SlideShare a Scribd company logo
1 of 29
Vernam Cipher
Project Preliminaries
CSC112
March 14, 2011
Oskars J. Rieksts
Computer Science Department
Kutztown University
2008 Kutztown University 2
Early/Simple Examples
 Steganography
 Caesar cipher
 Substitution cipher
 Transposition cipher
 Vigenere cipher
 Vernam cipher
2008 Kutztown University 3
Steganography
 Merriam-Webster: The art or practice of concealing a
message, image, or file within another message, image, or
file
 from Greek
» steganos = covered
» grafo = write
 Histiaeus – tyrant of Miletus
 shaved head of most trusted slave
 tattooed a message
 hair grew back covering message
 Advantage – does not draw attention to
 itself
 messenger
 recipient
 Often combined with cryptography
2008 Kutztown University 4
Steganography Example
You may have seen the TV show – In Plain Sight –which is
based entirely on the federal witness protection program.
The show is about people who have testified or will be
testifying soon as witnesses in criminal cases but whose
lives are in danger as a result. For their protection they
are given new identities and are moved to a new
community. Ergo they are all hidden “in plain sight”. And
if you think this would not work, according to the U.S.
Marshalls extant website, no program participant who
follows security guidelines has ever been harmed while
under the active protection of the Marshals Service.
2008 Kutztown University 5
Caesar Cipher
 Example of a shift cipher
 Encryption – forward shift by 3
 Decryption – backward shift by 3
 Shift ciphers
 Private key
 Symmetric key
 Key = shift amount
 Keyspace = 25
 Plain text – IHAVEASECRET
 Cipher text – LKDYHDVHFUHW
2008 Kutztown University 6
Caesar Cipher – Example
L KDYH D GUHDP WKDW RQH GDB WKLV QDWLRQ ZLOO ULVH XS DQG OLYH
RXW WKH WUXH PHDQLQJ RI LWV FUHHG: "ZH KROG WKHVH WUXWKV WR
EH VHOI-HYLGHQW: WKDW DOO PHQ DUH FUHDWHG HTXDO."
L KDYH D GUHDP WKDW RQH GDB RQ WKH UHG KLOOV RI JHRUJLD WKH VRQV
RI IRUPHU VODYHV DQG WKH VRQV RI IRUPHU VODYH RZQHUV ZLOO EH
DEOH WR VLW GRZQ WRJHWKHU DW WKH WDEOH RI EURWKHUKRRG.
L KDYH D GUHDP WKDW RQH GDB HYHQ WKH VWDWH RI PLVVLVVLSSL, D
VWDWH VZHOWHULQJ ZLWK WKH KHDW RI LQMXVWLFH, VZHOWHULQJ
ZLWK WKH KHDW RI RSSUHVVLRQ, ZLOO EH WUDQVIRUPHG LQWR DQ
RDVLV RI IUHHGRP DQG MXVWLFH.
L KDYH D GUHDP WKDW PB IRXU OLWWOH FKLOGUHQ ZLOO RQH GDB OLYH LQ
D QDWLRQ ZKHUH WKHB ZLOO QRW EH MXGJHG EB WKH FRORU RI WKHLU
VNLQ EXW EB WKH FRQWHQW RI WKHLU FKDUDFWHU.
L KDYH D GUHDP WRGDB.
2008 Kutztown University 7
Substitution Cipher
 Randomly generated substitution
 Example
 A  F
 B  K
 C  D
 D  J
 etc.
 Characteristics
 Private & symmetric key
 Monoalphabetic
 Key = alphabet of substitutions
 Keyspace = 26!
2008 Kutztown University 8
Substitution Cipher – Analysis
 Keyspace = 26! =
403291461126605635584000000 = 4.03 x
1026
 But other factors make it insecure
 Letter frequency
N-grams
 Strong elimination coefficient
 With patience, can be decoded by hand
 Plain text – BOOKKEEPINGROCKS
 Cipher text – JXXTTZZDOYBEXATU
2008 Kutztown University 9
Substitution Cipher – Example
HPFAIFJZIFYTPFTUVIJFBTPHWVFTHUVGHXXZHWIEMFVJXHAIUETTPITZ
EIYIFVHVNUCHTWDZIIJGIPUXJTPIWITZETPWTUKIWIXCIAHJIVTTPFT
FXXYIVFZIDZIFTIJIOEFXHPFAIFJZIFYTPFTUVIJFBUVTPIZIJPHXXWUC
NIUZNHFTPIWUVWUCCUZYIZWXFAIWFVJTPIWUVWUCCUZYIZWXFA
IUGVIZWGHXXKIFKXITUWHTJUGVTUNITPIZFTTPITFKXIUCKZUTPIZP
UUJHPFAIFJZIFYTPFTUVIJFBIAIVTPIWTFTIUCYHWWHWWHMMHFWT
FTIWGIXTIZHVNGHTPTPIPIFTUCHVREWTHDIWGIXTIZHVNGHTPTPIPI
FTUCUMMZIWWHUVGHXXKITZFVWCUZYIJHVTUFVUFWHWUCCZIIJU
YFVJREWTHDIHPFAIFJZIFYTPFTYBCUEZXHTTXIDPHXJZIVGHXXUVIJ
FBXHAIHVFVFTHUVGPIZITPIBGHXXVUTKIREJNIJKBTPIDUXUZUCTPI
HZWSHVKETKBTPIDUVTIVTUCTPIHZDPFZFDTIZHPFAIFJZIFYTUJFBH
PFAIFJZIFYTPFTUVIJFBJUGVHVFXFKFYFGHTPHTWAHDHUEWZFDHW
TWGHTPHTWNUAIZVUZPFAHVNPHWXHMWJZHMMHVNGHTPTPIGUZ
JWUCHVTIZMUWHTHUVFVJVEXXHCHDFTHUVUVIJFBZHNPTTPIZIHV
FXFKFYFXHTTXIKXFDSKUBWFVJKXFDSNHZXWGHXXKIFKXITURUH
VPFVJWGHTPXHTTXIGPHTIKUBWFVJGPHTINHZXWFWWHWTIZWFVJ
KZUTPIZWHPFAIFJZIFYTUJFBHPFAIFJZIFYTPFTU
2008 Kutztown University 10
Transposition Cipher
 Generate permutation of n objects
 Transpose letters
 Permutation of 0 through 7
6 – 3 – 7 – 1 – 4 – 8 – 5 – 2
 Yields value transposition
1  6
2  3
3  7
4  1
5  4
6  8
7  5
8  2
