Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course ---...
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Cryptography
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Code it, please.
Are you programmer?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Find a mathematical model, please.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails
Ciphe...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Transposition Substitution
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Data’
Information Security ------------- Fall 2013
Van Hoang Nguyen
What is your choice?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
CipherText only Attack
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by http://www.dailymail.co.uk/news/article-2316536/4...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
E (Encryption): K*P C
D (Decryption): K*C P
P, K
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
= = A*
is a set of all permutations
E (Encryption): E(k, m) ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
= A* and = B*
= { k | k is a bijection from A to B}
E (Encry...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu 'Abd al-Rahman al-Khalil ibn
Ahmad ibn 'Amr ibn Tammam a...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu Yusuf Ya'qub ibn Is-haq ibn as-
Sabbah ibn 'omran ibn Is...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
E T A O I N S R H...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
a b c d e f g h i j k l m n o p q r s t u
09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08
12 81 41 03 16 31...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFYHFWE
N...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNTTMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFTHFWE
N...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
THEEITBSFSIHFAESTXHFREHHEEPGD
OTBQFSIPSEEGDPSEEBHFTHFWEN...
Information Security ------------- Fall 2013
Van Hoang Nguyen
SITTHEEDOWNANDHAVENOSHAMECH
EEKBYJOWLANDKNEEBYKNEEWHATC
AREI...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sit thee down, and have no shame,
Cheek by jowl, and knee by...
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
2
4
6
8
10
12
M Q P E L V W Z F Y I C T R S U A X B O G D ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
E-F-I-Q 95
...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Arthur Zimmermann
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
APOCALYPTIC, CRYPT, EGYPT
Information Security ------------- Fall 2013
Van Hoang Nguyen
N Q C B E O T H E X G
A P O C A L Y P T I C
APOCALYPTIC, CRY...
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E A T T H E
C A N A D A E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G A T T H E
C A N A D A B R A Z E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E
C A N A D A B R A Z I L E ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E D O C K
C A N A D A B R A ...
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by The Code book – Simon Sigh
Information Security ------------- Fall 2013
Van Hoang Nguyen
10 000 000 000 000 000
Information Security ------------- Fall 2013
Van Hoang Nguyen
Marian Rejewski (1905-1980)
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Upcoming SlideShare
Loading in …5
×

Classical ciphers

625 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Classical ciphers

  1. 1. Van Hoang Nguyen Mail: startnewday85@gmail.com Department of Computer Science – FITA – HUA Information Security Course --------------------------------------------- Fall 2013 Dept. of Computer Science – FITA – HUA
  2. 2. Information Security ------------- Fall 2013 Van Hoang Nguyen L L-1 Cryptography
  3. 3. Information Security ------------- Fall 2013 Van Hoang Nguyen
  4. 4. Information Security ------------- Fall 2013 Van Hoang Nguyen
  5. 5. Information Security ------------- Fall 2013 Van Hoang Nguyen F O R E X A M P L E C O N S I D E R T H I S S H O R T S E N T E N C E . A O R H N . X C E S E E E E D S S C R L I I T N O P S H R E F M N T O T FMNTOTOPSHRERLIITNEEDSSCXCESEEAORHN.
  6. 6. Information Security ------------- Fall 2013 Van Hoang Nguyen
  7. 7. Information Security ------------- Fall 2013 Van Hoang Nguyen Code it, please. Are you programmer?
  8. 8. Information Security ------------- Fall 2013 Van Hoang Nguyen
  9. 9. Information Security ------------- Fall 2013 Van Hoang Nguyen Find a mathematical model, please.
