You are on page 1of 119

1

PDF created with pdfFactory Pro trial version www.pdffactory.com






www.3asfh.com

.

Classical Method

)
(
.

.


)
Transposition ( Substitution
.

:


.

Introduction to Classical Cipher



Cryptanalysis .

2
PDF created with pdfFactory Pro trial version www.pdffactory.com
The Implementation ) ( C++

) .
( .

Introduction To Modern Cryptography


""
.

Introduction To Number Theory and it's Application


Primality Testing , Factorization Techniques ,Congruence Solving,
Random Number Generation
Introduction To Information & Coding Theory and it's Application
Huffman Code , Hamming Code , Error Correction Code , Entropy
Explain and Implementation for Most Crypto Cipher
RSA ,DES ,Triple DES, AES , Blowfish , ECC , ALGAMAL
History About Cryptography and Crypto Devices and Arabic
) Cryptographer (Alkindi, Taher Algamal
Addition Classical Cipher & More About Cryptanalysis cipher

" "
. .

:
SudanGeek@hotmail.com :
wajdyessam@hotmail.com
Romansy , at : 2-11-2007

3
PDF created with pdfFactory Pro trial version www.pdffactory.com
7 ............................................ Preliminaries :
7 ................................................ THE DIVISION ALGORITHM
8 ............................................................................ Prime Number
10 ............................................... Greatest Common Divisor
11 .............................................................. Euclidean Algorithm
12 .................................... Extended Euclidean Algorithm
16 .................... The Fundamental Theorem of Arithmetic
17 ............................................ Least Common Multiple
17 ........................................................................... XOR Exclusive-Or
18 ...................................................................................................Logarithms
20 .................................................. :
21 ............................................................................................... Coding
23 ........................................................ Classical Method
24 ...................................................... Monoalphabetic Substitution Cipher
24 ............................................................................... Caesar Cipher
29 ............................................................................... Atbash Cipher
29 ................................................................................................. ROT13
30 ........................................................................................ Affine Cipher
32 ....................................................... MONOALPHABETIC
34 ......................................................... Polyalphabetic substitution cipher
34 .................................................................. Simple Shift Vigenere Cipher
37 ................................................................... Vigenere
38 .................................... Key Length KAISISKI
42 ........................................ THE FULL VIGENERE CIPHER
43 ...................... THE AUTO-KEY VIGENERE CIPHER
44 .................... THE Running KEY VIGENERE CIPHER
45 ............................................................. PolyGram Substitution Cipher
46 ............................................................. THE PLAYFAIR CIPHER
48 ..................................................................................... Hill Cipher
54 ...................................... PolyGram Substitution Cipher
54 ........................................... THE JEFFERSON CYLINDER
56 .......................... HOMOPHONIC SUBSTITUTION CIPHERS

4
PDF created with pdfFactory Pro trial version www.pdffactory.com
58 .................................................... TRANSPOSITION CIPHERS
61 .................................................................. THE ONE-TIME PAD
63 ..................................................................................
66 ......................................... Implementation :
67 .......................................................................... characters
70 .......................................... Greatest Common Divisor
71 ...................................................................................
72 ............................................................. Trial Division
72 .........................................................................................
73 ...................................................................... Fast Exponentiation Algorithms
74 ............................................................................... Caesar Cipher
76 ................................................................................................. ROT13
77 ............................................................................ Affine Cipher
78 .............................................. Simple Shift Vigenere Cipher
79 ............................................................Full Vigenere Cipher
81 .......................................... Auto Key Vigenere Cipher
82 ................................. the Running key Vigenere Cipher
83 ............................................................................. Playfair Cipher
83 ...................................................................................... Reverse Cipher
84 ................................ :
85 ...................................................................... Why Cryptography
87 ......................................... Symmetric key Cryptography
91 .............................................................................
94 ......................................................................... Key Generation
100 .............................................................................. Block Cipher
102 .......................................................................... Stream Ciphers
103 .......................................................................... Block VS Stream
103 ................................................................................................. Triple DES
105 .................................................................... Advanced Encryption Standard
105 ............................................ Symmetric-Key Management
109 ............................................. Hardware-Based Key Storage
110 .................................................................................... Crypto Accelerators

5
PDF created with pdfFactory Pro trial version www.pdffactory.com
112 ........................... The Key Distribution Problem and Public-Key Cryptography
116 . History of Public-Key Cryptography
119 .....................................................................................

:
Preliminaries

6
PDF created with pdfFactory Pro trial version www.pdffactory.com
: Preliminaries

Number Theory
.
Prove
Affine Cipher .

a b ) a !=0 . (0 a b
c . b = a*c a b . a|b

:
3|27 . 27 = 9*3
5|32 32 = 4*c . c

. x|z x,y,z x|y y|z

:
3|9 9|72 3 3|27 = 72

THE DIVISION ALGORITHM


b r . b

y,b b q,r
:
Y = b*q + r
q r . Quotient b . remainder Divisor
y . dividend

:
65 = 3*q + r
q ) 21 65 (3 r . 2
3*21+2 . 65

7
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
-21 = 5*q + r

-21 5 - 4 1-
r 5
1
. r = 4 q = -5
:
-21 = 5*-5+4 .

: Prime Number

:

integer 1
. 1 1 Composite Number

:
2 3 7 23 29 163 .

:
) 4 ( 2
) 100 2 . (5


0 1 . 21-

1 .
.
N n . N

x ) 2
( . x x

.

8
PDF created with pdfFactory Pro trial version www.pdffactory.com
101 2 101 . 10
101 . 2
101 3
101 4 5 6 7 8 . 9 10
101 .


. Trial Division

500 250
Trial Division
250 )
( .


. Trial Division

Sieve of Eratosthenes
2 3 5 7 .

2 99
) ( 2
3 :

2 99
.

9
PDF created with pdfFactory Pro trial version www.pdffactory.com
) Greatest Common Divisor ( GCD

. 18 30
:

30 1 2 3 5 6 10 15 30
18 1 2 3 6 9 18

. 6
GCD(30,18) = 6

" " Relatively Prime


. 1

: Relatively Prime
8 9 . 1
23 44
27 55

:
)|GCD(x,y) = GCD(x,-y) = GCD(-x,y) = GCD(-x,-y) = GCD(|x|,|y

:
GCD(18,-54) = GCD(18,54) = 9

: 20: 30 15 5 :
GCD(20,30) = 10
CGD(10,15) = 5

10
PDF created with pdfFactory Pro trial version www.pdffactory.com
= 1
) ( ) 1 (
mutually relatively prime
. pairwise relatively prime

: 28 126 21 : 10
= )( (28,126) , 21 , 10
= )(14 , 21 , 10
= )( (14,21) , 10
= )(7,10
=1


). 7 = (28,126
. mutually relatively prime
pairwise relatively
. prime

: 18 9 25 1 mutually relatively
prime 18,9 ) 9 ( .

Euclidean Algorithm

c,q c = q*d + r ). GCD(d,r) = GCD(c,q

: 132 55 :

132 = 55 * 2 + 22
55 = 22 * 2 + 11
22 = 11 * 2 + 0

11 :
GCD(132,55) = GCD(55,22) = GCD(22,11) = GCD(11,0) = 11

: ) GCD(252,198

252 = 198 * 1 + 54
198 = 54 * 3 + 36
54 = 36 * 1 + 18
36 = 18 * 2 + 0

11
PDF created with pdfFactory Pro trial version www.pdffactory.com
: 18
GCD(252,198) = (198,54) = (54,36) = (36,18) = (18,0) = 18

Extended Euclidean Algorithm

Linear Combination
GCD(x,y) = m*x + n*y :

m n .
) ( .

