Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course ---...
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Cryptography
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Code it, please.
Are you programmer?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Find a mathematical model, please.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails
Ciphe...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Transposition Substitution
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Data’
Information Security ------------- Fall 2013
Van Hoang Nguyen
What is your choice?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
CipherText only Attack
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by http://www.dailymail.co.uk/news/article-2316536/4...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
E (Encryption): K*P C
D (Decryption): K*C P
P, K
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
= = A*
is a set of all permutations
E (Encryption): E(k, m) ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
= A* and = B*
= { k | k is a bijection from A to B}
E (Encry...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu 'Abd al-Rahman al-Khalil ibn
Ahmad ibn 'Amr ibn Tammam a...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu Yusuf Ya'qub ibn Is-haq ibn as-
Sabbah ibn 'omran ibn Is...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
E T A O I N S R H...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
a b c d e f g h i j k l m n o p q r s t u
09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08
12 81 41 03 16 31...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFYHFWE
N...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNTTMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFTHFWE
N...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
THEEITBSFSIHFAESTXHFREHHEEPGD
OTBQFSIPSEEGDPSEEBHFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
SITTHEEDOWNANDHAVENOSHAMECH
EEKBYJOWLANDKNEEBYKNEEWHATC
AREI...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sit thee down, and have no shame,
Cheek by jowl, and knee by...
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
2
4
6
8
10
12
M Q P E L V W Z F Y I C T R S U A X B O G D ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
E-F-I-Q 95
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Arthur Zimmermann
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
APOCALYPTIC, CRYPT, EGYPT
Information Security ------------- Fall 2013
Van Hoang Nguyen
N Q C B E O T H E X G
A P O C A L Y P T I C
APOCALYPTIC, CRY...
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E A T T H E
C A N A D A E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G A T T H E
C A N A D A B R A Z E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E
C A N A D A B R A Z I L E ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E D O C K
C A N A D A B R A ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by The Code book – Simon Sigh
Information Security ------------- Fall 2013
Van Hoang Nguyen
10 000 000 000 000 000
Information Security ------------- Fall 2013
Van Hoang Nguyen
Marian Rejewski (1905-1980)
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Upcoming SlideShare
Loading in …5
×

Classical ciphers

586 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
586
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
24
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Classical ciphers

  1. 1. Van Hoang Nguyen Mail: startnewday85@gmail.com Department of Computer Science – FITA – HUA Information Security Course --------------------------------------------- Fall 2013 Dept. of Computer Science – FITA – HUA
  2. 2. Information Security ------------- Fall 2013 Van Hoang Nguyen L L-1 Cryptography
  3. 3. Information Security ------------- Fall 2013 Van Hoang Nguyen
  4. 4. Information Security ------------- Fall 2013 Van Hoang Nguyen
  5. 5. Information Security ------------- Fall 2013 Van Hoang Nguyen F O R E X A M P L E C O N S I D E R T H I S S H O R T S E N T E N C E . A O R H N . X C E S E E E E D S S C R L I I T N O P S H R E F M N T O T FMNTOTOPSHRERLIITNEEDSSCXCESEEAORHN.
  6. 6. Information Security ------------- Fall 2013 Van Hoang Nguyen
  7. 7. Information Security ------------- Fall 2013 Van Hoang Nguyen Code it, please. Are you programmer?
  8. 8. Information Security ------------- Fall 2013 Van Hoang Nguyen
  9. 9. Information Security ------------- Fall 2013 Van Hoang Nguyen Find a mathematical model, please.
  10. 10. Information Security ------------- Fall 2013 Van Hoang Nguyen
  11. 11. Information Security ------------- Fall 2013 Van Hoang Nguyen F O R E X A M P L E C O N S I D E R T H I S S H O R T S E N T E N C E . A O R H N . X C E S E E E E D S S C R L I I T N O P S H R E F M N T O T AORHN.XCESEEEEDSSCRLIITNOPSHREFMNTOT
  12. 12. Information Security ------------- Fall 2013 Van Hoang Nguyen PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails CipherText: WECRLTEERDSOEEFEAOCAIVDEN
  13. 13. Information Security ------------- Fall 2013 Van Hoang Nguyen
  14. 14. Information Security ------------- Fall 2013 Van Hoang Nguyen Transposition Substitution
  15. 15. Information Security ------------- Fall 2013 Van Hoang Nguyen L L-1 Data’
  16. 16. Information Security ------------- Fall 2013 Van Hoang Nguyen What is your choice?