  10. 10. Information Security ------------- Fall 2013 Van Hoang Nguyen
  11. 11. Information Security ------------- Fall 2013 Van Hoang Nguyen F O R E X A M P L E C O N S I D E R T H I S S H O R T S E N T E N C E . A O R H N . X C E S E E E E D S S C R L I I T N O P S H R E F M N T O T AORHN.XCESEEEEDSSCRLIITNOPSHREFMNTOT
  12. 12. Information Security ------------- Fall 2013 Van Hoang Nguyen PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails CipherText: WECRLTEERDSOEEFEAOCAIVDEN
  13. 13. Information Security ------------- Fall 2013 Van Hoang Nguyen
  14. 14. Information Security ------------- Fall 2013 Van Hoang Nguyen Transposition Substitution
  15. 15. Information Security ------------- Fall 2013 Van Hoang Nguyen L L-1 Data’
  16. 16. Information Security ------------- Fall 2013 Van Hoang Nguyen What is your choice?
  17. 17. Information Security ------------- Fall 2013 Van Hoang Nguyen
  18. 18. Information Security ------------- Fall 2013 Van Hoang Nguyen
  19. 19. Information Security ------------- Fall 2013 Van Hoang Nguyen CipherText only Attack
  20. 20. Information Security ------------- Fall 2013 Van Hoang Nguyen
  21. 21. Information Security ------------- Fall 2013 Van Hoang Nguyen
  22. 22. Information Security ------------- Fall 2013 Van Hoang Nguyen
  23. 23. Information Security ------------- Fall 2013 Van Hoang Nguyen Sourced by http://www.dailymail.co.uk/news/article-2316536/40-000-piece-world-record-jigsaw- collapses-floor-Weymouth-creator-turns-back.html
  24. 24. Information Security ------------- Fall 2013 Van Hoang Nguyen
  25. 25. Information Security ------------- Fall 2013 Van Hoang Nguyen
  26. 26. Information Security ------------- Fall 2013 Van Hoang Nguyen
  27. 27. Information Security ------------- Fall 2013 Van Hoang Nguyen
  28. 28. Information Security ------------- Fall 2013 Van Hoang Nguyen
  29. 29. Information Security ------------- Fall 2013 Van Hoang Nguyen
  30. 30. Information Security ------------- Fall 2013 Van Hoang Nguyen
  31. 31. Information Security ------------- Fall 2013 Van Hoang Nguyen
  32. 32. Information Security ------------- Fall 2013 Van Hoang Nguyen E (Encryption): K*P C D (Decryption): K*C P P, K
  33. 33. Information Security ------------- Fall 2013 Van Hoang Nguyen
  34. 34. Information Security ------------- Fall 2013 Van Hoang Nguyen = = A* is a set of all permutations E (Encryption): E(k, m) = m[k(1)]m[k(2)]….m[k(n)] D (Decryption): D(k, c) = c[k-1(1)] c[k-1(2)]… c[k-1(n)] 35 letters ==> 50*1030 permutations
  35. 35. Information Security ------------- Fall 2013 Van Hoang Nguyen = A* and = B* = { k | k is a bijection from A to B} E (Encryption): E(k, m) = k(m[1])k(m[2]) …. k(m[n]) D (Decryption): D(k, c) = k-1(c[1]) k-1(c[2]) … k-1(c[n]) 26 letters ==> 5*1026 alphabetic ciphers
  36. 36. Information Security ------------- Fall 2013 Van Hoang Nguyen