Backward
m . n
:

) GCD(26,21 Linear Combination 26 : 21


:
26 = 1* 21 + 5
21 = 4 * 5 + 1
5 = 5*1 +0

. )
( :
]1 = 21 4 * 5 [1
:
]5 = 26 1 * 21 [2

] [2 ]: [1
)1 = 21 4 * (26 1 * 21
:
1 = 21 -4*26 +4*21
4*21 + 21 :

1 = 5*21 + (-4)*26
5*21 + -4*26 .

m 5 n . 4-
) n m (.

12
PDF created with pdfFactory Pro trial version www.pdffactory.com
: a=3 MOD 26
3 . 26 :

26=8*3+2 2= 26 - 8*3
3=1*2+1 1= 3 2
2=2*1+0

1= 3 - 2 = 3 - (26 - 8*3) = 3 26 + 8 * 3 = 9*3 26


1 = 9*3+(-1)*26

3 . 9

:
) GCD(26,21 Linear Combination 26 : 21
:

A Q X
26
21

26 21 . 21
26 MOD 21 = 5
5 . 21

21 5 5 1
0 .
A Q X
26
21
5
1
0

26 21 ) q (
1 21 5
4 .

13
PDF created with pdfFactory Pro trial version www.pdffactory.com
A Q X
26
21 1
5 4
1 5
0

x 0 1

26
21 1
5 4 1
1 5 0
0

x 4 = 0 + 1*4

x .
4 = 4*1 + 0
26
21 1 4
5 4 1
1 5 0

5 = 4*1 + 1 :
26 5
21 1 4
5 4 1
1 5 0
0
:
A Q X
26 5
21 1 4

1 = 5 * 21 4 * 26
1 = 5*21 + (-4)*26
) m . ( n

14
PDF created with pdfFactory Pro trial version www.pdffactory.com
/ 23 MOD 26

A Q X
26 9
23 1 8
3 7 1
2 1 1
1 0

1 = 8 * 26 9 * 23. Correct
23
9- . 9
1 = 8 * 26 + (- 9) * 23

:
GCD (x, y) = snx + tny

s t :

) GCD(252,198 Linear Combination 252 . 198

j q r
s,t .

252 198 . r

15
PDF created with pdfFactory Pro trial version www.pdffactory.com
252 198 ) ( q 1
252 198 54 r .

198 54 q 3 198 54
36 . r

54 36 1 q 18 r
36 18 2 q 0 . r

. . s ,t
s0 = 1 , s1= 0 : . t0 =0 , t1= 1
.

si ) s i-2 (
. si-1 * qi-1

:
Si= si-2 si-1*qi-1
= 1 - 0*1
=1

. t s
t s=4 : . t=-5

:
GCD(252,198) = 4*252 + (-5)*198
4*252 + (-5)*198 18
252 . 198

) ) s,t (
Affine Cipher (.

The Fundamental Theorem of


Arithmetic

1 n = p1*p2*p3*pn :
P
. Prime Power Factorization of an integer

16
PDF created with pdfFactory Pro trial version www.pdffactory.com
) Least Common Multiple (LCM

.

:
)LCM(x,y) = x*y / GCD(x,y

:
lcm(36, 78) = 36 78/(36, 78) = 36 78/6 = 6 78 = 468
lcm(21, 56) = 21 56/(21, 56) = 21 56/7 = 3 56 = 168
lcm(100, 2050) = 100 2050/(100, 2050) = 100 2050/50 = 2 2050 = 4100

XOR Exclusive-Or
:

. 2
0 + 0 MOD 2 = 0
0 + 1 MOD 2 = 1
1 + 0 MOD 2 = 1
1 + 1 MOD 2 = 0

17
PDF created with pdfFactory Pro trial version www.pdffactory.com
XOR
swap :

:
;temp = a
;a = b
;b = temp
:
;a = a xor b
;b = a xor b
;a = a xor b

) r p ( . C = r XOR p
:
c ) P = r XOR c ( .

XOR .

An XOR might keep your kid sister from reading your files, but it
wont stop a cryptanalyst for more than a few minutes

Logarithms

18
PDF created with pdfFactory Pro trial version www.pdffactory.com
log log e
log2 . log10

log e log 2 log2 x = log(x) / log(2) :


log e log 10 log10 x = log(x) / log(10) :
log10 log2 log2 x = 3.322 * log10 (x) :

log2 bit . x
Log2(10000) = 13.28771
14 10000

log10 . x

19
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

Classical Cipher

20
PDF created with pdfFactory Pro trial version www.pdffactory.com
: Coding


Encryption

. Codebook


) ( .

: Code Book

Word
Codeword .

Codeword Word
.

21
PDF created with pdfFactory Pro trial version www.pdffactory.com

ATTACK ENEMY AT DAWN

Codebook :
ATTACK RUN
ENEMY EXPLODE
:
RUN EXPLODE LION COMPUTER

) Codeword
( . Code Number

Codeword
Jargon codes
) ( .

A Codeword
B ) ( .
:
BOXER SEVEN SEEK TIGER5 AT RED CORAL

BOXER SEVEN A SEEK


TIGER B RED CORAL
. AT

Codeword
. CodeNumber

CodeNumber
85772 24799 10090 59980 12487

85772 BOXER SEVEN


24799 SEEK

.

Word
CodeNumber CodeWord
one-part-Code
" " .

22
PDF created with pdfFactory Pro trial version www.pdffactory.com
)
(
) ( A CodeNumber 20 B 21
C 22
A Z Two-
Part-Code
.


Two-Part-Code

)
( .

: Classical Method




Character-Based 26
0) Bit ( 1
:

: Substitution Cipher

Plaintext cipher char
.

: Transposition

) . Permutation ( .

: XOR


) ( .

23
PDF created with pdfFactory Pro trial version www.pdffactory.com
Substitution Cipher :
Monoalphabetic Substitution Cipher :
Polyalphabetic Substitution Cipher :
PolyGram Substitution Cipher :
Homophonic Substitution Cipher :

: Monoalphabetic Substitution Cipher



Substitution .
frequency
analysis
Cryptanalysis
.

: Monoalphabetic Substitution
Caesar Cipher
Affine Cipher
ROT13 Cipher
Abash Cipher

: Caesar Cipher

)
3 ( .
.

)
( .

24
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

:
FIRE MISSILE

+ ) (3
Z .

3 ) 3( :
F+3 = I
I+3 = L
.

:
ILUH PLVVLOH


block 5
) ( .


:
ILUHP LVVLO H

)
Symmetric Key
(Cryptography .
) 3 Shift (3
.

FREQUENCY ANALYSIS

) (
..
E .

25
PDF created with pdfFactory Pro trial version www.pdffactory.com


E .

:
WFIDZ JVORT KCPVD GKZEV JJVDG KZEVJ JVORT KCPWF IDJFZ KZJNZ KYJVE
JRKZF EGVIT VGKZF EDVEK RCIVR TKZFE REUTF EJTZF LJEVJ JRCCK YZEXJ
RIVVJ JVEKZ RCCPV DGKPE FKSFI EEFKU VJKIF PVUEF KJKRZ EVUEF KGLIV
NZKYF LKCFJ JNZKY FLKXR ZEKYV IVWFI VZEVD GKZEV JJKYV IVZJE FWFID
EFJVE JRKZF EGVIT VGKZF EDVEK RCIVR TKZFE FITFE JTZFL JEVJJ EFVPV
VRIEF JVKFE XLVSF UPDZE UEFTF CFIJF LEUJD VCCKR JKVKF LTYFS AVTKF
WKYFL XYKEF JVVZE XREUJ FFEKF EFKYZ EBZEX EFZXE FIRET VREUE FVEUK
FZXEF IRETV EFFCU RXVRE UUVRK YEFVE UKFFC URXVR EUUVR KYEFR EXLZJ
YTRLJ VFWRE XLZJY TVJJR KZFEG RKYEF NZJUF DREUE FRKKR ZEDVE KJZET
VKYVI VZJEF KYZEX KFRKK RZEKY VSFUY ZJRKK MRCZM VJKYL JNZKY EFYZE
UIRET VFWDZ EUEFY ZEUIR ETVRE UYVET VEFWV RIWRI SVPFE UUVCL UVUKY
FLXYK IZXYK YVIVZ JEZIM RER

W .....
W 9 F
.