2008 Kutztown University 11
Transposition Cipher – Example
 Cipher text
TYTSNHOAGTGERLUSHATEUAGNTIHVLBEAURRYTHHAOH
UUCGLGOATHYTNSUSGHTGREGNHLATUEEATAIHLVBEOT
LUAHHNERDWTAANRODESUHIEVNETAAMINYNFENNOTOR
TSTIHFLAEAHAINSNTDEHBGAEVSYTREHEENFIHMNOIARS
EPWDEEEEAUSRFPEALSYIBMMSAAIYTROINBNSYEOKNME
CCOOLUEDRYADMECRSAOEAECSNEHEWFNTLHONRDISBA
EYFOUOURTSSSPSTEOLFDHIFEELWEOHTIRETDHIWREAEIA
SNVVABKLRIEYMSHNEEEGANIRONPECLHFITNUFAAOIRNG
HCRBKOTAEHEUCKRGNNLSDEIAIMNTAGKSSMICELSOOTO
EFDLNTGHIIENNNIDMNNAAABSOYTETNNDEWOIRYOWWN
HLSLDIEAGYNECSHOCMTNETOSHIMTIIEGNHLTOHFNETRI
NMSCBLUHLOSOWWSYOBSWULLWEATSRTWTOHDOEKLS
NBLDRIARHEITMIGSBIEETRMTNHTGOAIEIAMNDREAGBIA
OSNSFTYLEIOONTNGHTIOAIEDTIRESRWAYVAMDEBTFIAL
EAONNGRENSDTEHIONRCDLWOIANDRSWWUNRTCCHOAL
SHLRWIGDAEIPNAYMNOSOAETHRTEUSTALUGEGNGIALHV
EATRBTTYHAHUCGULHORNRACDLIACRMCMUAOCHORYN
OPCRONYNOO
2008 Kutztown University 12
Vigenere Cipher
 Polyalphabetic substitution
 Use n randomly generated substitutions
 1st letter is encoded by 1st substitution alphabet
 2nd letter is encoded by 2nd substitution alphabet
 . . .
nth letter is encoded by nth substitution alphabet
 n+1st letter is encoded by 1st substitution alphabet
 etc.
2008 Kutztown University 13
Vigenere – Simple Example
 Key = 3752
 Successive letters are shifted by 3, 7, 5, 2
 Plain text – BOOKKEEPINGROCKS
 Cipher text – EVTMNLJRLULTRJPU
 Eliminates double letters
 Scatters N-grams
2008 Kutztown University 14
Vigenere Cipher
 Advantages
 Creates confusion
 Same letter can be encoded n different ways
 Pretty much eliminates n-grams
 Keyspace > 26!
2008 Kutztown University 15
Vigenere Cipher
 le chiffre indéchiffrable
 Named for Blaise de Vigenère
 Invented by Giovan Battista Bellaso
ca. 1550
 Broken by
 Charles Babbage in 1854 (unpublished)
 Major Friedrich Kasiski in 1863
»Prussian infantry office
2008 Kutztown University 16
Vigenere Cipher – Example
T KRCS L GILOX WYHH ZQV KOJ WYPG YDKPCY ZZSZ CLJL IA DEK ZTYV VIE WYL HCXV
TSLQZUU ZI ZAG NUVLR: "HH YVZO WYLGP WIBHSV KV PP VVST-PYZKSYW: KOOE DCS
APQ RYS NUVHHPG VXILO."
Z OOGH R KFPDD AVLW FUS ODP VB EKV YSO KZSZD RW NSZUXPO EKV ZCYV FM TZUDLF
DORCSD DEK HSH JVBD RW MCCPVY GWDML CHQVYG HLCS PP DSSS ER JPH ORNU
HZJVAVPU RA HSH KHPWH FM PCRKOSCKFVR.
T KRCS L GILOX WYHH ZQV KOJ HMLB EKV ZHLWV VT XLJZWDVZWDT, D JAOEH
JDSWWVYWYJ NPHS WYL VPDK VT TQABGELTL, GHHCASCLEN KTWY AVP KVHH ZI
FWDCHJZWZQ, NPZW EV AFLQJMCCPVK WYWF HB ZDJPG ZI WYSPGFT OYG ABGELTL.
W SDML O OUVHA EKRA AJ IFBF WLKAZP FYPZOUVU KTOC VBP GRF ZTYV PB L QRAWZQ
NOSCH KOSJ ZZSZ YRK IS UXUNSO EP AVP FFSCC RW AVPLI ZYTQ SBH MB KOS
NREASYW FM HSHZY QSDIHQEHI.
P VLYV H RCHRT HZGRF.
W SDML O OUVHA EKRA CYH UHM, ORNU WY DCHPLPR, DWEK ZAG GLTPCFV IHQTVKZ,
KTWY PHD JFCSCQFY VLYZUU SLJ SWAV UYWASZUU HLKO HSH NVFOV FM
WYWVYDZVZAWZQ RUR YXCSWQLTHHTRE; VBP GRF FTJYA HSHIL WY DCHPLPR,
SWEWCL PWDTR PZBJ HBO ECHQV JZYZD ZZSZ MH RIZP WF QCTQ YHBOV NPHS
OZAHWH NOWEH SVMD DEK KSLKL UTUCZ OD VZZHPUJ HBO EIVHSHIZ.
W SDML O OUVHA ERUHM.
T KRCS L GILOX WYHH ZQV KOJ HMLFJ YRSZPB JOOWO SL SIDCASO, HMLFJ KZSZ LQU
TCFQKHWY VYHZW EV TOOH
2008 Kutztown University 17
Vigenere Cipher – Example Analysis
TKRCSLGILOXWYHHZQVKOJWYPGYDKPCYZZSZCLJLIADEKZTYVVI
EWYLHCXVTSLQZUUZIZAGNUVLRHHYVZOWYLGPWIBHSVKVPPVVST
PYZKSYWKOOEDCSAPQRYSNUVHHPGVXILOZOOGHRKFPDDAVLWFUS
ODPVBEKVYSOKZSZDRWNSZUXPOEKVZCYVFMTZUDLFDORCSDDEKH
SHJVBDRWMCCPVYGWDMLCHQVYGHLCSPPDSSSERJPHORNUHZJVAV
PURAHSHKHPWHFMPCRKOSCKFVRTKRCSLGILOXWYHHZQVKOJHMLB
EKVZHLWVVTXLJZWDVZWDTDJAOEHJDSWWVYWYJNPHSWYLVPDKVT
TQABGELTLGHHCASCLENKTWYAVPKVHHZIFWDCHJZWZQNPZWEVAF
LQJMCCPVKWYWFHBZDJPGZIWYSPGFTOYGABGELTLWSDMLOOUVHA
EKRAAJIFBFWLKAZPFYPZOUVUKTOCVBPGRFZTYVPBLQRAWZQNOS
CHKOSJZZSZYRKISUXUNSOEPAVPFFSCCRWAVPLIZYTQSBHMBKOS
NREASYWFMHSHZYQSDIHQEHIPVLYVHRCHRTHZGRFWSDMLOOUVHA
EKRACYHUHMORNUWYDCHPLPRDWEKZAGGLTPCFVIHQTVKZKTWYPH
DJFCSCQFYVLYZUUSLJSWAVUYWASZUUHLKOHSHNVFOVFMWYWVYD
ZVZAWZQRURYXCSWQLTHHTREVBPGRFFTJYAHSHILWYDCHPLPRSW
EWCLPWDTRPZBJHBOECHQVJZYZDZZSZMHRIZPWFQCTQYHBOVNPH
SOZAHWHNOWEHSVMDDEKKSLKLUTUCZODVZZHPUJHBOEIVHSHIZW
SDMLOOUVHAERUHMTKRCSLGILOXWYHHZQVKOJHMLFJYRSZPBJOO
WOSLSIDCASOHMLFJKZSZLQUTCFQKHWYVYHZWEVTOOHCVKEKVYC
FJYWZLFVZKTOCISXDULDWDZUOYGKOSNUFVYPGGSONHJDWWOSLA
LGVZHCDZNVEDEKHSHXSCCBFMHSHCVFOVYHZWEVYSGHRSSODEKO
2008 Kutztown University 18