  37. 37. Information Security ------------- Fall 2013 Van Hoang Nguyen Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi
  38. 38. Information Security ------------- Fall 2013 Van Hoang Nguyen Abu Yusuf Ya'qub ibn Is-haq ibn as- Sabbah ibn 'omran ibn Ismail al-Kindi
  39. 39. Information Security ------------- Fall 2013 Van Hoang Nguyen 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 E T A O I N S R H D L U C M F Y W G P B V K X Q J Z
  40. 40. Information Security ------------- Fall 2013 Van Hoang Nguyen
  41. 41. Information Security ------------- Fall 2013 Van Hoang Nguyen
  42. 42. Information Security ------------- Fall 2013 Van Hoang Nguyen
  43. 43. Information Security ------------- Fall 2013 Van Hoang Nguyen
  44. 44. Information Security ------------- Fall 2013 Van Hoang Nguyen
  45. 45. a b c d e f g h i j k l m n o p q r s t u 09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08 12 81 41 03 16 31 25 39 70 37 27 58 05 95 35 19 20 61 33 62 45 24 50 73 51 59 07 40 36 30 63 47 79 44 56 83 84 66 54 42 76 43 53 46 65 88 71 72 77 86 49 67 55 68 93 91 90 80 96 69 78 57 99 75 92 64 85 74 97 82 87 98 Homophonic cipher
  46. 46. Information Security ------------- Fall 2013 Van Hoang Nguyen XNYYMJJITBSFSIMFAJSTXMFRJHMJJP GDOTBQFSIPSJJGDPSJJBMFYHFWJNK TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ QJYRJXHWJBYMJJZUFUJLQJYRJQTTX JYMDYTSLZJBNYMBNSJHFQQJXYYMT ZYMFYYMNSLFQJLBMNHMNXYMNSSJX YYMNSJTWRNSJYMTZXMFQYSTYGJXF AJIGDBTWPXYMTZMFXYGJJSFXNSSJ WYTTWZNSJIYWZSPXTSBNYMJWJIKT WPXJRUYDXHFWJHWTBXNFSIDTZKNQ QYMJHZUFSIKNQQYMJHFSMFAJFWTZ XJGJKTWJYMJRTWSJAJWDRTRJSYINJ XFRFSJAJWDRTRJSYTSJNXGTWS J 57 15.531 Y 32 8.767 S 31 8.493 T 29 7.945 M 25 6.849 F 25 6.849 W 23 6.301 X 19 5.205 N 18 4.932 R 12 3.288 Q 12 3.288 I 11 3.014 B 11 3.014 Z 10 2.740 H 9 2.466 D 9 2.466 G 7 1.918 P 6 1.644 K 6 1.644 A 5 1.370 L 5 1.370 U 4 1.096 O 1 0.274
  47. 47. Information Security ------------- Fall 2013 Van Hoang Nguyen 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z XNYYMJJITBSFSIMFAJSTXMFRJHMJJP GDOTBQFSIPSJJGDPSJJBMFYHFWJNK TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ QJYRJXHWJBYMJJZUFUJLQJYRJQTTX JYMDYTSLZJBNYMBNSJHFQQJXYYMT ZYMFYYMNSLFQJLBMNHMNXYMNSSJX YYMNSJTWRNSJYMTZXMFQYSTYGJXF AJIGDBTWPXYMTZMFXYGJJSFXNSSJ WYTTWZNSJIYWZSPXTSBNYMJWJIKT WPXJRUYDXHFWJHWTBXNFSIDTZKNQ QYMJHZUFSIKNQQYMJHFSMFAJFWTZ XJGJKTWJYMJRTWSJAJWDRTRJSYINJ XFRFSJAJWDRTRJSYTSJNXGTWS
  48. 48. Information Security ------------- Fall 2013 Van Hoang Nguyen XNYYMEEITBSFSIMFAESTXMFREHMEE PGDOTBQFSIPSEEGDPSEEBMFYHFWE NKTWFSDSFREBMFYKTWTWIEWTWIEL WEEQEYREXHWEBYMEEZUFUELQEYR EQTTXEYMDYTSLZEBNYMBNSEHFQQE XYYMTZYMFYYMNSLFQELBMNHMNXY MNSSEXYYMNSETWRNSEYMTZXMFQY STYGEXFAEIGDBTWPXYMTZMFXYGEE SFXNSSEWYTTWZNSEIYWZSPXTSBNY MEWEIKTWPXERUYDXHFWEHWTBXNF SIDTZKNQQYMEHZUFSIKNQQYMEHFS MFAEFWTZXEGEKTWEYMERTWSEAE WDRTRESYINEXFRFSEAEWDRTRESYT SENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E ?