:
A: 1 B: 1 C: 16 D: 14 E: 82 F: 69 G: 10 H: 0 I: 27 J: 47 K: 61
L: 15 M: 3 N: 5 O: 2 P: 8 Q: 0 R: 45 S: 5 T: 21 U: 28 V: 69
W: 9 X: 15 Y: 28 Z: 47

E ) 82
( E
E E
. E

F,V 69 . E

F E ) 1 F . ( E
V E ) . 17
V 17 . ( E

26
PDF created with pdfFactory Pro trial version www.pdffactory.com
.17 1

( ) 1
. 1

: 17

FORMI SEXAC TLYEM PTINE SSEMP TINES SEXAC TLYFO RMSOI TISWI THSEN
SATIO NPERC EPTIO NMENT ALREA CTION ANDCO NSCIO USNES SALLT HINGS
AREES SENTI ALLYE MPTYN OTBOR NNOTD ESTRO YEDNO TSTAI NEDNO TPURE
WITHO UTLOS SWITH OUTGA INTHE REFOR EINEM PTINE SSTHE REISN OFORM
NOSEN SATIO NPERC EPTIO NMENT ALREA CTION ORCON SCIOU SNESS NOEYE
EARNO SETON GUEBO DYMIN DNOCO LORSO UNDSM ELLTA STETO UCHOB JECTO
FTHOU GHTNO SEEIN GANDS OONTO NOTHI NKING NOIGN ORANC EANDN OENDT
OIGNO RANCE NOOLD AGEAN DDEAT HNOEN DTOOL DAGEA NDDEA THNOA NGUIS
HCAUS EOFAN GUISH CESSA TIONP ATHNO WISDO MANDN OATTA INMEN TSINC
ETHER EISNO THING TOATT AINTH EBODH ISATT VALIV ESTHU SWITH NOHIN
DRANC EOFMI NDNOH INDRA NCEAN DHENC ENOFE ARFAR BEYON DDELU DEDTH
OUGHT RIGHT HEREI SNIRV ANA


.

.

Key Phrase Monoalphabetic


. ( )

: Key Phrase
THE HILLS ARE ALIVE

A A
. T
... E C H B

)(
WAJDY :
STOP FIRE :
:
Plaintext : ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher text : WAJDYBCEFGHIKLMNOPQRSTUVXZ

27
PDF created with pdfFactory Pro trial version www.pdffactory.com
STOP FIRE QRMN BFPY :
Block
. QRMNB FPY

28
PDF created with pdfFactory Pro trial version www.pdffactory.com
Atbash Cipher


.

...

Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: ZYXWVUTSRQPONMLKJIHGFEDCBA
money . nlmvb

:
= " "hob " "sly
= " "hold ""slow
= " "holy ""slob
""horn" = "slim
""irk" = "rip
""low" = "old
""glow" = "told
"grog" = "tilt".

ROT13
) ( Monoalphabetic
13 13
13
.

))P = ROT13 (ROT13 (P

p Plaintext 13
D D 3
) 26%(13+3 16 13 D
. Q

29
PDF created with pdfFactory Pro trial version www.pdffactory.com
13 ) 13
( . Q (16+13)%26 = 3
13 . D

ROT13 Unix
Puzzle )(
.

Affine Cipher

) Affine Cipher
product
( Cipher
:
c = p + key MOD n
) key ( .

:
C = p * key MOD n

) Affine (
.
C = m*p + key MOD n

m n
m n . 1 ) .
( .

) m GCD(m,n) = 1

(.

:
)P = m` * (c key) (MOD n

30
PDF created with pdfFactory Pro trial version www.pdffactory.com
WAR LOST :
key 10 m . 7

m .
m 26) n ( .
GCD(7,26) = 1 . M

:
22 0 17 11 14 18 19

:
C = m * p + key MOD 26

C1 = 7 * 22 + 10 MOD 26 = 8
C2 = 7 * 0 + 10 MOD 26 = 10
C3 = 7 * 17 + 10 MOD 26 = 25
C4 = 7 * 11 + 10 MOD 26 = 9
C5 = 7 * 14 + 10 MOD 26 = 4
C6 = 7 * 18 + 10 MOD 26 = 6
C7 = 7 * 19 + 10 MOD 26 = 13

:
8 10 25 9 4 6 13
IKZJE GN :

m :
)P = m` * (c key) (MOD 26

)
( .

7 26 15 :

P1 = 15 * ( 8 10 ) MOD 26 = 22
P2 = 15 * ( 10 10 ) MOD 26 = 0

31
PDF created with pdfFactory Pro trial version www.pdffactory.com
P3 = 15 * ( 25 10 ) MOD 26 = 17
P4 = 15 * ( 9 10 ) MOD 26 = 11
P5 = 15 * ( 4 10 ) MOD 26 = 14
P6 = 15 * ( 6 10 ) MOD 26 = 18
P7 = 15 * ( 13 10 ) MOD 26 = 19

22 0 17 11 14 18 19 : :
) WARLO ST ( .

MONOALPHABETIC

)
- - ( .
.


10 ) ( .

:
fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc

:

. E

32
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
a:2 , b:5 , c:3 , d:0 , e:0 , f:3 , g:0 , h:2 , i:0 , j:7 , k:1 , l:0 , m:1 , n :7

) w ( .

j n 7.

j E 5 5
:
5:
f-5 = a
q-5 = l
j-5 = e
c-5 = x
b-5 =w
:
alexw mrere ajevs .
. N
e-n=9 E . 9
9....

f-9 = w
q-9 = h
j-9 = a
c-9 = t
b-9 = s

:
whats inana mearo sebya nyoth ernam ewoul dsmel lassw eet


what's in a name a rose by any other name would smell as sweet

: ""monalphbetic
jmjmj gsmsg lrjgu csqyj quflr mfajq erdmc cmqlv lqyhg gawgq arpgq
sblce jrlrj lnmec cyjqu flrmf ajqer d

33
PDF created with pdfFactory Pro trial version www.pdffactory.com
a b c d e f g h I j k lm no p q r s tuvwxyz
m o n a l p h b e t I c d f g j k q r suvwxyz

j j
j p m a
.

:
Papap otato espou ltryp runes andpr ismar eallv erygo odwor dsfor theli
psesp ecial lypru nesan dpris m

:
Papa potatoes poultry prunes and prism are all very good words for the
lips especially prunes and prism
) www.arabteam2000.com
( MEMONONO

Polyalphabetic substitution cipher


Monoalphabetic
. 4
.
.

Vigenere Cipher

Engima . :
Simple Shift Vigenere Cipher
Full Vigenere Cipher
Auto-Key Vigenere Cipher
Running Key Vigenere Cipher

Simple Shift Vigenere Cipher


..
.

34
PDF created with pdfFactory Pro trial version www.pdffactory.com
) ( :
DEFCON FOUR

:
5 :
13 :
2 :
7:

) ( Key Length 5 13 2 7 :

D 5
= D + 5 ) I D 3 5
26 % 9 . ( I
E 13
R
....

Block 5:
:
IRHJT AHVZE

35
PDF created with pdfFactory Pro trial version www.pdffactory.com


A
0 B 1...

)( 1 12 0 18 19 14 5 5 :

BLAST OFF :

: Code Wheel

) (

- - :

36
PDF created with pdfFactory Pro trial version www.pdffactory.com
:


. S

) ( S
A ) ( .

