 . . -
)(
. Digital Envelope
Password Based Encryption PBE
Symmetric
PBE
.
Digital Envelope
Symmetric

) ( Symmetric ) (

.

public Key Cryptography
.
History of Public-Key Cryptography

1970 Martin Hellman Whitfield
Diffie Key
Distribution Problem

1976
New Direction in Cryptography
Diffe-Hellman . DH
1977 Ron Rivest MIT Adi Shamir ,
Len Adleman DH
Public key Cryptography ) RSA ( .

116
PDF created with pdfFactory Pro trial version www.pdffactory.com

1985 Neal Koblitz Victor Miller


IBM elliptic
curves public key
Cryptography .
:
RSA
ECDH - Elliptic Curve Diffie-Hellman
Algamal

The Digital Signature and Message


Digests

.
)
(

)
(
.

117
PDF created with pdfFactory Pro trial version www.pdffactory.com

)

(
) md5 SHA-1( )
.(message digest

..

) ( )
(
..
) (
..

118
PDF created with pdfFactory Pro trial version www.pdffactory.com




.


.

.

.
.
.

:
The Laws of Cryptography with java code , by Neal R.Wanger
Introduction to cryptography with Java applets, David Bishop
RSA Securitys Official Guide to Cryptography , Steve Burnett and
Stephen Paine
www.wikipedia.com

2 11 2007
SudanGeek@hotmail.com
WajdyEssam@hotmail.com

119
PDF created with pdfFactory Pro trial version www.pdffactory.com

You might also like