  49. 49. Information Security ------------- Fall 2013 Van Hoang Nguyen XNTTMEEITBSFSIMFAESTXMFREHMEE PGDOTBQFSIPSEEGDPSEEBMFTHFWE NKTWFSDSFREBMFTKTWTWIEWTWIEL WEEQETREXHWEBTMEEZUFUELQETR EQTTXETMDTTSLZEBNTMBNSEHFQQE XTTMTZTMFTTMNSLFQELBMNHMNXT MNSSEXTTMNSETWRNSETMTZXMFQT STTGEXFAEIGDBTWPXTMTZMFXTGEE SFXNSSEWTTTWZNSEITWZSPXTSBNT MEWEIKTWPXERUTDXHFWEHWTBXNF SIDTZKNQQTMEHZUFSIKNQQTMEHFS MFAEFWTZXEGEKTWETMERTWSEAEW DRTRESTINEXFRFSEAEWDRTRESTTS ENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E T
  50. 50. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT TMEEITBSFSIMFAESTXMFREHMEEPGD OTBQFSIPSEEGDPSEEBMFTHFWENKT WFSDSFREBMFTKTWTWIEWTWIELWE EQETREXHWEBTMEEZUFUELQETREQ TTXETMDTTSLZEBNTMBNSEHFQQEXT TMTZTMFTTMNSLFQELBMNHMNXTMN SSEXTTMNSETWRNSETMTZXMFQTSTT GEXFAEIGDBTWPXTMTZMFXTGEESFX NSSEWTTTWZNSEITWZSPXTSBNTME WEIKTWPXERUTDXHFWEHWTBXNFSID TZKNQQTMEHZUFSIKNQQTMEHFSMFA EFWTZXEGEKTWETMERTWSEAEWDRT RESTINEXFRFSEAEWDRTRESTTSENX GTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y E T
  51. 51. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT TMEEITBSFSIMFAESTXMFREHMEEPGD OTBQFSIPSEEGDPSEEBMFTHFWENKT WFSDSFREBMFTKTWTWIEWTWIELWE EQETREXHWEBTMEEZUFUELQETREQ TTXETMDTTSLZEBNTMBNSEHFQQEXT TMTZTMFTTMNSLFQELBMNHMNXTMN SSEXTTMNSETWRNSETMTZXMFQTSTT GEXFAEIGDBTWPXTMTZMFXTGEESFX NSSEWTTTWZNSEITWZSPXTSBNTME WEIKTWPXERUTDXHFWEHWTBXNFSID TZKNQQTMEHZUFSIKNQQTMEHFSMFA EFWTZXEGEKTWETMERTWSEAEWDRT RESTINEXFRFSEAEWDRTRESTTSENX GTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T ?
  52. 52. Information Security ------------- Fall 2013 Van Hoang Nguyen XNT THEEITBSFSIHFAESTXHFREHHEEPGD OTBQFSIPSEEGDPSEEBHFTHFWENKT WFSDSFREBHFTKTWTWIEWTWIELWEE QETREXHWEBTHEEZUFUELQETREQTT XETHDTTSLZEBNTHBNSEHFQQEXTTH TZTHFTTHNSLFQELBHNHHNXTHNSSE XTTHNSETWRNSETHTZXHFQTSTTGEX FAEIGDBTWPXTHTZHFXTGEESFXNSSE WTTTWZNSEITWZSPXTSBNTHEWEIKT WPXERUTDXHFWEHWTBXNFSIDTZKN QQTHEHZUFSIKNQQTHEHFSHFAEFWT ZXEGEKTWETHERTWSEAEWDRTRESTI NEXFRFSEAEWDRTRESTTSENXGTWS 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T H 10 25 13 5 20 8 Shift Cipher with key = 5
  53. 53. Information Security ------------- Fall 2013 Van Hoang Nguyen SITTHEEDOWNANDHAVENOSHAMECH EEKBYJOWLANDKNEEBYKNEEWHATC AREIFORANYNAMEWHATFORORDERO RDEGREELETMESCREWTHEEUPAPEG LETMELOOSETHYTONGUEWITHWINEC ALLESTTHOUTHATTHINGALEGWHICHI STHINNESTTHINEORMINETHOUSHALT NOTBESAVEDBYWORKSTHOUHASTBE ENASINNERTOORUINEDTRUNKSONWI THEREDFORKSEMPTYSCARECROWSI ANDYOUFILLTHECUPANDFILLTHECANH AVEAROUSEBEFORETHEMORNEVERY MOMENTDIESAMANEVERYMOMENTON EISBORN 0 5 10 15 J Y S T M F W X N R Q I B Z H D G P K A L U O 0 2 4 6 8 10 12 14 E T A O I N S R H D L U C M F Y WG P B V K X Q J Z J Y M E T H 10 25 13 5 20 8 Shift Cipher with key = 5
