13 views

Uploaded by samaher hussein

Dr. Samaher Hussein Ali

save

You are on page 1of 11

By Dr. Samaher Hussein Ali

College of Information Technology, University of Babylon, Iraq Samaher_hussein@yahoo.com

10/15/2012

Homophonic System

In the substitution system the relation between the text and key is one to one. In this type the relation is one to many (i.e each letter can enciphered in multi images) Example:Plain text letter A I L N O P T Cipher text homophonic letters 17,19,34,41,56,60,67,83 08,22,53,65,88,90 03,44,76 02,09,15,27,32,40,59 01,11,23,28,42,54,70 33,91 05,10,20,29,45,58,64,78,99

Example: Plain Text: PILOT Cipher Text: 91 88 76 70 99 Plain Text : ALL Cipher Text :19 76 03

10/15/2012

Notes of Lecture 4

Polyalphabetic substitution ciphers have multiple one-letter keys, each of which is used to encrypt one letter of the plaintext. The first key encrypts the first letter of the plaintext, the second key encrypts the second letter of the plaintext, and so on. After all the keys are used, the keys are recycled. If there were 20 one-letter keys, then every twentieth letter would be encrypted with the same key. This is called the period of the cipher. In classical cryptography, ciphers with longer periods were significantly harder to break than ciphers with short periods. There are computer techniques that can easily break substitution ciphers with very long periods.

10/15/2012

Notes of Lecture 4

There might be five different simple substitution ciphers used: 1. Vigenre cipher 2. Beaufort cipher 3. Beale cipher also called (book cipher) where the key string is an agreed text in a book. 4. Hill cipher 5. Permutation cipher

10/15/2012

Notes of Lecture 4

Note : When key length is less than the length of text to be ciphered we repeat the key letters to be equal to the plain text letters. Plaintext : Computer Key : sun

We can draw only a partial table containing the key letters as follows

Cipher : The cipher text letters can be found by taking the letters apposing the key letters from the above table as follows comput er sun sunsu u i z h o g w l (the cipher text) Decipher: The key letters are spreaded over the cipher text. When two letters crossected on the same row ,then the letter above the crossection in the outside row is the plaintext letter.

10/15/2012

Notes of Lecture 4

Example Plaintext : Good Student Key : exam Solution : goodst u d ent examexamexa Cipher Text : klopwqupIkt Decipher

As a Result, The Vigenere cipher In the Vigenere cipher the key consists of a string of k letters. These are written repeatedly below the message (from which all spaces have been removed). The message is then encrypted a letter at a time by adding the message and key letters together, working mod 26 with the letters taking values A = 0 to Z = 25. For example if the key is the three letter sequence key then the message 1

10/15/2012

Notes of Lecture 4

M = THISISTHEMESSAGE is encrypted using K = KEYKEYKEYKEYKEY To give the cryptogram C=DLGCMQDLCWIQCEEO. The vigeneer cipher is slightly stronger than simple substitution. To attack it using frequency analysis is more difficult since the encryption of a particular letter is not always the same .However it is still trivial to break given a reasonable amount of ciphertext. Then, C=((P+Ki)-1) Mod n P= (C-Ki)+1) Mod n Let C= Cipher Text P= Plain Text Ki= Key; n =26 , of English alphabetic