G G
Y . .

H H
. p...

Vigenere

)
Period
(

Key Length .

Key Length

) E
( Monoalphabetic .

37
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
XZQTY IISTN PAWRT GSGPO LNOXF

5
Block
.

X
I
P
G
L
1 n

XIPGL
....

) (

.

)
( .

KAISISKI Key Length


XYZ

XYZ XYZ
.

38
PDF created with pdfFactory Pro trial version www.pdffactory.com
FSI FSI
:

- F F FSI -

7 3
F
FSI .

LJVBQ STNEZ LQMED LJVMA MPKAU FAVAT LJVDA YYVNF


JQLNP LJVHK VTRNF LJVCM LKETA LJVHU YJVSF KRFTT
WEFUX VHZNP

Key Length
.

LJV .
LJV

39
PDF created with pdfFactory Pro trial version www.pdffactory.com
L L 15
L L 15.
.

L :

10,15,15
) ( 5.
5

.

5 Monoalphabetic
.

:
LSLLM FLYJL VLLLY KWV

40
PDF created with pdfFactory Pro trial version www.pdffactory.com
L

E T R


E L
J E !


THE

L T
j H
V . E

T L ) 18 ( S
H J ) 2 .( C
E V ) 17 . (R

SCR

N
. A )(
. A,B

SCRAB
26*26

.

A,M
. SCRAM

SCRAM :

41
PDF created with pdfFactory Pro trial version www.pdffactory.com
THEBE ARWEN TOVER THEMO UNTAI NYEAH THEDO GWENT
ROUND THEHY DRANT THECA TINTO THEHI GHEST SPOTH
ECOUL DFIND

THE BEAR WENT OVER THE MOUNTAIN YEAH THE DOG WENT
ROUND THE HYDRANT THE CAT INTO THE HIGH EST SPOT HE
COULD FIND

THE FULL VIGENERE CIPHER

) (

a tabular recta

:
HARKONNEN RULZ

SPICE :

42
PDF created with pdfFactory Pro trial version www.pdffactory.com
.
H S

H S . O
A P . Z
.

OZTJYJTZGDKPX :
OZTJY JTZGD KPX :


) (

.

OZTJY JTZGD KPX :


SPICE :

S
S O
. H .

THE AUTO-KEY VIGENERE CIPHER

:
LIGHT SPEED CHEWIE NOW

) ( ARGH :



L+A=L
I+R=Z
G+G=M
H+H=O
) (

43
PDF created with pdfFactory Pro trial version www.pdffactory.com

L
L + T =E
I
I+S=A
.


... .

) (
) ( .
) (
) . ( .

THE Running KEY VIGENERE CIPHER


) (

)(
) (

) (.

TORA TORA TORA :

:
AND GOD SAID LET THERE BE LIGHT

44
PDF created with pdfFactory Pro trial version www.pdffactory.com
.

AUTO-KEY AND RUNNING KEY VIGENERE CIPHERS

Monoalphabetic

)
( .

PolyGram Substitution Cipher


) ( Polygraphic


POLYGRAM
Block .
.

8 8
:

Brute-Force 26 8 ) (8^26
26^8 = 208,827,064,576


8
.
.

45
PDF created with pdfFactory Pro trial version www.pdffactory.com
Polygraphic
Playfair
Hill Cipher
Jifferson Cylinder THE BAZERIES
. CYLINDER

THE PLAYFAIR CIPHER

Block
25 ) (5 *5 A B
) ( 26
I,J .

5*5 :

) (
:
The quick brown fox jumped over the lazy dogs

5 *5 T
H ) (

.

46
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
Since by man came death

Blocks .
A,B



.X
. X

:
A B )
(.
A B A B
) Wrap
.
A B A B
. ) Wrapping (.

) (:

:
AMBASSADOR SHOT

47
PDF created with pdfFactory Pro trial version www.pdffactory.com
.
AM BA SS AD OR SH OT


X SS : X
AM BA SX SA DO RS HO T

X :
AM BA SX SA DO RS HO TX

A M
.
A M M . N

B A
.
B U A . D

S X

S S X Q
X X X . N

:
MN UD QN AM BA MP ID FE

MN :
M A
N . M

Hill Cipher

3
Lester S Hill .

48
PDF created with pdfFactory Pro trial version www.pdffactory.com
)
( .

)
( 3*3 .

GYBNQKURP :
3*3
:

ACT :
.

:3*1


.
. . MOD 26

) (
POH :


26 :

49
PDF created with pdfFactory Pro trial version www.pdffactory.com
3-Hill Cipher
3*3 2-Hill
Cipher 2*2 n-Hill Cipher
. n*n

2-Hill Cipher 2*2


26 .
" " Determinant
26 Determinant 26
.1
:



. 2*2 :

50
PDF created with pdfFactory Pro trial version www.pdffactory.com
Determinant of a matrix A, denoted by det A :
-- if A(aij) is 22, then det A =a11a22 a12a21
-- if A(aij) is 33, then det A =
a11a22a33 + a12a23a31 + a13a21a32 - a13a22a31 - a12a21a33 -
a11a23a32

( d )d^-1
. 1 26 mod d

d * d` = 1 (mod 26)

: 26 2 ""

51
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

THE PROFESSOR IS EVIL :


. J

hill 2 3 . 4

2-Hill Cipher .

Block
) 2-Hill Cipher n
n ( .

) A 1 0
A . ( 0

. P

. .

) det )(
26 mod 1
( .

p A ) c(

52
PDF created with pdfFactory Pro trial version www.pdffactory.com
) 26 mod ( . :

:
RLQFXCHAAQAFCWAXMB

) (
)
26 . 26
N
n .( modular arithmetic

26 mod :

: :
THE PROFESSOR IS EVIL

row reduction
( .

53
PDF created with pdfFactory Pro trial version www.pdffactory.com
PolyGram Substitution Cipher

)
(

TH HE Digraphs

3 trigraphs
THA THE AND .
Modern Cryptography
8 .

THE JEFFERSON CYLINDER



. Thomas Jefferson

36 26 36
) ( .

25
25 .

25

.

54
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

Hard to
Implementation
.

55
PDF created with pdfFactory Pro trial version www.pdffactory.com
HOMOPHONIC SUBSTITUTION CIPHERS

HOMOPHONIC


.

E 13 T 9
Homophonic E 13 T9

. onetomany mapping

: Homophonic

56
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
RETREAT

R 8 .
E 13 .

:
DQ AW CC AQ CO BS DB

) ( .

inverse mappings
:


. !

57
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

TRANSPOSITION CIPHERS

: Reversing


!

:
Wajdy Essam Is Java Developer :
repoleveD vavJ sI massE ydjaW :

) 5( :
repol eveDv avJsI massE ydjaW

:
1 4 2 3 3 1 4
. 5 5 2

:
1 4
4 5
5 2
2 3
3 1
1 4
) (.

THE SKY FALLING PLEASE ADVISE :

THESK YFALL INGPL EASEA DVISE :

58
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
1 4 : T S
4 5 : S K

Blocks
:
EKHTS ALFYL GLNIP SAAEE IEVDS




) Transposition . ( Substitution

COMBINATION
SUBSTITUTION/TRANSPOSITION CIPHERS

.
:

A
. A ) AA
(.

"" . Maps
B maps to AB
C maps to AC
...
Q maps to DB
...
Y maps to EE
Z maps to DB

59
PDF created with pdfFactory Pro trial version www.pdffactory.com
) ( TAKE ME TO YOUR LEADER :

T maps . DE A Maps
. AA :
DE AA CA AE CC AE DE CE EE CE EA DC CB AE AA AD AE DC

) (

....