  54. 54. Information Security ------------- Fall 2013 Van Hoang Nguyen Sit thee down, and have no shame, Cheek by jowl, and knee by knee: What care I for any name? What for order or degree? Let me screw thee up a peg: Let me loose thy tongue with wine: Callest thou that thing a leg? Which is thinnest? thine or mine? Thou shalt not be saved by works: Thou hast been a sinner too: Ruined trunks on withered forks, Empty scarecrows, I and you! Fill the cup, and fill the can: Have a rouse before the morn: Every moment dies a man, Every moment one is born. Alfred Tennyson (1809-1892)
  55. 55. Information Security ------------- Fall 2013 Van Hoang Nguyen WUBEFIQLZURMVOFEHMYMWTIXCGT MPIFKRZUPMVOIRQMMWOZMPULMBN YVQQQMVMVJLEYMHFEFNZPSDLPPSD LPEVQMWCXYMDAVQEEFIQCAYTQOW CXYMWMSEMEFCFWYEYQETRLIQYCG MTWCWFBSMYFPLRXTQYEEXMRULUK SGWFPTLRQAERLUVPMVYQYCXTWFQ LMTELSFJPQEHMOZCIWCIWFPZSLMA EZIQVLQMZVPPXAWCSMZMORVGVVQ SZETRLQZPBJAZVQIYXEWWOICCGDW HQMMVOWSGNTJPFPPAYBIYBJUTWRL QKLLLMDPYVACDCFQNZPIFPPKSDVPT IDGXMQQVEBMQALKEZMGCVKUZKIZB ZLIUAMMVZ J 57 15.531 Y 32 8.767 S 31 8.493 T 29 7.945 M 25 6.849 F 25 6.849 W 23 6.301 X 19 5.205 N 18 4.932 R 12 3.288 Q 12 3.288 I 11 3.014 B 11 3.014 Z 10 2.740 H 9 2.466 D 9 2.466 G 7 1.918 P 6 1.644 K 6 1.644 A 5 1.370 L 5 1.370 U 4 1.096 O 1 0.274 M 35 9.537 Q 27 7.357 P 23 6.267 E 21 5.722 L 21 5.722 V 21 5.722 W 19 5.177 Z 18 4.905 F 17 4.632 Y 17 4.632 I 16 4.360 C 16 4.360 T 13 3.542 R 11 2.997 S 11 2.997 U 10 2.725 A 10 2.725 X 9 2.452 B 8 2.180 O 8 2.180 G 8 2.180 D 8 2.180 K 7 1.907 J 5 1.362 H 4 1.090 N 4 1.090
  56. 56. Information Security ------------- Fall 2013 Van Hoang Nguyen 0 2 4 6 8 10 12 M Q P E L V W Z F Y I C T R S U A X B O G D K J H N 0 2 4 6 8 10 12 14 16 J Y S T M F W X N R Q I B Z H D G P K A L U O
  57. 57. Information Security ------------- Fall 2013 Van Hoang Nguyen
  58. 58. Information Security ------------- Fall 2013 Van Hoang Nguyen
  59. 59. Information Security ------------- Fall 2013 Van Hoang Nguyen WUBEFIQLZURMVOFEHMYMWTIXCGT MPIFKRZUPMVOIRQMMWOZMPULMBN YVQQQMVMVJLEYMHFEFNZPSDLPPSD LPEVQMWCXYMDAVQEEFIQCAYTQOW CXYMWMSEMEFCFWYEYQETRLIQYCG MTWCWFBSMYFPLRXTQYEEXMRULUK SGWFPTLRQAERLUVPMVYQYCXTWFQ LMTELSFJPQEHMOZCIWCIWFPZSLMA EZIQVLQMZVPPXAWCSMZMORVGVVQ SZETRLQZPBJAZVQIYXEWWOICCGDW HQMMVOWSGNTJPFPPAYBIYBJUTWRL QKLLLMDPYVACDCFQNZPIFPPKSDVPT IDGXMQQVEBMQALKEZMGCVKUZKIZB ZLIUAMMVZ