10/15/2012

Notes of Lecture 4

The monoalphabetic is easily to analysed using statistical features of the letters of the language.Here we assume that we have k distinct bijenctions f1,f2,,fk from the normal alphabet to the set of cipher to represent an encryption of a word.It uses k different alphabets, the index set {1,2,,k} is called the set of keys. Example: Let us consider a simple example using three keys with three values (a,b)=(1,3); (3,5);(2,5) in turn to give the encryption of a short text. If we want to encrypt the following message The international islamic university provides a scientific basis for the mutual interaction of the natural science and Islam Using 3 keys of mixed alphabets with the encryptions f1,f2,f3 . f1 = a1 X + b1 (i,e., a1 = 1, b1 = 3) f2 = a2 X + b2 (i,e., a2 = 3, b2 = 5) f3 = a3 X + b3 (i,e., a3 = 2, b3 = 5) then we have to do as follows f1 (T)=W, f2 (H)=A, f3 (E)=W, f1 (I)=L, f2 (N)=S, f3 (T)=T f1 (E)=H, f2 (R)=E, f3 (N)=P, f1 (A)=D, f2 (T)=K, f3 (I)=Q The total encryption of text will be Thein terna tiona lisla micun ivers itypr ovide sasci entif icbas isfor themu tuali ntera ction ofthe natur alsci ences andIs lamxx comes to be the string of ciphers WAWLS THEPD KQRSC ODOOF KLLYQ DDHEO LKSSE UYDRH HCVLQ HSTLU QFICV DOIVJ WAWPN TXFFL

10/15/2012

Notes of Lecture 4

Consider the rule a group of k subsequent letters changes into another group of k subsequent letters this is called Digraph cipher . In this case the plain text alphabet consists of all two letters combinations of the ordinary alphabet thats giving 262=676 symbols P=(aa,bb,ac,,ba,bb,bc,zx,zy,zz) then we get the all ordered pairs that is all vectors (xy) (Z/26)2. The American mathematician Laster Hill suggested a procedure for encryption decryption such vectors by using matrices as follows p q A= r s with p,q,r,s Z/26. then weobtain the linear transformation X1=px + qy Y1=rx + sy which may be regard as an encryption function .This transformation is bijective iff gcd(ps-qr,26)=1 in this case the decryption function corresponds to the inverse matrix A-1=1/d . Where d=ps qr Example : Let ,

p q r s

Of determinant 1.if we want to encrypt the word MALAYSIA we have to form the corresponding numerical string (12,0,11,0,24,18,8,0) and break it up into 4-pairs and then compute the image vectors under the transformation A.Hence we get A(12o)=(1210),A(110)=(117), A(2418)=(86), A(80)=(8 24) yielding the encryption MKLHIGIY

1 2 A= 3 7

10/15/2012

Notes of Lecture 4

As a result, the rule is change a group of k subsequent lettersinto another group of k subsequent letters Procedure of Encryption: 1. Convert the Plain text into pairs of Digital number 2. Using the following matrix p q r s 1 cipher text = 1 A= ..condition (ps-qr=1) + = +

3.

Procedure of Decryption:

1 = 1

2.

1. A-1=1/d .

1 1 2 12 12 12 = ( ) Mod 26 = 26= 1 3 7 0 36 10

1 1 = 1 =Plain Text

s q r p

10/15/2012

Notes of Lecture 4

Return to example: (Decryption) GCD( ps-rq,26)= GCD(7-6,26)=GCD(1,26)=1, Then , we can perform the decryption 1.