Vigenere Cipher – Example Analysis
TKRCSLGILO
XWYHHZQVKO
JWYPGYDKPC
YZZSZCLJLI
ADEKZTYVVI
EWYLHCXVTS
LQZUUZIZAG
NUVLRHHYVZ
OWYLGPWIBH
SVKVPPVVST
PYZKSYWKOO
EDCSAPQRYS
NUVHHPGVXI
LOZOOGHRKF
PDDAVLWFUS
ODPVBEKVYS
OKZSZDRWNS
ZUXPOEKVZC
YVFMTZUDLF
DORCSDDEKH
SHJVBDRWMC
CPVYGWDMLC
HQVYGHLCSP
PDSSSERJPH
ORNUHZJVAV
PURAHSHKHP
WHFMPCRKOS
CKFVRTKRCS
LGILOXWYHH
ZQVKOJHMLB
EKVZHLWVVT
XLJZWDVZWD
TDJAOEHJDS
WWVYWYJNPH
SWYLVPDKVT
TQABGELTLG
2008 Kutztown University 19
Vigenere Cipher – Example Analysis
HHCASCLENK
TWYAVPKVHH
ZIFWDCHJZW
ZQNPZWEVAF
LQJMCCPVKW
YWFHBZDJPG
ZIWYSPGFTO
YGABGELTLW
SDMLOOUVHA
EKRAAJIFBF
WLKAZPFYPZ
OUVUKTOCVB
PGRFZTYVPB
LQRAWZQNOS
CHKOSJZZSZ
YRKISUXUNS
OEPAVPFFSC
CRWAVPLIZY
TQSBHMBKOS
NREASYWFMH
SHZYQSDIHQ
EHIPVLYVHR
CHRTHZGRFW
SDMLOOUVHA
2008 Kutztown University 20
Deciphering Vigenere
 Determine the number of alphabets
 Compute distances between matching sequences
 Compute GCD of distances
 Treat cipher text as n separate texts
 For each separate text & each of 25 possible shifts
 Compute Index of Coincidence
 based on frequencies found in cipher text
 using table of frequencies of letters in English
 Index of Coincidence formula
 fee = S {relFreqTab(k, ciphLet) *
charFreq(ciphLet)}
2008 Kutztown University 21
Frequency Table – English
A 0.08; B 0.015; C 0.03; D 0.04; E 0.13;
F 0.02; G 0.015; H 0.06; I 0.065; J 0.005
K 0.005; L 0.035; M 0.03; N 0.07; O 0.08
P 0.02; Q 0.002; R 0.065; S 0.06; T 0.09
U 0.03; V 0.01; W 0.015; X 0.005; Y 0.02
Z 0.002
2008 Kutztown University 22
Vigenere – Final Step
 Produce possible plain texts
 using combination of
 highest ranking fee table values
 Choose best plain text
 This step can be automated
 Rate each possible plain text
 using n-gram information
 or list of 5 letter words in English
2008 Kutztown University 23
Vernam Cipher
 Gilbert Sandford Vernam – inventor
 Also known as one-time pad
 Invented ca. 1919
 Proven unbreakable by Claude Shannon
 Communication Theory of Secrecy Systems
 1949
 Unbreakable if and only if
 Key is same length as plain text
 Key is never re-used
2008 Kutztown University 24
Vernam Cipher
 Basic operation – bitwise XOR
 XOR table
 0 xor 0 = 0
 0 xor 1 = 1
 1 xor 0 = 1
 1 xor 1 = 0
 Plain text is represented as bit stream
 Key is random bit stream of same length
 Cipher text is produced via bitwise XOR of
plain bit stream and key bit stream.
2008 Kutztown University 25
Vernam Cipher – Example
 Plain text :: Grade = A – Great!
 Plain text in ASCII
 71 114 97 100 101 32 61 32 65 32 45 32
71 114 101 97 116 33
 Plain text as bit stream
01000111 01110010 01100001 01100100
01100101 00100000 00111101 00100000
01000110 00100000 10010110 00100000
01010011 01101111 01110010 01110010
01111001 00100001
2008 Kutztown University 26
Vernam Cipher – Example
 Key as bit stream
11000001 01110000 11011110 10111001 01100001
10001000 01101100 11111010 00110011
01001110 01111001 00011110 00001000 10010001
10100100 01000000 10000000 01000010
 Cipher text as bit stream
10000110 00000010 10111111 11011101 00000100
10101000 01010001 11011010 01110010
01101110 01010100 00111110 01001111 11100011
11000001 00100001 11110100 01100011
2008 Kutztown University 27
Vernam Cipher – Why Unbreakable
 Try attack by exhaustive search
 Among possible keys
11000001 01110000 11011110 10111001
01100001 10001000 01101100 11111010
00110100 01001110 01111001 00011110
00011100 10001100 10110011 01010011
10001101 01000010
 Produces this recovered plain text:
 Grade = F – Sorry!
2008 Kutztown University 28
Vernam Cipher – Why Unbreakable
 Exhaustive search will produce every
possible combination of 18 characters.
 And there is no way to distinguish between
them
 Among the possible recovered texts:
 Tickle me Elmo now
 Jabberwocky Rocks!
 Attack tomorrow am
 Attack tomorrow pm
 Grade = C++ & Java
2008 Kutztown University 29
Vernam Cipher – Why Look
Elsewhere?
 Key distribution problem
 Every sender/recipient must have same pad
 N sender recipient pairs require O(N2) pads
 Pad distribution is security risk
 Key coordination problem
 Sheets on pad must match exactly
 Messages must arrive in order sent
 Key generation problem
 High quality random numbers hard to generate
 Bottom line – has some limited use