  17. 17. Information Security ------------- Fall 2013 Van Hoang Nguyen
  18. 18. Information Security ------------- Fall 2013 Van Hoang Nguyen
  19. 19. Information Security ------------- Fall 2013 Van Hoang Nguyen CipherText only Attack
  20. 20. Information Security ------------- Fall 2013 Van Hoang Nguyen
  21. 21. Information Security ------------- Fall 2013 Van Hoang Nguyen
  22. 22. Information Security ------------- Fall 2013 Van Hoang Nguyen
  23. 23. Information Security ------------- Fall 2013 Van Hoang Nguyen Sourced by http://www.dailymail.co.uk/news/article-2316536/40-000-piece-world-record-jigsaw- collapses-floor-Weymouth-creator-turns-back.html
  24. 24. Information Security ------------- Fall 2013 Van Hoang Nguyen
  25. 25. Information Security ------------- Fall 2013 Van Hoang Nguyen
  26. 26. Information Security ------------- Fall 2013 Van Hoang Nguyen
  27. 27. Information Security ------------- Fall 2013 Van Hoang Nguyen
  28. 28. Information Security ------------- Fall 2013 Van Hoang Nguyen
  29. 29. Information Security ------------- Fall 2013 Van Hoang Nguyen
  30. 30. Information Security ------------- Fall 2013 Van Hoang Nguyen
  31. 31. Information Security ------------- Fall 2013 Van Hoang Nguyen
  32. 32. Information Security ------------- Fall 2013 Van Hoang Nguyen E (Encryption): K*P C D (Decryption): K*C P P, K
  33. 33. Information Security ------------- Fall 2013 Van Hoang Nguyen
  34. 34. Information Security ------------- Fall 2013 Van Hoang Nguyen = = A* is a set of all permutations E (Encryption): E(k, m) = m[k(1)]m[k(2)]….m[k(n)] D (Decryption): D(k, c) = c[k-1(1)] c[k-1(2)]… c[k-1(n)] 35 letters ==> 50*1030 permutations
  35. 35. Information Security ------------- Fall 2013 Van Hoang Nguyen = A* and = B* = { k | k is a bijection from A to B} E (Encryption): E(k, m) = k(m[1])k(m[2]) …. k(m[n]) D (Decryption): D(k, c) = k-1(c[1]) k-1(c[2]) … k-1(c[n]) 26 letters ==> 5*1026 alphabetic ciphers
  36. 36. Information Security ------------- Fall 2013 Van Hoang Nguyen
  37. 37. Information Security ------------- Fall 2013 Van Hoang Nguyen Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi
  38. 38. Information Security ------------- Fall 2013 Van Hoang Nguyen Abu Yusuf Ya'qub ibn Is-haq ibn as- Sabbah ibn 'omran ibn Ismail al-Kindi
  39. 39. Information Security ------------- Fall 2013 Van Hoang Nguyen 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 E T A O I N S R H D L U C M F Y W G P B V K X Q J Z
  40. 40. Information Security ------------- Fall 2013 Van Hoang Nguyen
  41. 41. Information Security ------------- Fall 2013 Van Hoang Nguyen
  42. 42. Information Security ------------- Fall 2013 Van Hoang Nguyen
  43. 43. Information Security ------------- Fall 2013 Van Hoang Nguyen
  44. 44. Information Security ------------- Fall 2013 Van Hoang Nguyen
  45. 45. a b c d e f g h i j k l m n o p q r s t u 09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08 12 81 41 03 16 31 25 39 70 37 27 58 05 95 35 19 20 61 33 62 45 24 50 73 51 59 07 40 36 30 63 47 79 44 56 83 84 66 54 42 76 43 53 46 65 88 71 72 77 86 49 67 55 68 93 91 90 80 96 69 78 57 99 75 92 64 85 74 97 82 87 98 Homophonic cipher