s q A-1=1/d . r p

1 =

d=ps-qr=(7-6)=1

7 2 3 1

1 7 2 1 = 1 = ( 3 1

12 ) mod 26 = 10

84 20 26 12 = = 36 + 10 26 0

Plain Text

10/15/2012

Notes of Lecture 4

- 6527 6386 Protect SecurityUploaded bynicasioaquino
- A Method for Preserving Secret Information in the Data Mining through CryptographyUploaded byAnonymous vQrJlEN
- sslUploaded byoopop
- Cryptography_Basics_PKIUploaded bySylvain MARET
- lect1Uploaded bySubhan50
- 04-eVotingUploaded byAndreea Visan
- 1914F-6Uploaded byCristian David Guerra
- team 4 finalUploaded byapi-19893402
- CryptographyUploaded bySabin Bhandari
- crv0n0-0Uploaded bypostscript
- fcnsunit1Uploaded bykarthickamsec
- Introduction to Cryptography.txtUploaded byANKS
- 7 - Attack cryptographyUploaded byAnnisa Sarah
- Analysis of Rsa Algorithm Using GpuUploaded byAIRCC - IJNSA
- module Classical Ciphers Cryptanalysis 2Uploaded bykimloan0911
- ea2ee137Uploaded bysugee_kun
- Digital Signature and Watermark Methods For Image Authentication using Cryptography AnalysisUploaded bysipij
- ReportUploaded byChethanKamath
- xsUploaded bynguyenha.bkpes
- Securable Network in 3 Party NetworkUploaded byAmjad Shaik
- DATA HIDING AND RETRIEVAL USING DIGITAL SIGNALUploaded byAnonymous vQrJlEN
- Dynamic Programming He and Elgamal Used For Software Agent SecurityUploaded byEighthSenseGroup
- A Data Outsourcing Architecture CombiningUploaded byscokpinar
- IntroductionUploaded byrahinikasiraj
- FPGA Based Network Security Using CryptographyUploaded byIRJET Journal
- IJERA(www.ijera.com)International Journal of Engineering Research and ApplicationsUploaded byAnonymous 7VPPkWS8O
- q5solUploaded byNickHenry
- A Survey on Secured Logging in the CloudUploaded byesatjournals
- bit cn manual 7th cseUploaded byvpradeepbm
- Computer Networks Manual for Part BUploaded bySourab Kanthavar

- Lecture 4Uploaded bysamaher hussein
- Lecture 8Uploaded bysamaher hussein
- Lecture 7Uploaded bysamaher hussein
- Lecture 2Uploaded bysamaher hussein
- Lecture 3Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 11Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 14Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 10Uploaded bysamaher hussein
- Lecture 1Uploaded bysamaher hussein
- Lecture 9Uploaded bysamaher hussein
- Lecture 13Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 8Uploaded bysamaher hussein
- Lecture 7Uploaded bysamaher hussein
- Lecture 6Uploaded bysamaher hussein
- Lecture 3Uploaded bysamaher hussein
- Lecture 11Uploaded bysamaher hussein
- Lecture 2Uploaded bysamaher hussein
- Quantum CryptographyUploaded bysamaher hussein
- Lecture 14Uploaded bysamaher hussein
- Lecture 10Uploaded bysamaher hussein
- Lecture 9Uploaded bysamaher hussein
- Lecture 13Uploaded bysamaher hussein
- Lecture 1Uploaded bysamaher hussein
- Lecture 5Uploaded bysamaher hussein
- Lecture 4Uploaded bysamaher hussein

- Classical Encryption TechniquesUploaded byprasanthrajs
- monoalphateic cipher.pptUploaded byEswin Angel
- Criptografía clásica y criptoanálisisUploaded byyo_maxx1988
- Cifrado CésarUploaded byMati Toscano
- 01-Criptography History Ihb2014Uploaded byFelipe Cordeiro
- Cifrado Julio CesarUploaded byWillians Miguel Márquez Pianeta
- vigenèreUploaded bySebastian Sierra Loaiza
- ch02Uploaded byRamveer Singh
- vigenere cryptanalysisUploaded byperhacker
- CipherUploaded bySergio Mario Herreros
- Cryptography - lecture2Uploaded byAbhijeet
- Ab Crypt 2 Classical EncryptionUploaded byVinay Madgavkar
- Cifra de CésarUploaded byMário Araújo
- CNS_LABMANUAL.docxUploaded byakira
- Chiffrement de Cesar (décalage)Uploaded bykeums888
- Transposition CipherUploaded byFasih Ur Rasheed
- CIFRADOSUploaded byupasikabiblioteca
- ch_03Uploaded bygovindsangli
- Transposition CiphersUploaded byVinayak Wadhwa
- Tarea 5 Algoritmos CriptográficosUploaded byDiego Castañares Yapur
- Types of Classical CiphersUploaded byAsmahani Rashid
- Presentation 2Uploaded bykadhum_technology
- Tap CodeUploaded byShubhangi
- FourUploaded bySiddharth Kar
- CENG 520 _ISUploaded byNivitha Moorthy
- The Playfair CipherUploaded bynav1991nav
- 1(ciphers)Uploaded byAnand Raj
- Crypto LAB 2017Uploaded byLuqman Kassim
- EncryptionUploaded byJames Elsan
- CiphersUploaded byArchette