More Related Content

Similar to 009576860.pdf

Dukane 8928, 8929,8930 user manual
Dukane 8928, 8929,8930 user manualDukane 8928, 8929,8930 user manual
Dukane 8928, 8929,8930 user manualSchoolVision Inc.
 
modern mythology.
modern mythology.modern mythology.
modern mythology.Andy Link
 
Quality of supply and market regulation: survey within Europe
Quality of supply and market regulation: survey within EuropeQuality of supply and market regulation: survey within Europe
Quality of supply and market regulation: survey within EuropeLeonardo ENERGY
 
Jdsst 2 3 sdm proof
Jdsst 2 3 sdm proofJdsst 2 3 sdm proof
Jdsst 2 3 sdm proofrrosyi
 
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue209 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2Akhil Bharat Mahasabha
 
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue209 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2Akhil Bharat Mahasabha
 
Food waste quiz slideshow notes
Food waste quiz slideshow notesFood waste quiz slideshow notes
Food waste quiz slideshow noteslynettejohnson
 
19 25 sept 2016 mail
19  25 sept 2016 mail19  25 sept 2016 mail
19 25 sept 2016 mailsnehalcnp
 
Info Industr Conc Generali Plc
Info Industr Conc Generali PlcInfo Industr Conc Generali Plc
Info Industr Conc Generali PlcBombers Falcoman
 
31 oct 6 november 2016 m
31 oct 6 november 2016 m31 oct 6 november 2016 m
31 oct 6 november 2016 msnehalcnp
 
User guide for dukane 9000 series projectors
User guide for dukane 9000 series projectorsUser guide for dukane 9000 series projectors
User guide for dukane 9000 series projectorsDukaneAVMarketing
 
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...kylemrotek
 
Reiki como es y como funciona
Reiki como es y como funcionaReiki como es y como funciona
Reiki como es y como funcionabetovhen sanz
 
Dukane imagepro 9005 9007 usermanual
Dukane imagepro 9005 9007 usermanualDukane imagepro 9005 9007 usermanual
Dukane imagepro 9005 9007 usermanualSchoolVision Inc.
 
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpi
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpiNewark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpi
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpiElizabeth Reynoso
 
Sql server firewall settings
Sql server firewall settingsSql server firewall settings
Sql server firewall settingsgabo2525
 

Similar to 009576860.pdf (20)

UCCI BNL (September - November 2019)
UCCI BNL (September - November 2019)UCCI BNL (September - November 2019)
UCCI BNL (September - November 2019)
 
Dukane 8928, 8929,8930 user manual
Dukane 8928, 8929,8930 user manualDukane 8928, 8929,8930 user manual
Dukane 8928, 8929,8930 user manual
 
Nlg book review
Nlg book reviewNlg book review
Nlg book review
 
modern mythology.
modern mythology.modern mythology.
modern mythology.
 