  46. 46. Information Security ------------- Fall 2013 Van Hoang Nguyen XNYYMJJITBSFSIMFAJSTXMFRJHMJJP GDOTBQFSIPSJJGDPSJJBMFYHFWJNK TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ QJYRJXHWJBYMJJZUFUJLQJYRJQTTX JYMDYTSLZJBNYMBNSJHFQQJXYYMT ZYMFYYMNSLFQJLBMNHMNXYMNSSJX YYMNSJTWRNSJYMTZXMFQYSTYGJXF AJIGDBTWPXYMTZMFXYGJJSFXNSSJ WYTTWZNSJIYWZSPXTSBNYMJWJIKT WPXJRUYDXHFWJHWTBXNFSIDTZKNQ QYMJHZUFSIKNQQYMJHFSMFAJFWTZ XJGJKTWJYMJRTWSJAJWDRTRJSYINJ XFRFSJAJWDRTRJSYTSJNXGTWS J 57 15.531 Y 32 8.767 S 31 8.493 T 29 7.945 M 25 6.849 F 25 6.849 W 23 6.301 X 19 5.205 N 18 4.932 R 12 3.288 Q 12 3.288 I 11 3.014 B 11 3.014 Z 10 2.740 H 9 2.466 D 9 2.466 G 7 1.918 P 6 1.644 K 6 1.644 A 5 1.370 L 5 1.370 U 4 1.096 O 1 0.274
  47. 47. Information Security ------------- Fall 2013 Van Hoang Nguyen 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z XNYYMJJITBSFSIMFAJSTXMFRJHMJJP GDOTBQFSIPSJJGDPSJJBMFYHFWJNK TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ QJYRJXHWJBYMJJZUFUJLQJYRJQTTX JYMDYTSLZJBNYMBNSJHFQQJXYYMT ZYMFYYMNSLFQJLBMNHMNXYMNSSJX YYMNSJTWRNSJYMTZXMFQYSTYGJXF AJIGDBTWPXYMTZMFXYGJJSFXNSSJ WYTTWZNSJIYWZSPXTSBNYMJWJIKT WPXJRUYDXHFWJHWTBXNFSIDTZKNQ QYMJHZUFSIKNQQYMJHFSMFAJFWTZ XJGJKTWJYMJRTWSJAJWDRTRJSYINJ XFRFSJAJWDRTRJSYTSJNXGTWS
  48. 48. Information Security ------------- Fall 2013 Van Hoang Nguyen XNYYMEEITBSFSIMFAESTXMFREHMEE PGDOTBQFSIPSEEGDPSEEBMFYHFWE NKTWFSDSFREBMFYKTWTWIEWTWIEL WEEQEYREXHWEBYMEEZUFUELQEYR EQTTXEYMDYTSLZEBNYMBNSEHFQQE XYYMTZYMFYYMNSLFQELBMNHMNXY MNSSEXYYMNSETWRNSEYMTZXMFQY STYGEXFAEIGDBTWPXYMTZMFXYGEE SFXNSSEWYTTWZNSEIYWZSPXTSBNY MEWEIKTWPXERUYDXHFWEHWTBXNF SIDTZKNQQYMEHZUFSIKNQQYMEHFS MFAEFWTZXEGEKTWEYMERTWSEAE WDRTRESYINEXFRFSEAEWDRTRESYT SENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E ?
  49. 49. Information Security ------------- Fall 2013 Van Hoang Nguyen XNTTMEEITBSFSIMFAESTXMFREHMEE PGDOTBQFSIPSEEGDPSEEBMFTHFWE NKTWFSDSFREBMFTKTWTWIEWTWIEL WEEQETREXHWEBTMEEZUFUELQETR EQTTXETMDTTSLZEBNTMBNSEHFQQE XTTMTZTMFTTMNSLFQELBMNHMNXT MNSSEXTTMNSETWRNSETMTZXMFQT STTGEXFAEIGDBTWPXTMTZMFXTGEE SFXNSSEWTTTWZNSEITWZSPXTSBNT MEWEIKTWPXERUTDXHFWEHWTBXNF SIDTZKNQQTMEHZUFSIKNQQTMEHFS MFAEFWTZXEGEKTWETMERTWSEAEW DRTRESTINEXFRFSEAEWDRTRESTTS ENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E T
  50. 50. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT TMEEITBSFSIMFAESTXMFREHMEEPGD OTBQFSIPSEEGDPSEEBMFTHFWENKT WFSDSFREBMFTKTWTWIEWTWIELWE EQETREXHWEBTMEEZUFUELQETREQ TTXETMDTTSLZEBNTMBNSEHFQQEXT TMTZTMFTTMNSLFQELBMNHMNXTMN SSEXTTMNSETWRNSETMTZXMFQTSTT GEXFAEIGDBTWPXTMTZMFXTGEESFX NSSEWTTTWZNSEITWZSPXTSBNTME WEIKTWPXERUTDXHFWEHWTBXNFSID TZKNQQTMEHZUFSIKNQQTMEHFSMFA EFWTZXEGEKTWETMERTWSEAEWDRT RESTINEXFRFSEAEWDRTRESTTSENX GTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E T
  51. 51. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT TMEEITBSFSIMFAESTXMFREHMEEPGD OTBQFSIPSEEGDPSEEBMFTHFWENKT WFSDSFREBMFTKTWTWIEWTWIELWE EQETREXHWEBTMEEZUFUELQETREQ TTXETMDTTSLZEBNTMBNSEHFQQEXT TMTZTMFTTMNSLFQELBMNHMNXTMN SSEXTTMNSETWRNSETMTZXMFQTSTT GEXFAEIGDBTWPXTMTZMFXTGEESFX NSSEWTTTWZNSEITWZSPXTSBNTME WEIKTWPXERUTDXHFWEHWTBXNFSID TZKNQQTMEHZUFSIKNQQTMEHFSMFA EFWTZXEGEKTWETMERTWSEAEWDRT RESTINEXFRFSEAEWDRTRESTTSENX GTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T ?