  60. 60. Information Security ------------- Fall 2013 Van Hoang Nguyen 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 E-F-I-Q 95 E-T-R-L 120 P-S-D-L-P 5 W-C-X-Y-M 20
  61. 61. Information Security ------------- Fall 2013 Van Hoang Nguyen
  62. 62. Information Security ------------- Fall 2013 Van Hoang Nguyen
  63. 63. Information Security ------------- Fall 2013 Van Hoang Nguyen
  64. 64. Information Security ------------- Fall 2013 Van Hoang Nguyen
  65. 65. Information Security ------------- Fall 2013 Van Hoang Nguyen
  66. 66. Information Security ------------- Fall 2013 Van Hoang Nguyen
  67. 67. Information Security ------------- Fall 2013 Van Hoang Nguyen
  68. 68. Information Security ------------- Fall 2013 Van Hoang Nguyen
  69. 69. Information Security ------------- Fall 2013 Van Hoang Nguyen
  70. 70. Information Security ------------- Fall 2013 Van Hoang Nguyen Arthur Zimmermann
  71. 71. Information Security ------------- Fall 2013 Van Hoang Nguyen
  72. 72. Information Security ------------- Fall 2013 Van Hoang Nguyen
  73. 73. Information Security ------------- Fall 2013 Van Hoang Nguyen
  74. 74. Information Security ------------- Fall 2013 Van Hoang Nguyen APOCALYPTIC, CRYPT, EGYPT
  75. 75. Information Security ------------- Fall 2013 Van Hoang Nguyen N Q C B E O T H E X G A P O C A L Y P T I C APOCALYPTIC, CRYPT, EGYPT C I T H E C R Y P T A T T H E E G Y P T
  76. 76. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E A T T H E C A N A D A E G Y P T
  77. 77. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G A T T H E C A N A D A B R A Z E G Y P T
  78. 78. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G I S A T T H E C A N A D A B R A Z I L E G Y P T
  79. 79. Information Security ------------- Fall 2013 Van Hoang Nguyen T H E M E E T I N G I S A T T H E D O C K C A N A D A B R A Z I L E G Y P T C U B A
  80. 80. Information Security ------------- Fall 2013 Van Hoang Nguyen
  81. 81. Information Security ------------- Fall 2013 Van Hoang Nguyen Sourced by The Code book – Simon Sigh
  82. 82. Information Security ------------- Fall 2013 Van Hoang Nguyen 10 000 000 000 000 000
  83. 83. Information Security ------------- Fall 2013 Van Hoang Nguyen Marian Rejewski (1905-1980)
  84. 84. Information Security ------------- Fall 2013 Van Hoang Nguyen
  85. 85. Information Security ------------- Fall 2013 Van Hoang Nguyen
  86. 86. Information Security ------------- Fall 2013 Van Hoang Nguyen

×