Quality of supply and market regulation: survey within Europe
Quality of supply and market regulation: survey within EuropeQuality of supply and market regulation: survey within Europe
Quality of supply and market regulation: survey within Europe
 
Jdsst 2 3 sdm proof
Jdsst 2 3 sdm proofJdsst 2 3 sdm proof
Jdsst 2 3 sdm proof
 
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue209 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
 
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue209 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
09 april-2014 to-15-april-2014-hindu_sabhavarta_year38_issue2
 
Food waste quiz slideshow notes
Food waste quiz slideshow notesFood waste quiz slideshow notes
Food waste quiz slideshow notes
 
19 25 sept 2016 mail
19  25 sept 2016 mail19  25 sept 2016 mail
19 25 sept 2016 mail
 
Info Industr Conc Generali Plc
Info Industr Conc Generali PlcInfo Industr Conc Generali Plc
Info Industr Conc Generali Plc
 
31 oct 6 november 2016 m
31 oct 6 november 2016 m31 oct 6 november 2016 m
31 oct 6 november 2016 m
 
User guide for dukane 9000 series projectors
User guide for dukane 9000 series projectorsUser guide for dukane 9000 series projectors
User guide for dukane 9000 series projectors
 
9007 wu l-usermanual
9007 wu l-usermanual9007 wu l-usermanual
9007 wu l-usermanual
 
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...
An Actuarial Approach to Valuing Mortgage Backed Securities EAAC 2009 Kyle Mr...
 
Reiki como es y como funciona
Reiki como es y como funcionaReiki como es y como funciona
Reiki como es y como funciona
 
Dukane imagepro 9005 9007 usermanual
Dukane imagepro 9005 9007 usermanualDukane imagepro 9005 9007 usermanual
Dukane imagepro 9005 9007 usermanual
 
Feb 17 nai
Feb 17 naiFeb 17 nai
Feb 17 nai
 
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpi
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpiNewark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpi
Newark Sustainability Action Plan_2013 01 02 FOR WEB 100 dpi
 
Sql server firewall settings
Sql server firewall settingsSql server firewall settings
Sql server firewall settings
 

More from KalsoomTahir2

More from KalsoomTahir2 (20)

005813616.pdf
005813616.pdf005813616.pdf
005813616.pdf
 
005813185.pdf
005813185.pdf005813185.pdf
005813185.pdf
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
6. McCall's Model.pptx
6. McCall's Model.pptx6. McCall's Model.pptx
6. McCall's Model.pptx
 
ch02-Database System Concepts and Architecture.ppt
ch02-Database System Concepts and Architecture.pptch02-Database System Concepts and Architecture.ppt
ch02-Database System Concepts and Architecture.ppt
 
9223301.ppt
9223301.ppt9223301.ppt
9223301.ppt
 
11885558.ppt
11885558.ppt11885558.ppt
11885558.ppt
 
Indexing.ppt
Indexing.pptIndexing.ppt
Indexing.ppt
 
chap05-info366.ppt
chap05-info366.pptchap05-info366.ppt
chap05-info366.ppt
 
1650607.ppt
1650607.ppt1650607.ppt
1650607.ppt
 
005281271.pdf
005281271.pdf005281271.pdf
005281271.pdf
 
soa_and_jra.ppt
soa_and_jra.pptsoa_and_jra.ppt
soa_and_jra.ppt
 
ERP_Up_Down.ppt
ERP_Up_Down.pptERP_Up_Down.ppt
ERP_Up_Down.ppt
 
Topic1CourseIntroduction.ppt
Topic1CourseIntroduction.pptTopic1CourseIntroduction.ppt
Topic1CourseIntroduction.ppt
 
Lecture 19 - Dynamic Web - JAVA - Part 1.ppt
Lecture 19 - Dynamic Web - JAVA - Part 1.pptLecture 19 - Dynamic Web - JAVA - Part 1.ppt
Lecture 19 - Dynamic Web - JAVA - Part 1.ppt
 
CommercialSystemsBahman.ppt
CommercialSystemsBahman.pptCommercialSystemsBahman.ppt
CommercialSystemsBahman.ppt
 
EJBDetailsFeb25.ppt
EJBDetailsFeb25.pptEJBDetailsFeb25.ppt
EJBDetailsFeb25.ppt
 
jan28EAI.ppt
jan28EAI.pptjan28EAI.ppt
jan28EAI.ppt
 
005428052.pdf
005428052.pdf005428052.pdf
005428052.pdf
 
jini-1.ppt
jini-1.pptjini-1.ppt
jini-1.ppt
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