  52. 52. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT THEEITBSFSIHFAESTXHFREHHEEPGD OTBQFSIPSEEGDPSEEBHFTHFWENKT WFSDSFREBHFTKTWTWIEWTWIELWEE QETREXHWEBTHEEZUFUELQETREQTT XETHDTTSLZEBNTHBNSEHFQQEXTTH TZTHFTTHNSLFQELBHNHHNXTHNSSE XTTHNSETWRNSETHTZXHFQTSTTGEX FAEIGDBTWPXTHTZHFXTGEESFXNSSE WTTTWZNSEITWZSPXTSBNTHEWEIKT WPXERUTDXHFWEHWTBXNFSIDTZKN QQTHEHZUFSIKNQQTHEHFSHFAEFWT ZXEGEKTWETHERTWSEAEWDRTRESTI NEXFRFSEAEWDRTRESTTSENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T H 10 25 13 5 20 8 Shift Cipher with key = 5
  53. 53. Information Security ------------- Fall 2013 Van Hoang Nguyen SITTHEEDOWNANDHAVENOSHAMECH EEKBYJOWLANDKNEEBYKNEEWHATC AREIFORANYNAMEWHATFORORDERO RDEGREELETMESCREWTHEEUPAPEG LETMELOOSETHYTONGUEWITHWINEC ALLESTTHOUTHATTHINGALEGWHICHI STHINNESTTHINEORMINETHOUSHALT NOTBESAVEDBYWORKSTHOUHASTBE ENASINNERTOORUINEDTRUNKSONWI THEREDFORKSEMPTYSCARECROWSI ANDYOUFILLTHECUPANDFILLTHECANH AVEAROUSEBEFORETHEMORNEVERY MOMENTDIESAMANEVERYMOMENTON EISBORN 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T H 10 25 13 5 20 8 Shift Cipher with key = 5
  54. 54. Information Security ------------- Fall 2013 Van Hoang Nguyen Sit thee down, and have no shame, Cheek by jowl, and knee by knee: What care I for any name? What for order or degree? Let me screw thee up a peg: Let me loose thy tongue with wine: Callest thou that thing a leg? Which is thinnest? thine or mine? Thou shalt not be saved by works: Thou hast been a sinner too: Ruined trunks on withered forks, Empty scarecrows, I and you! Fill the cup, and fill the can: Have a rouse before the morn: Every moment dies a man, Every moment one is born. Alfred Tennyson (1809-1892)
  55. 55. Information Security ------------- Fall 2013 Van Hoang Nguyen WUBEFIQLZURMVOFEHMYMWTIXCGT MPIFKRZUPMVOIRQMMWOZMPULMBN YVQQQMVMVJLEYMHFEFNZPSDLPPSD LPEVQMWCXYMDAVQEEFIQCAYTQOW CXYMWMSEMEFCFWYEYQETRLIQYCG MTWCWFBSMYFPLRXTQYEEXMRULUK SGWFPTLRQAERLUVPMVYQYCXTWFQ LMTELSFJPQEHMOZCIWCIWFPZSLMA EZIQVLQMZVPPXAWCSMZMORVGVVQ SZETRLQZPBJAZVQIYXEWWOICCGDW HQMMVOWSGNTJPFPPAYBIYBJUTWRL QKLLLMDPYVACDCFQNZPIFPPKSDVPT IDGXMQQVEBMQALKEZMGCVKUZKIZB ZLIUAMMVZ J 57 15.531 Y 32 8.767 S 31 8.493 T 29 7.945 M 25 6.849 F 25 6.849 W 23 6.301 X 19 5.205 N 18 4.932 R 12 3.288 Q 12 3.288 I 11 3.014 B 11 3.014 Z 10 2.740 H 9 2.466 D 9 2.466 G 7 1.918 P 6 1.644 K 6 1.644 A 5 1.370 L 5 1.370 U 4 1.096 O 1 0.274 M 35 9.537 Q 27 7.357 P 23 6.267 E 21 5.722 L 21 5.722 V 21 5.722 W 19 5.177 Z 18 4.905 F 17 4.632 Y 17 4.632 I 16 4.360 C 16 4.360 T 13 3.542 R 11 2.997 S 11 2.997 U 10 2.725 A 10 2.725 X 9 2.452 B 8 2.180 O 8 2.180 G 8 2.180 D 8 2.180 K 7 1.907 J 5 1.362 H 4 1.090 N 4 1.090
  56. 56. Information Security ------------- Fall 2013 Van Hoang Nguyen 0 2 4 6 8 10 12 M Q P E L V W Z F Y I C T R S U A X B O G D K J H N 0 2 4 6 8 10 12 14 16 J Y S T M F W X N R Q I B Z H D G P K A L U O
  57. 57. Information Security ------------- Fall 2013 Van Hoang Nguyen