:
DE AA CA AE CC AE DE CE EE CE EA DC CB AE AA AD AE DC

:
DE AA CA AE CC AE DE CE EE
CE EA DC CB AE AA AD AE DC

D C E E :
DC EE AE AA CD AC AC EB CA CE AA EA DA ED CA EE ED EC

DC . R
EE . Y
:
RYEANCCVKOAUPXKYXW

Block 5:
RYEAN CCVKO AUPXK YXW

! .

:
RYEAN CCVKO AUPXK YXW



R D C R
D C
. :

60
PDF created with pdfFactory Pro trial version www.pdffactory.com
DE AA CA AE CC AE DE CE EE
CE EA DC CB AE AA AD AE DC


:
DE map to T
AA map to A
CA map to K
...

TAKEMETOYOURLEADER :

TAKE ME TO YOUR LEADER :

ADFGVX
.
.

THE ONE-TIME PAD


) " "
( .

) ( one-time pad
Sheets
) ( .


J .

one-time pad

ENGAGE WARP DRIVE :

61
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
9 20 13 0 21 1 13 19 9 5 25 12 25 4 7 25 0 8 8 7 24 2 6 18 16 10 23 5 11
12 13 6 22 22 17 3 8 0 0 19 4 15

E 9 N N
20 . H....


)! ( one-time pad

62
PDF created with pdfFactory Pro trial version www.pdffactory.com

:
MXXFT QQHUX WMDYM QHQDO DQMFQ PNKYQ EUZOQ ARAXP AZMOO AGZFA RYKNQ
SUZZU ZSXQE ESDQQ PTMFD QPMZP USZAD MZOQN ADZAR YKOAZ PGOFE BQQOT
MZPFT AGSTF UZAIO AZRQE EABQZ XKMZP RGXXK

simple Vigenere cipher


()
SSQYN ASXES RBFOR SOUYK VTAKO QVKSZ WOQSF VNOBB BRWKB BRCQS
QSOSF WJYSX FHKYS YGODI FSUMD BJJOD FQCWN IBSDO HSPBW XBDIL
MWQGP FZNVD DOSGO NEZSB JJSBQ FSXUW QOIOZ VLBIN TSBTP VBKUV
OXKOJ KDFMZ UCUBB DVITS PKTHC ZPZCB FWZVZ YCLMW HJOSO VBQCE
SGSSO BIWCS FDISC BZOBN DFMZU CUBBD VIORS NJHWY OBSGZ CFUTD
FSOUS BWSFV BUAOO SNOTO ZPSSR FBBCY SGQRP HDKVZ OXEJO XTHCX
FGQYU HVKOR PYPYC PBDDV JSRMS MDDPU FKQVM MSQDB FGGBP GSXLS
BXFHV OMSAO OHOBZ BIWCS FDISC BZOBN JHGKQ DZSDO HSPBG LPGHY
OORNJ GCXXS GVFMF YTWBQ NWQRB SZSND ZONSB DJBUO MZWZU WQMVF
JODFM ZUCUB BDVIH FSOOK WMIAO XOWBQ TAWDI FWMIO FNJBH OSBSD
DFMZU CUBBD VICCG DPBON EWGYO KSCMS MCUOZ VJBUC XWZVJ OAMSM
DDPUF KQVMK ORBOU KCBLG SMVFW DZBRO EWHSP BIZQS FCBRR VFFWF
FFDBF BHSDS VKMZG DFDSX TCBXF OZMSM DDPBC WJQCX OSKIP FYZFF
SXOWO VUFOZ QSKKE SOXEK OCIWB QUCBV BKFOO QSSOH FYEIQ DJCBD
PQFIQ HCQSO DRZKW DIQCN JBUDI SCBZI DZFFG KERZO SWJOS DFOOH
WMFVO VMKOI OSFZF HSBEW GKQDS KSWBQ DFMZU CUBBD VIDVS CUBID
IWZVB DDBPT SCTWC XBZ

Auto-Key Vigenere Cipher


:

TVWFP VVHZD PZXLX ADBSS SSWBW KAABS DXZFG ANWTZ PWEKV AEOEA
PIOBZ TALSV XUIFW AYEMU MFWAY EMWLT AMMNL HGAHX QILIG PPXFQ
ZMEAD XUXCM RSJHZ XLXCW HKNEH YKZMB OEDXZ FGANW TZPWE MOGWO
EAPKH HRTAL SVXUI FWAYE MUMFW AYEMW LTAMM NLHGA HXQIL IGPPX
FSSSW BWKAA BS

: Monoalphabetic Cipher
ULNEA YTWPX TFNUR WBPHN BPEXE YRKXB PANXE YRKFX HNENW WPETF
NUULN BKRFN YZNKU LNSXW LYSUL NWNPP ETULN GXKTW YSULN PXKYZ
NKULN FXZNW UYIHY ZNKPF FULNN PKULP ETYZN KPFFU LNIKN PURKN
WULPU BYZNP FYEAU LNAKY RETWY AYTIK NPUNT BPEXE LXWYD EXBPA
NXEUL NXBPA NYSAY TLNIK NPUNT LXBBP FNPET SNBPF NLNIK NPUNT
ULNBA YTGFN WWNTU LNBPE TWPXT UYULN BGNSK RXUSR FPETX EIKNP
WNXEE RBGNK SXFFU LNNPK ULPET WRGTR NXUKR FNYZN KULNS XWLYS
ULNWN PPETU LNGXK TWYSU LNPXK PETYZ NKNZN KJFXZ XEAIK NPURK
NULPU BYZNW YEULN AKYRE TULNE AYTWP XTXAX ZNJYR NZNKJ WNNTG
NPKXE AMFPE UYEUL NSPIN YSULN DLYFN NPKUL PETNZ NKJUK NNULP
ULPWS KRXUD XULWN NTXEX UULNJ DXFFG NJYRK WSYKS YYTPE TUYPF

63
PDF created with pdfFactory Pro trial version www.pdffactory.com
FULNG NPWUW YSULN NPKUL PETPF FULNG XKTWY SULNP XKPET PFFUL
NIKNP URKNW ULPUB YZNYE ULNAK YRETN ZNKJU LXEAU LPULP WULNG
KNPUL YSFXS NXEXU XAXZN NZNKJ AKNNE MFPEU SYKSY YTPET XUDPW
WYAYT WPDPF FULPU LNLPT BPTNP ETXUD PWZNK JAYYT PETUL NKNDP
WNZNE XEAPE TULNK NDPWB YKEXE AULNW XOULT PJ