009576860.pdf

  • 1. Vernam Cipher Project Preliminaries CSC112 March 14, 2011 Oskars J. Rieksts Computer Science Department Kutztown University
  • 2. 2008 Kutztown University 2 Early/Simple Examples  Steganography  Caesar cipher  Substitution cipher  Transposition cipher  Vigenere cipher  Vernam cipher
  • 3. 2008 Kutztown University 3 Steganography  Merriam-Webster: The art or practice of concealing a message, image, or file within another message, image, or file  from Greek » steganos = covered » grafo = write  Histiaeus – tyrant of Miletus  shaved head of most trusted slave  tattooed a message  hair grew back covering message  Advantage – does not draw attention to  itself  messenger  recipient  Often combined with cryptography
  • 4. 2008 Kutztown University 4 Steganography Example You may have seen the TV show – In Plain Sight –which is based entirely on the federal witness protection program. The show is about people who have testified or will be testifying soon as witnesses in criminal cases but whose lives are in danger as a result. For their protection they are given new identities and are moved to a new community. Ergo they are all hidden “in plain sight”. And if you think this would not work, according to the U.S. Marshalls extant website, no program participant who follows security guidelines has ever been harmed while under the active protection of the Marshals Service.
  • 5. 2008 Kutztown University 5 Caesar Cipher  Example of a shift cipher  Encryption – forward shift by 3  Decryption – backward shift by 3  Shift ciphers  Private key  Symmetric key  Key = shift amount  Keyspace = 25  Plain text – IHAVEASECRET  Cipher text – LKDYHDVHFUHW
  • 6. 2008 Kutztown University 6 Caesar Cipher – Example L KDYH D GUHDP WKDW RQH GDB WKLV QDWLRQ ZLOO ULVH XS DQG OLYH RXW WKH WUXH PHDQLQJ RI LWV FUHHG: "ZH KROG WKHVH WUXWKV WR EH VHOI-HYLGHQW: WKDW DOO PHQ DUH FUHDWHG HTXDO." L KDYH D GUHDP WKDW RQH GDB RQ WKH UHG KLOOV RI JHRUJLD WKH VRQV RI IRUPHU VODYHV DQG WKH VRQV RI IRUPHU VODYH RZQHUV ZLOO EH DEOH WR VLW GRZQ WRJHWKHU DW WKH WDEOH RI EURWKHUKRRG. L KDYH D GUHDP WKDW RQH GDB HYHQ WKH VWDWH RI PLVVLVVLSSL, D VWDWH VZHOWHULQJ ZLWK WKH KHDW RI LQMXVWLFH, VZHOWHULQJ ZLWK WKH KHDW RI RSSUHVVLRQ, ZLOO EH WUDQVIRUPHG LQWR DQ RDVLV RI IUHHGRP DQG MXVWLFH. L KDYH D GUHDP WKDW PB IRXU OLWWOH FKLOGUHQ ZLOO RQH GDB OLYH LQ D QDWLRQ ZKHUH WKHB ZLOO QRW EH MXGJHG EB WKH FRORU RI WKHLU VNLQ EXW EB WKH FRQWHQW RI WKHLU FKDUDFWHU. L KDYH D GUHDP WRGDB.
  • 7. 2008 Kutztown University 7 Substitution Cipher  Randomly generated substitution  Example  A  F  B  K  C  D  D  J  etc.  Characteristics  Private & symmetric key  Monoalphabetic  Key = alphabet of substitutions  Keyspace = 26!
  • 8. 2008 Kutztown University 8 Substitution Cipher – Analysis  Keyspace = 26! = 403291461126605635584000000 = 4.03 x 1026  But other factors make it insecure  Letter frequency N-grams  Strong elimination coefficient  With patience, can be decoded by hand  Plain text – BOOKKEEPINGROCKS  Cipher text – JXXTTZZDOYBEXATU
  • 9. 2008 Kutztown University 9 Substitution Cipher – Example HPFAIFJZIFYTPFTUVIJFBTPHWVFTHUVGHXXZHWIEMFVJXHAIUETTPITZ EIYIFVHVNUCHTWDZIIJGIPUXJTPIWITZETPWTUKIWIXCIAHJIVTTPFT FXXYIVFZIDZIFTIJIOEFXHPFAIFJZIFYTPFTUVIJFBUVTPIZIJPHXXWUC NIUZNHFTPIWUVWUCCUZYIZWXFAIWFVJTPIWUVWUCCUZYIZWXFA IUGVIZWGHXXKIFKXITUWHTJUGVTUNITPIZFTTPITFKXIUCKZUTPIZP UUJHPFAIFJZIFYTPFTUVIJFBIAIVTPIWTFTIUCYHWWHWWHMMHFWT FTIWGIXTIZHVNGHTPTPIPIFTUCHVREWTHDIWGIXTIZHVNGHTPTPIPI FTUCUMMZIWWHUVGHXXKITZFVWCUZYIJHVTUFVUFWHWUCCZIIJU YFVJREWTHDIHPFAIFJZIFYTPFTYBCUEZXHTTXIDPHXJZIVGHXXUVIJ FBXHAIHVFVFTHUVGPIZITPIBGHXXVUTKIREJNIJKBTPIDUXUZUCTPI HZWSHVKETKBTPIDUVTIVTUCTPIHZDPFZFDTIZHPFAIFJZIFYTUJFBH PFAIFJZIFYTPFTUVIJFBJUGVHVFXFKFYFGHTPHTWAHDHUEWZFDHW TWGHTPHTWNUAIZVUZPFAHVNPHWXHMWJZHMMHVNGHTPTPIGUZ JWUCHVTIZMUWHTHUVFVJVEXXHCHDFTHUVUVIJFBZHNPTTPIZIHV FXFKFYFXHTTXIKXFDSKUBWFVJKXFDSNHZXWGHXXKIFKXITURUH VPFVJWGHTPXHTTXIGPHTIKUBWFVJGPHTINHZXWFWWHWTIZWFVJ KZUTPIZWHPFAIFJZIFYTUJFBHPFAIFJZIFYTPFTU
  • 10. 2008 Kutztown University 10 Transposition Cipher  Generate permutation of n objects  Transpose letters  Permutation of 0 through 7 6 – 3 – 7 – 1 – 4 – 8 – 5 – 2  Yields value transposition 1  6 2  3 3  7 4  1 5  4 6  8 7  5 8  2