  58. 58. Information Security ------------- Fall 2013 Van Hoang Nguyen
  59. 59. Information Security ------------- Fall 2013 Van Hoang Nguyen WUBEFIQLZURMVOFEHMYMWTIXCGT MPIFKRZUPMVOIRQMMWOZMPULMBN YVQQQMVMVJLEYMHFEFNZPSDLPPSD LPEVQMWCXYMDAVQEEFIQCAYTQOW CXYMWMSEMEFCFWYEYQETRLIQYCG MTWCWFBSMYFPLRXTQYEEXMRULUK SGWFPTLRQAERLUVPMVYQYCXTWFQ LMTELSFJPQEHMOZCIWCIWFPZSLMA EZIQVLQMZVPPXAWCSMZMORVGVVQ SZETRLQZPBJAZVQIYXEWWOICCGDW HQMMVOWSGNTJPFPPAYBIYBJUTWRL QKLLLMDPYVACDCFQNZPIFPPKSDVPT IDGXMQQVEBMQALKEZMGCVKUZKIZB ZLIUAMMVZ
  60. 60. Information Security ------------- Fall 2013 Van Hoang Nguyen 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 E-F-I-Q 95 E-T-R-L 120 P-S-D-L-P 5 W-C-X-Y-M 20
  61. 61. Information Security ------------- Fall 2013 Van Hoang Nguyen
  62. 62. Information Security ------------- Fall 2013 Van Hoang Nguyen
  63. 63. Information Security ------------- Fall 2013 Van Hoang Nguyen
  64. 64. Information Security ------------- Fall 2013 Van Hoang Nguyen
  65. 65. Information Security ------------- Fall 2013 Van Hoang Nguyen
  66. 66. Information Security ------------- Fall 2013 Van Hoang Nguyen
  67. 67. Information Security ------------- Fall 2013 Van Hoang Nguyen
  68. 68. Information Security ------------- Fall 2013 Van Hoang Nguyen
  69. 69. Information Security ------------- Fall 2013 Van Hoang Nguyen
  70. 70. Information Security ------------- Fall 2013 Van Hoang Nguyen Arthur Zimmermann
  71. 71. Information Security ------------- Fall 2013 Van Hoang Nguyen
  72. 72. Information Security ------------- Fall 2013 Van Hoang Nguyen
  73. 73. Information Security ------------- Fall 2013 Van Hoang Nguyen
  74. 74. Information Security ------------- Fall 2013 Van Hoang Nguyen APOCALYPTIC, CRYPT, EGYPT
  75. 75. Information Security ------------- Fall 2013 Van Hoang Nguyen N Q C B E O T H E X G A P O C A L Y P T I C APOCALYPTIC, CRYPT, EGYPT C I T H E C R Y P T A T T H E E G Y P T
  76. 76. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E A T T H E C A N A D A E G Y P T
  77. 77. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G A T T H E C A N A D A B R A Z E G Y P T
  78. 78. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G I S A T T H E C A N A D A B R A Z I L E G Y P T
  79. 79. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G I S A T T H E D O C K C A N A D A B R A Z I L E G Y P T C U B A
  80. 80. Information Security ------------- Fall 2013 Van Hoang Nguyen
  81. 81. Information Security ------------- Fall 2013 Van Hoang Nguyen Sourced by The Code book – Simon Sigh
  82. 82. Information Security ------------- Fall 2013 Van Hoang Nguyen 10 000 000 000 000 000
  83. 83. Information Security ------------- Fall 2013 Van Hoang Nguyen Marian Rejewski (1905-1980)
  84. 84. Information Security ------------- Fall 2013 Van Hoang Nguyen
  85. 85. Information Security ------------- Fall 2013 Van Hoang Nguyen
  86. 86. Information Security ------------- Fall 2013 Van Hoang Nguyen

×