: Playfair Cipher
PK QT OX OK KR QK ZX BI OZ BZ ZO EK KQ KP ZO IB ZO KG ZS VL HR
OR HY EK RK RU PH BO OW IH KR YK FW EK OI NR KR YK FW EK AF AX
AT VA KU GX OW YH VM EI FL HT QT XG AB LO LZ RH EK KU AE MF QH
AI EK HY KY QE OW IH KR UG FT ZN AI ZS FC LO TL PH TF BZ LZ RH
EK RQ OR RH OL CI ZS XL OF VD RE IK KR HR QK OD VK RO CI EK RH
RQ LO OD VK KZ LI OL NR RL KI EK HU XZ KE AF XK SI LI OW VC KU
QE FW OR HY EK HU XZ KE MW AZ EK HY FW TB KU GX ZS VL LS DS HY
EK HU XZ KE FL FU CI EK HY FW TB KU GX KR WL SD UH IC XZ KE OW
IH KR HR AF UK PH OZ BZ OW IH KR HR AF AG AT OZ BZ EK RY FT OK
FL FU CI ZS XL OF VD RE IK KR HR QK OW KY MU BO KQ RE QR YK ON
KR AF ER KA NI UK MU WF ER AF ER WM TA RA OR RH OU ZS FV LF RE
KR YK YG OW UK OW XL QE FW OR HY EK RQ OR RH OQ YH HE KR YK YG
OW UK MW AZ EK RQ OR RH SW LZ TY RO CI ZN AF XG OU ZS VL LS DS
HY EK KY KY MU BO KU EX OW IH KR HR AF UK PH OZ BZ OW IH KR HR
AF AG AT OZ BZ EK KU HQ IO XI FL FU CI ZS XL OF VD RE IK KR AF
ER EA CI RH EK KU EX QK MS EK RH HY NI IS QT VU LW RU CI UH HI
EF MK UA CI UM YG RU WF CI ZN AF XG OU ZS VL LS DS HY EK HY EF
MK UA CI SL CI OW IH KR MS EK RH HY AF ER KA KR WL SD UH XL RU
OL CI ZS XL FA EK OR ZN AF XK SI LI EK TQ ZS XL OF VD RE IK KR
SL CI ME LI LQ HP KP RE OR ZI BO KY HY QK FW ZO ZM SL ON OL CI
EH KY KU IO EK HU OW IH RL KN RU WM EA ZN NF EK UK YK XY OZ RO
BD NL HF ZO ZK IN KR FT ML TF UA XB ZO XL OW XY RN LO GX IN KR
SL CI ME LI LQ HY PH PK RO NZ IO VU OW KO QK FW ZO KX KY HY LW
DB AT XY BZ NI EK TY HT ZO XL OW IH HR YK XS RU TF BZ MW OY RN
ZN KL KY HY ZO ZN LW DB AT XY BZ NI EK TY HT ZO XL OW XV LI OL
NR RL NZ RN LO ZS IS FL CI EK RH RQ LO HP TQ ZO MS CI EK RH RQ
LO ZA TW ZO ZK KR EK FT XI FL FU CI ZS XL OF VD RE IK KR HR QK
OD VK KO ZO EK KY KY MU BO TU IR KR XB IE UO QE FW OR RE KR FL
FD TA ZR KR OZ VK RO CI UH KI EK RP UK HM RU XG OX ZB OK AZ FW
BX RU OU BO OW XI FL XU OW XF RU KA OW VD RE IK KR GW HU XZ KE
OX ON KR YK YG OW UK AI EK KU EX NI ZX PH OD VK NI ON KR YK FW
EK OW XY RN LO GX SZ LI RF YH RN SZ HR OR OD VK KO EK KP HR OR
RH OD VK KI NI ZS PH TW EK HY UF OW IH KR UH XG UK HA XZ KE IK
SZ LZ RH ON KR OZ VK EK RU SO AZ LF RE KR OK FW XK LI UK KI EK
RP ZO EK KY KY MU BO TU IR KR XB IE SZ DZ HU XZ KE IO EK KY RU
HE KE SZ LZ RH ON KR FL FU CI EK TQ XZ KE OW IH UO QE FW OR HU
XZ KE MW AZ FL HT QT XG OL CI ZS XL FA EK OR ZN AF XK SI LI OW
IH KR HR AF UK PH OZ BZ OW IH KR HR AF AG AT OZ BZ EK RY UA HE
CV UF OW XV LI OL YX UH KI EK RQ OR RH ER YK RA ZN CD DZ ZO VB
HR OR AE KU OW VD RE NX HF AX UD SW LZ RE KR YK FW EK LW TA XG
OK KR YK YG OW UK AI EK KU EX OU ZS VL HR OR HY EK KP HR OR WH
RU EO HR OU IR KR UK SF OW YH PH EF OD ZD BZ OW FV LZ ZO ZK TD
BZ NF EK CR DN KE KR AF ER HE KY RP OL BD NL HF ZO ZK IN KR FT
TX CI OL CI HP RH FQ ZO PK XC FT FL BD NL HF ZO ZK IZ KO TX CI
OW XV LI OL NR RL NZ RN LO ZS IS XV LI CS KU GX HY EK RP OW XL
OF XC RY EA ZN YA SL CI ZO WH RU UK ZO IB AP QK WF CI DY SD OH
KR AF ER TF ON KR UK LO OW VD RE IK KR NX HF OX QB HR LO TU ON
KR YK FW EK OW IH KR HR AF UK PH OZ BZ OW IH KR HR AF AG AT OZ
BZ EK RY YD EK FL FU CI ZS XL OF VD RE IK KR SL CI ME LI LQ HU
DZ ZO VB HR OR AE KU LW DB AT XY BZ NI EK TY HT ZO XL OD PH OK

64
PDF created with pdfFactory Pro trial version www.pdffactory.com
LN HB HR OR AE KU EK OR ZA PH LS IO ZK KR MK UA CI OW FC DO FL
OZ RF SO RU LC LW DB AT XY BZ NI ZN XB ZO FL CI ZN AF XG OU ZS
FV LF RE KR NF DV OW FZ LS OL BD NL HF ZO ZK IN KR FT TX CI OK
KR OD PH OK LN RS BD NL HF ZO ZK IN KR FT TX CI OL CI LS DS EK
HQ HR OR AE KU EK OR ZA PH LS IO ZK KR MK UA CI LW DB AT XY BZ
NI EK TY HT ZO XL OW XV LI OL NR RL NZ RN LO ZS IS IH KR BZ LI
OL YX UH EO AG SR RP OW ZO UA TF RF PK ZO UA HA XT TQ KU GX OW
VD RE IK KR RW AS TU PH HE KR DY LK AI EK KU RU FS CI EK KQ FT
XL AI EK RU FT LZ RH EK HU DZ KU NI BH LZ RH LS DS EK KY RU HE
RL CI LZ RH LS DS EK HQ HR OR AE KU EK OR ZA PH LS IO ZK KR MK
UA CI OU ZS VL HR OR HY RF OZ CT XO AN OZ RF PK ZO EK TY RF PK
AI ZS VC HQ HR OR HY TD GF RF UH OW XD RP LS RK HQ HR OR HY EK
RP ZS XC UH XG UK IH KR RF CI OL YX NI EK RP QK MW OY RI AS OW
XY QB HR LO TY BI QO GW RH DY SD OH KR YK FW EK OW XL SQ YL TY
EH AS TU PH HE KR DY LK AI EK KU RU FS CI EK KQ FT XL AI EK RU
FT OW IL PH HR PH EF OD ZD BZ WH RU EO HR EK OR ZA PH OU ON KR
MK UA CI EK TQ ZS XL OF XY ZX PH IU YQ PH EF UK YK XC RU TF BZ
VU OW NI ON KR MF QH AI EK RQ TL UH YK FW EK OW YH PH EF EH KY
RE RL EK LO MW OY RN ZN KL KY HY ZO ZN IK KR FQ DO DS QK IU AE
AX AT IA IS FL CI NI LS DS EK KQ RU OK OU IR KR YK FW EK OW FL
SD OH KR NX HF OU IR KR OF WF CI LS DS EK HQ HR OR AE KU EK OR
ZA PH IO EK KP TA OQ YH PH EF EK ZO ZK RL EK LO EK KQ HR OR TL
DA YD TY OZ NZ ZX PH YK PH EF MK KY TQ VU OW RI AT IA IS FL CI
ZN AF XG OU ZS XL FA LS DS EK OR KR RL FV LF RU CI ZN AF LG RH
XP SI LI OW IH KR HR AF UK PH OZ BZ OW IH KR HR AF AG AT OZ BZ
EK KU YI EK FL FI

65
PDF created with pdfFactory Pro trial version www.pdffactory.com
: Implementation


++
) ( Exception , Template , oop
.
.

(Keep It Simple Stupid) KISS


.J Quick And Dirty
.


Capital Letter 65
. 97
if 65 capital 97 . small Letter
.



.
.

66
PDF created with pdfFactory Pro trial version www.pdffactory.com
: characters
)
(
) ( .
.


Characters
. ++ char
. string

. array of char
) string ( .


overflow 200

overflow .

cin enter
. )( getche
)( getche )( getch .