  • 11. 2008 Kutztown University 11 Transposition Cipher – Example  Cipher text TYTSNHOAGTGERLUSHATEUAGNTIHVLBEAURRYTHHAOH UUCGLGOATHYTNSUSGHTGREGNHLATUEEATAIHLVBEOT LUAHHNERDWTAANRODESUHIEVNETAAMINYNFENNOTOR TSTIHFLAEAHAINSNTDEHBGAEVSYTREHEENFIHMNOIARS EPWDEEEEAUSRFPEALSYIBMMSAAIYTROINBNSYEOKNME CCOOLUEDRYADMECRSAOEAECSNEHEWFNTLHONRDISBA EYFOUOURTSSSPSTEOLFDHIFEELWEOHTIRETDHIWREAEIA SNVVABKLRIEYMSHNEEEGANIRONPECLHFITNUFAAOIRNG HCRBKOTAEHEUCKRGNNLSDEIAIMNTAGKSSMICELSOOTO EFDLNTGHIIENNNIDMNNAAABSOYTETNNDEWOIRYOWWN HLSLDIEAGYNECSHOCMTNETOSHIMTIIEGNHLTOHFNETRI NMSCBLUHLOSOWWSYOBSWULLWEATSRTWTOHDOEKLS NBLDRIARHEITMIGSBIEETRMTNHTGOAIEIAMNDREAGBIA OSNSFTYLEIOONTNGHTIOAIEDTIRESRWAYVAMDEBTFIAL EAONNGRENSDTEHIONRCDLWOIANDRSWWUNRTCCHOAL SHLRWIGDAEIPNAYMNOSOAETHRTEUSTALUGEGNGIALHV EATRBTTYHAHUCGULHORNRACDLIACRMCMUAOCHORYN OPCRONYNOO
  • 12. 2008 Kutztown University 12 Vigenere Cipher  Polyalphabetic substitution  Use n randomly generated substitutions  1st letter is encoded by 1st substitution alphabet  2nd letter is encoded by 2nd substitution alphabet  . . . nth letter is encoded by nth substitution alphabet  n+1st letter is encoded by 1st substitution alphabet  etc.
  • 13. 2008 Kutztown University 13 Vigenere – Simple Example  Key = 3752  Successive letters are shifted by 3, 7, 5, 2  Plain text – BOOKKEEPINGROCKS  Cipher text – EVTMNLJRLULTRJPU  Eliminates double letters  Scatters N-grams
  • 14. 2008 Kutztown University 14 Vigenere Cipher  Advantages  Creates confusion  Same letter can be encoded n different ways  Pretty much eliminates n-grams  Keyspace > 26!
  • 15. 2008 Kutztown University 15 Vigenere Cipher  le chiffre indéchiffrable  Named for Blaise de Vigenère  Invented by Giovan Battista Bellaso ca. 1550  Broken by  Charles Babbage in 1854 (unpublished)  Major Friedrich Kasiski in 1863 »Prussian infantry office
  • 16. 2008 Kutztown University 16 Vigenere Cipher – Example T KRCS L GILOX WYHH ZQV KOJ WYPG YDKPCY ZZSZ CLJL IA DEK ZTYV VIE WYL HCXV TSLQZUU ZI ZAG NUVLR: "HH YVZO WYLGP WIBHSV KV PP VVST-PYZKSYW: KOOE DCS APQ RYS NUVHHPG VXILO." Z OOGH R KFPDD AVLW FUS ODP VB EKV YSO KZSZD RW NSZUXPO EKV ZCYV FM TZUDLF DORCSD DEK HSH JVBD RW MCCPVY GWDML CHQVYG HLCS PP DSSS ER JPH ORNU HZJVAVPU RA HSH KHPWH FM PCRKOSCKFVR. T KRCS L GILOX WYHH ZQV KOJ HMLB EKV ZHLWV VT XLJZWDVZWDT, D JAOEH JDSWWVYWYJ NPHS WYL VPDK VT TQABGELTL, GHHCASCLEN KTWY AVP KVHH ZI FWDCHJZWZQ, NPZW EV AFLQJMCCPVK WYWF HB ZDJPG ZI WYSPGFT OYG ABGELTL. W SDML O OUVHA EKRA AJ IFBF WLKAZP FYPZOUVU KTOC VBP GRF ZTYV PB L QRAWZQ NOSCH KOSJ ZZSZ YRK IS UXUNSO EP AVP FFSCC RW AVPLI ZYTQ SBH MB KOS NREASYW FM HSHZY QSDIHQEHI. P VLYV H RCHRT HZGRF. W SDML O OUVHA EKRA CYH UHM, ORNU WY DCHPLPR, DWEK ZAG GLTPCFV IHQTVKZ, KTWY PHD JFCSCQFY VLYZUU SLJ SWAV UYWASZUU HLKO HSH NVFOV FM WYWVYDZVZAWZQ RUR YXCSWQLTHHTRE; VBP GRF FTJYA HSHIL WY DCHPLPR, SWEWCL PWDTR PZBJ HBO ECHQV JZYZD ZZSZ MH RIZP WF QCTQ YHBOV NPHS OZAHWH NOWEH SVMD DEK KSLKL UTUCZ OD VZZHPUJ HBO EIVHSHIZ. W SDML O OUVHA ERUHM. T KRCS L GILOX WYHH ZQV KOJ HMLFJ YRSZPB JOOWO SL SIDCASO, HMLFJ KZSZ LQU TCFQKHWY VYHZW EV TOOH
  • 17. 2008 Kutztown University 17 Vigenere Cipher – Example Analysis TKRCSLGILOXWYHHZQVKOJWYPGYDKPCYZZSZCLJLIADEKZTYVVI EWYLHCXVTSLQZUUZIZAGNUVLRHHYVZOWYLGPWIBHSVKVPPVVST PYZKSYWKOOEDCSAPQRYSNUVHHPGVXILOZOOGHRKFPDDAVLWFUS ODPVBEKVYSOKZSZDRWNSZUXPOEKVZCYVFMTZUDLFDORCSDDEKH SHJVBDRWMCCPVYGWDMLCHQVYGHLCSPPDSSSERJPHORNUHZJVAV PURAHSHKHPWHFMPCRKOSCKFVRTKRCSLGILOXWYHHZQVKOJHMLB EKVZHLWVVTXLJZWDVZWDTDJAOEHJDSWWVYWYJNPHSWYLVPDKVT TQABGELTLGHHCASCLENKTWYAVPKVHHZIFWDCHJZWZQNPZWEVAF LQJMCCPVKWYWFHBZDJPGZIWYSPGFTOYGABGELTLWSDMLOOUVHA EKRAAJIFBFWLKAZPFYPZOUVUKTOCVBPGRFZTYVPBLQRAWZQNOS CHKOSJZZSZYRKISUXUNSOEPAVPFFSCCRWAVPLIZYTQSBHMBKOS NREASYWFMHSHZYQSDIHQEHIPVLYVHRCHRTHZGRFWSDMLOOUVHA EKRACYHUHMORNUWYDCHPLPRDWEKZAGGLTPCFVIHQTVKZKTWYPH DJFCSCQFYVLYZUUSLJSWAVUYWASZUUHLKOHSHNVFOVFMWYWVYD ZVZAWZQRURYXCSWQLTHHTREVBPGRFFTJYAHSHILWYDCHPLPRSW EWCLPWDTRPZBJHBOECHQVJZYZDZZSZMHRIZPWFQCTQYHBOVNPH SOZAHWHNOWEHSVMDDEKKSLKLUTUCZODVZZHPUJHBOEIVHSHIZW SDMLOOUVHAERUHMTKRCSLGILOXWYHHZQVKOJHMLFJYRSZPBJOO WOSLSIDCASOHMLFJKZSZLQUTCFQKHWYVYHZWEVTOOHCVKEKVYC FJYWZLFVZKTOCISXDULDWDZUOYGKOSNUFVYPGGSONHJDWWOSLA LGVZHCDZNVEDEKHSHXSCCBFMHSHCVFOVYHZWEVYSGHRSSODEKO