)(: getche


3 10
10 J

67
PDF created with pdfFactory Pro trial version www.pdffactory.com
.
:


carriage return . enter

) strlen(array . )( getche
> #include <conio.h .


wajdy essam
.

)( getch cin.get(array,size,endchar):


)' cin.get(plaintext,100,'$ $
:

68
PDF created with pdfFactory Pro trial version www.pdffactory.com
)' cin.getline(plaintext,100,'$
:

string
.

) cin ( object string


wajdy essam
wajdy cin .


)( getche enter .


) ( .

69
PDF created with pdfFactory Pro trial version www.pdffactory.com
string
] str[i . index

Greatest Common Divisor


: Classical


0
.

implementation
Recursion Function

70
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

71
PDF created with pdfFactory Pro trial version www.pdffactory.com
Trial Division

72
PDF created with pdfFactory Pro trial version www.pdffactory.com
Fast Exponentiation Algorithms
x^y y :

y x
.
__int64 long long int . 2^64 -1

y y
. 2^1024

73
PDF created with pdfFactory Pro trial version www.pdffactory.com
hex , binary ,
decimal , octal
.

" " .

Caesar Cipher
) ( . 3
.

:

:
) (
A Z D
Z . A,B,C

char normalChar[26] ; // contain the character alphabetic form A-Z


char cipherChar[26] ; // container character from D-Z+A,B,C

:
// initializing normalChar and cipherChar
; int i
)for (char ch='A' , i=0 ; i<26 ; i++,ch++

74
PDF created with pdfFactory Pro trial version www.pdffactory.com
normalChar[i] = ch ;

for (i=0 ; i<26 ; i++)


cipherChar[i] = normalChar[(i+3)%26];

inputChar
: outputChar
for (i=0 ; i<length ; i++)
{
if ( inputChar[i] == ' ' ) // if it's space , ignore it
{
outputChar[i] = ' ' ;
continue;
}

int x = (int)inputChar[i] ; // take the character as number

x = x - 65 ; // make the number from 0-25

outputChar[i] = cipherChar[x] ; // assign the cipher char to output


cout << outputChar[i] ;
}

int
. 66 B
25 0 65
cipherChar index
.

outputChar
newNormal

for (int i=0 ; i<length ; i++)


{
if ( outputChar[i] == ' ' )
{
newNormal[i] = ' ' ;
continue;
}

int x = (int)outputChar[i] ; // get cipher char , convert to int

x = x - 65 ; // return it to number
x = x - key ; // sub from it the key

// if it's negative make it from the begin of array


if ( x<0) x = 26-abs(x) ;

newNormal[i] = normalChar[x] ;
cout << newNormal[i] ;
}

75
PDF created with pdfFactory Pro trial version www.pdffactory.com
:


int
65 0 25
3 26
65 .
.


) (x 0 26
:
E 69 65 4
3 1 1 26 .
. 0

A 65 65 0
3 3- 23 = 3- 26
X .

ROT13
13
.

76
PDF created with pdfFactory Pro trial version www.pdffactory.com
Affine Cipher
:

m n
GCD ) (
.

77
PDF created with pdfFactory Pro trial version www.pdffactory.com
extended Euclid
:

: Vigenere

) (
)
( .

Simple Shift Vigenere Cipher

) 26 % (
) (
)
( :

78
PDF created with pdfFactory Pro trial version www.pdffactory.com
Full Vigenere Cipher

a tabular recta

) ( :

) :
( . :

79
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

80
PDF created with pdfFactory Pro trial version www.pdffactory.com
Auto Key Vigenere Cipher


.
)
( .

81
PDF created with pdfFactory Pro trial version www.pdffactory.com
) (
:

the Running key Vigenere Cipher


) ( . .

82
PDF created with pdfFactory Pro trial version www.pdffactory.com
Playfair Cipher


. .

Reverse Cipher
) (
5 ) (
J

83
PDF created with pdfFactory Pro trial version www.pdffactory.com
:

Introduction to Modern
Cryptography

84
PDF created with pdfFactory Pro trial version www.pdffactory.com
Why Cryptography

"
"


)(
.



) ( ..


. J $1000

)
( " "
) (
) " "( .


!! " "

CD


permissions
) (login

)
Unix-Like (

administrator root

.



xp home safe Mode
!! ..

85
PDF created with pdfFactory Pro trial version www.pdffactory.com

preset account
administrator

. J




) ( .



!
password cracker
.

l0phtCrack
) (


Data Recovery Attack


System Crash Bad Sector
) (
.
..

Memory Reconstruction Attack






..
) ( .

Virtual Memory

86
PDF created with pdfFactory Pro trial version www.pdffactory.com


) ( Swap
1999
.

" "


gibberish

my name is wajdy , im a Beginer in java programming :


kjdkp isjeu epdmp owdkl kld dkl kqklq ds :

) (:
* Privacy
) ( !

* Data Integrity
) (
.

* Authentication

* : nonrepudiation

.

: Symmetric key Cryptography


Gibberish
.

:
) (
) .
"" ( .

87
PDF created with pdfFactory Pro trial version www.pdffactory.com
:


)
( ) (
) ... ( .


romansy User-
friendly
)(
Encryption )(
..

) (
..

88
PDF created with pdfFactory Pro trial version www.pdffactory.com

Romansy
!! " "

Romansy .


. Secret Key

romansy
)( )
( ) (.



) ( .

89
PDF created with pdfFactory Pro trial version www.pdffactory.com


.

)
(Symmetric key Cryptography Secret key Cryptography
) ( Conventional Encryption
.


.

Encryption

Decryption

Algorithm


XOR
) bit
. (Bitwise operation

90
PDF created with pdfFactory Pro trial version www.pdffactory.com
) ( ) plain text
.( clear text
) . ( cipher text

Key
.

attacker
. J

Cryptanalysis
) cryptanalyst ( .


. too late
cryptanalyst
!! cryptanalyst
.

cryptographer cryptanalyst

.

Symmetric
) (
:

91
PDF created with pdfFactory Pro trial version www.pdffactory.com
) ( DES ) (10

.


) (
) (
.

"
"


) (
) (
)( ) ( Romansy
.


.

92
PDF created with pdfFactory Pro trial version www.pdffactory.com
"
"

: :


) ( Engima )(
!!

cryptanalysts
) ( Code breaker
) ( .

RC4 RSA 1987


cryptanalysts
)
( 1994
! Disassembly
And Debugger
. RC4
SSL .


Navajo
.
.

: :


) . ( RC4
. J

: :

cryptanalysts

93
PDF created with pdfFactory Pro trial version www.pdffactory.com
cryptanalysts
.

: Key Generation

) 64
(

) (1005 13

Game Simulation And Modeling
Cryptography .



) ( ..

) (
" " )(
Binary Format 0 1
:
1 0
1 0 ) 1 (0
....


!! %100
.

94
PDF created with pdfFactory Pro trial version www.pdffactory.com
A Random Number Generator : RNG

:
RNG True RNG
) (

..


)( ) (

. True Random Number

Intel RNG
)
( .

: nCipher, Chrysalis cryptographic


accelerators ) RNG
cryptographic accelerators ( .

Pseudo -Random Number Generator


) ( :


""
"" .

) (

) ( T-RNG .

) (

.


. %100

.

95
PDF created with pdfFactory Pro trial version www.pdffactory.com
PRNG
) Seed
( RNG ) (
PRNG ) .( Seed Seed
RNG PRNG
Seed .

Seed
) ( millisecond
)
( .

" : Seed " PRNG


Seed
Seed
!! Seed ) (
1000 1000 .

PRNG Seed ) 160 (


Seed
.

96
PDF created with pdfFactory Pro trial version www.pdffactory.com
) (entropy PRNG
.

PRNG message digests


blenders
message digests
.

) (
LCG rand , random
random .

Attacks on Encrypted Data




.

Attacks on Keys :
brute-force attack
.

0 ) 100,000,000,000 (
0
0
1 2 100 .100,000,000,000 ...

97
PDF created with pdfFactory Pro trial version www.pdffactory.com


)
( ...

100
50
50 3 3 3

3 50
3 0 100
..

Key Size
bits bit 40
bit 56 ) bit 128 ( . ...

40 0 1
56 0 72 quadrillion
128 0 ..... 128

1997 40 48 280 ..
) 40 3 41 6
( .

1999 56 24 ) Electronic Frontier


Foundation . ( DES


FPI .

128 512
) ) (brute-force attack ( .


PRNG Seed PRNG Seed
Seed )
( Seed
...

98
PDF created with pdfFactory Pro trial version www.pdffactory.com
: Netscapes Seed

SSL
)
ELGAMAL
( SSL
PRNG ) + ( process ID
Seed . PRNG

process ID
brute-force attack 15
) ( 60 .

1995 Goldberg Wagner Seed


40 128 !!

Seed :
. mouse position, memory status, last key pressed, audio volume, and
many others
. Seed

: Breaking the Algorithm

99
PDF created with pdfFactory Pro trial version www.pdffactory.com

)
( .

Symmetric Key Cryptography


:
* Block Cipher
* Stream Cipher

Block Cipher

) ( ) Block(
) (
64 128 ) 16(

:
227 16
) 16(
16 . ) 16 (
16 14
) 224 (.

3 16
Padding
.

100
PDF created with pdfFactory Pro trial version www.pdffactory.com

.

:
) 13 (
" "13 PKC#5

16 )
(.

" " Block Cipher


.

" " wajdy essam 3 )


( . ) 16( ) 16(
) 16(.


" "Wajdy Essam ""Selrurjgqm
" "Wajdy Essam " " Selrurjgqm
" "Wajdy Essam " " Selrurjgqm

" " Selrurjgqm


.

" Mode Of Operation


" Feedback Modes
.

cipher block chaining ) (CBC


XOR .

101
PDF created with pdfFactory Pro trial version www.pdffactory.com
XOR
.


initialization vector . IV

Stream Ciphers


Key Stream
)
( .

102
PDF created with pdfFactory Pro trial version www.pdffactory.com
Block VS Stream


RC4
30 . 400-200
.

.


)(


. .

Block Cipher
.

Digital Encryption Standard


IBM
) Lucifer ( Horst Feistel
NSA . DES

DES Block Cipher 56


64 .

DES
brute-force
56 ) 0 72(
.

1999 24 the
Foundation Electronic Frontier .

Triple DES

Triple DES 3DES DES


) 16(
.

103
PDF created with pdfFactory Pro trial version www.pdffactory.com
56 ) 168(
" 24 72"

A , b , c 0 quadrillion ..72
:
A=1
B = 33,717
C = 1,419,222

b=0 , c=0 a=0 , ..

c=0 a=1, b=0 , ..


) a(
.

104
PDF created with pdfFactory Pro trial version www.pdffactory.com
DES 3 DES
DES
!!

:
DES 3

) ( DES
. RC2, RC5, IDEA, CAST, SAFER, Blowfish
DES . Triple DES
DES

Advanced Encryption Standard

National Institute of Standards and


Technology NIST
AES
15 ) ( .

1999 NIST 5
2000 Rijndael
. AES

: Symmetric-Key Management




. Symmetric-Key Management

"
"

) 56 ( )
( MB
.

Password-Based Encryption

" session
"key )
( .

105
PDF created with pdfFactory Pro trial version www.pdffactory.com
password-based encryption . PBE

session key
key encryption key
. KEK

) KEK (
KEK
)
(

.

Session key
.
KEK password-based
.encryption

: KEK
-1-
-2- ) salt( .
-3- blender
blender .
-4- KEK KEK
KEK .
-5- .

106
PDF created with pdfFactory Pro trial version www.pdffactory.com
:
-1-
-2-
-3-
KEK
KEK
-4- KEK ..
:

Mixing Algorithms and KEK


KEK
Entropy
..

107
PDF created with pdfFactory Pro trial version www.pdffactory.com
The Necessity of Salt

KEK
) KEK dictionary
. ( attack

KEK


) (J ..

KEK

) KEK ( Brute
Force attack .

) ( Brute Force Attack


KEK
.

Brute Force
in parallel
.

108
PDF created with pdfFactory Pro trial version www.pdffactory.com
dictionary Attack
.
Brute Force
.


14G:c*%3 wM*-l6g]_Bnp? d86


10
.

Hardware-Based Key Storage


PBE
Token
. crypto accelerators

Token ) (
USB Token

Token . 1970s era PC :

109
PDF created with pdfFactory Pro trial version www.pdffactory.com
Token
PIN
.

Token

Token
Token .

Crypto Accelerators

crypto accelerators


.

110
PDF created with pdfFactory Pro trial version www.pdffactory.com
RNG
PRNG Seed )
. ( Pseudo

Biometrics

Token crypto accelerators




.

Biometrics

) (
!


DNA )(

111
PDF created with pdfFactory Pro trial version www.pdffactory.com


!


)
( .

The Key Distribution Problem and Public-Key Cryptography

) (
) (PBE
Token
)
(.




)
(
.



Key Distribution Problem
Asymmetric
. key Cryptography


) ( :
-
- Trusted Third PartyTTP

: :


.

112
PDF created with pdfFactory Pro trial version www.pdffactory.com
. )
key logger
( .

) KEK (



.
) (

!


) (
)
( :
n ) 1/2 * (n^2 - n..

10 90/2 = 45 90 = 10- 100 45 20


190 1000
499500 !!

113
PDF created with pdfFactory Pro trial version www.pdffactory.com


) (
"" .


) 128
( )
(
. " " .


) ( .

: TTP
.
.

KEK
KEK .
KEK
.


KEK

.

114
PDF created with pdfFactory Pro trial version www.pdffactory.com



..

Asymmetric
key Cryptography
) ( Public-Key Cryptography
.

Public-Key Cryptography and the Digital Envelope


:

public Key
private Key
) (

..

public Key )
( .
private Key ) (

!!
...



) ( )
( )(

..

115
PDF created with pdfFactory Pro trial version www.pdffactory.com



MB 50
KB 200-20 . . -

)(
. Digital Envelope

Password Based Encryption PBE


Symmetric
PBE
.

Digital Envelope
Symmetric

) ( Symmetric ) (

.


public Key Cryptography
.

History of Public-Key Cryptography


1970 Martin Hellman Whitfield


Diffie Key
Distribution Problem

1976
New Direction in Cryptography
Diffe-Hellman . DH

1977 Ron Rivest MIT Adi Shamir ,


Len Adleman DH
Public key Cryptography ) RSA ( .

116
PDF created with pdfFactory Pro trial version www.pdffactory.com
1985 Neal Koblitz Victor Miller
IBM elliptic
curves public key
Cryptography .

:
RSA
ECDH - Elliptic Curve Diffie-Hellman
Algamal

The Digital Signature and Message


Digests

)
(

)
(
.

117
PDF created with pdfFactory Pro trial version www.pdffactory.com
)

(
) md5 SHA-1( )
.(message digest

..

) ( )
(
..

) (
..

118
PDF created with pdfFactory Pro trial version www.pdffactory.com

.
.

The Laws of Cryptography with java code , by Neal R.Wanger

Introduction to cryptography with Java applets, David Bishop

RSA Securitys Official Guide to Cryptography , Steve Burnett and


Stephen Paine

www.wikipedia.com


2 11 2007
SudanGeek@hotmail.com
WajdyEssam@hotmail.com

119
PDF created with pdfFactory Pro trial version www.pdffactory.com

You might also like