  • 18. 2008 Kutztown University 18 Vigenere Cipher – Example Analysis TKRCSLGILO XWYHHZQVKO JWYPGYDKPC YZZSZCLJLI ADEKZTYVVI EWYLHCXVTS LQZUUZIZAG NUVLRHHYVZ OWYLGPWIBH SVKVPPVVST PYZKSYWKOO EDCSAPQRYS NUVHHPGVXI LOZOOGHRKF PDDAVLWFUS ODPVBEKVYS OKZSZDRWNS ZUXPOEKVZC YVFMTZUDLF DORCSDDEKH SHJVBDRWMC CPVYGWDMLC HQVYGHLCSP PDSSSERJPH ORNUHZJVAV PURAHSHKHP WHFMPCRKOS CKFVRTKRCS LGILOXWYHH ZQVKOJHMLB EKVZHLWVVT XLJZWDVZWD TDJAOEHJDS WWVYWYJNPH SWYLVPDKVT TQABGELTLG
  • 19. 2008 Kutztown University 19 Vigenere Cipher – Example Analysis HHCASCLENK TWYAVPKVHH ZIFWDCHJZW ZQNPZWEVAF LQJMCCPVKW YWFHBZDJPG ZIWYSPGFTO YGABGELTLW SDMLOOUVHA EKRAAJIFBF WLKAZPFYPZ OUVUKTOCVB PGRFZTYVPB LQRAWZQNOS CHKOSJZZSZ YRKISUXUNS OEPAVPFFSC CRWAVPLIZY TQSBHMBKOS NREASYWFMH SHZYQSDIHQ EHIPVLYVHR CHRTHZGRFW SDMLOOUVHA
  • 20. 2008 Kutztown University 20 Deciphering Vigenere  Determine the number of alphabets  Compute distances between matching sequences  Compute GCD of distances  Treat cipher text as n separate texts  For each separate text & each of 25 possible shifts  Compute Index of Coincidence  based on frequencies found in cipher text  using table of frequencies of letters in English  Index of Coincidence formula  fee = S {relFreqTab(k, ciphLet) * charFreq(ciphLet)}
  • 21. 2008 Kutztown University 21 Frequency Table – English A 0.08; B 0.015; C 0.03; D 0.04; E 0.13; F 0.02; G 0.015; H 0.06; I 0.065; J 0.005 K 0.005; L 0.035; M 0.03; N 0.07; O 0.08 P 0.02; Q 0.002; R 0.065; S 0.06; T 0.09 U 0.03; V 0.01; W 0.015; X 0.005; Y 0.02 Z 0.002
  • 22. 2008 Kutztown University 22 Vigenere – Final Step  Produce possible plain texts  using combination of  highest ranking fee table values  Choose best plain text  This step can be automated  Rate each possible plain text  using n-gram information  or list of 5 letter words in English
  • 23. 2008 Kutztown University 23 Vernam Cipher  Gilbert Sandford Vernam – inventor  Also known as one-time pad  Invented ca. 1919  Proven unbreakable by Claude Shannon  Communication Theory of Secrecy Systems  1949  Unbreakable if and only if  Key is same length as plain text  Key is never re-used
  • 24. 2008 Kutztown University 24 Vernam Cipher  Basic operation – bitwise XOR  XOR table  0 xor 0 = 0  0 xor 1 = 1  1 xor 0 = 1  1 xor 1 = 0  Plain text is represented as bit stream  Key is random bit stream of same length  Cipher text is produced via bitwise XOR of plain bit stream and key bit stream.
  • 25. 2008 Kutztown University 25 Vernam Cipher – Example  Plain text :: Grade = A – Great!  Plain text in ASCII  71 114 97 100 101 32 61 32 65 32 45 32 71 114 101 97 116 33  Plain text as bit stream 01000111 01110010 01100001 01100100 01100101 00100000 00111101 00100000 01000110 00100000 10010110 00100000 01010011 01101111 01110010 01110010 01111001 00100001
  • 26. 2008 Kutztown University 26 Vernam Cipher – Example  Key as bit stream 11000001 01110000 11011110 10111001 01100001 10001000 01101100 11111010 00110011 01001110 01111001 00011110 00001000 10010001 10100100 01000000 10000000 01000010  Cipher text as bit stream 10000110 00000010 10111111 11011101 00000100 10101000 01010001 11011010 01110010 01101110 01010100 00111110 01001111 11100011 11000001 00100001 11110100 01100011
  • 27. 2008 Kutztown University 27 Vernam Cipher – Why Unbreakable  Try attack by exhaustive search  Among possible keys 11000001 01110000 11011110 10111001 01100001 10001000 01101100 11111010 00110100 01001110 01111001 00011110 00011100 10001100 10110011 01010011 10001101 01000010  Produces this recovered plain text:  Grade = F – Sorry!
  • 28. 2008 Kutztown University 28 Vernam Cipher – Why Unbreakable  Exhaustive search will produce every possible combination of 18 characters.  And there is no way to distinguish between them  Among the possible recovered texts:  Tickle me Elmo now  Jabberwocky Rocks!  Attack tomorrow am  Attack tomorrow pm  Grade = C++ & Java
  • 29. 2008 Kutztown University 29 Vernam Cipher – Why Look Elsewhere?  Key distribution problem  Every sender/recipient must have same pad  N sender recipient pairs require O(N2) pads  Pad distribution is security risk  Key coordination problem  Sheets on pad must match exactly  Messages must arrive in order sent  Key generation problem  High quality random numbers hard to generate  Bottom line – has some limited use