Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course --------------------------------------------- Fall 2013
Dept. of Computer Science – FITA – HUA
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Cryptography
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
FMNTOTOPSHRERLIITNEEDSSCXCESEEAORHN.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Code it, please.
Are you programmer?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Find a mathematical model, please.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
AORHN.XCESEEEEDSSCRLIITNOPSHREFMNTOT
Information Security ------------- Fall 2013
Van Hoang Nguyen
PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails
CipherText: WECRLTEERDSOEEFEAOCAIVDEN
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Transposition Substitution
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Data’
Information Security ------------- Fall 2013
Van Hoang Nguyen
What is your choice?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
CipherText only Attack
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by http://www.dailymail.co.uk/news/article-2316536/40-000-piece-world-record-jigsaw-
collapses-floor-Weymouth-creator-turns-back.html
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
E (Encryption): K*P C
D (Decryption): K*C P
P, K
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
= = A*
is a set of all permutations
E (Encryption): E(k, m) = m[k(1)]m[k(2)]….m[k(n)]
D (Decryption): D(k, c) = c[k-1(1)] c[k-1(2)]… c[k-1(n)]
35 letters ==> 50*1030 permutations
Information Security ------------- Fall 2013
Van Hoang Nguyen
= A* and = B*
= { k | k is a bijection from A to B}
E (Encryption): E(k, m) = k(m[1])k(m[2]) …. k(m[n])
D (Decryption): D(k, c) = k-1(c[1]) k-1(c[2]) … k-1(c[n])
26 letters ==> 5*1026 alphabetic ciphers
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu 'Abd al-Rahman al-Khalil ibn
Ahmad ibn 'Amr ibn Tammam al
Farahidi al-Zadi al Yahmadi
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu Yusuf Ya'qub ibn Is-haq ibn as-
Sabbah ibn 'omran ibn Ismail al-Kindi
Information Security ------------- Fall 2013
Van Hoang Nguyen
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
E T A O I N S R H D L U C M F Y W G P B V K X Q J Z
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
a b c d e f g h i j k l m n o p q r s t u
09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08
12 81 41 03 16 31 25 39 70 37 27 58 05 95 35 19 20 61
33 62 45 24 50 73 51 59 07 40 36 30 63
47 79 44 56 83 84 66 54 42 76 43
53 46 65 88 71 72 77 86 49
67 55 68 93 91 90 80 96 69
78 57 99 75
92 64 85
74 97
82
87
98
Homophonic cipher
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFYHFWE
NKTWFSDSFREBMFYKTWTWIEWTWIEL
WEEQEYREXHWEBYMEEZUFUELQEYR
EQTTXEYMDYTSLZEBNYMBNSEHFQQE
XYYMTZYMFYYMNSLFQELBMNHMNXY
MNSSEXYYMNSETWRNSEYMTZXMFQY
STYGEXFAEIGDBTWPXYMTZMFXYGEE
SFXNSSEWYTTWZNSEIYWZSPXTSBNY
MEWEIKTWPXERUYDXHFWEHWTBXNF
SIDTZKNQQYMEHZUFSIKNQQYMEHFS
MFAEFWTZXEGEKTWEYMERTWSEAE
WDRTRESYINEXFRFSEAEWDRTRESYT
SENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E ?
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNTTMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFTHFWE
NKTWFSDSFREBMFTKTWTWIEWTWIEL
WEEQETREXHWEBTMEEZUFUELQETR
EQTTXETMDTTSLZEBNTMBNSEHFQQE
XTTMTZTMFTTMNSLFQELBMNHMNXT
MNSSEXTTMNSETWRNSETMTZXMFQT
STTGEXFAEIGDBTWPXTMTZMFXTGEE
SFXNSSEWTTTWZNSEITWZSPXTSBNT
MEWEIKTWPXERUTDXHFWEHWTBXNF
SIDTZKNQQTMEHZUFSIKNQQTMEHFS
MFAEFWTZXEGEKTWETMERTWSEAEW
DRTRESTINEXFRFSEAEWDRTRESTTS
ENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T ?
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
THEEITBSFSIHFAESTXHFREHHEEPGD
OTBQFSIPSEEGDPSEEBHFTHFWENKT
WFSDSFREBHFTKTWTWIEWTWIELWEE
QETREXHWEBTHEEZUFUELQETREQTT
XETHDTTSLZEBNTHBNSEHFQQEXTTH
TZTHFTTHNSLFQELBHNHHNXTHNSSE
XTTHNSETWRNSETHTZXHFQTSTTGEX
FAEIGDBTWPXTHTZHFXTGEESFXNSSE
WTTTWZNSEITWZSPXTSBNTHEWEIKT
WPXERUTDXHFWEHWTBXNFSIDTZKN
QQTHEHZUFSIKNQQTHEHFSHFAEFWT
ZXEGEKTWETHERTWSEAEWDRTRESTI
NEXFRFSEAEWDRTRESTTSENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
Information Security ------------- Fall 2013
Van Hoang Nguyen
SITTHEEDOWNANDHAVENOSHAMECH
EEKBYJOWLANDKNEEBYKNEEWHATC
AREIFORANYNAMEWHATFORORDERO
RDEGREELETMESCREWTHEEUPAPEG
LETMELOOSETHYTONGUEWITHWINEC
ALLESTTHOUTHATTHINGALEGWHICHI
STHINNESTTHINEORMINETHOUSHALT
NOTBESAVEDBYWORKSTHOUHASTBE
ENASINNERTOORUINEDTRUNKSONWI
THEREDFORKSEMPTYSCARECROWSI
ANDYOUFILLTHECUPANDFILLTHECANH
AVEAROUSEBEFORETHEMORNEVERY
MOMENTDIESAMANEVERYMOMENTON
EISBORN
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sit thee down, and have no shame,
Cheek by jowl, and knee by knee:
What care I for any name?
What for order or degree?
Let me screw thee up a peg:
Let me loose thy tongue with wine:
Callest thou that thing a leg?
Which is thinnest? thine or mine?
Thou shalt not be saved by works:
Thou hast been a sinner too:
Ruined trunks on withered forks,
Empty scarecrows, I and you!
Fill the cup, and fill the can:
Have a rouse before the morn:
Every moment dies a man,
Every moment one is born.
Alfred Tennyson (1809-1892)
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQQMVMVJLEYMHFEFNZPSDLPPSD
LPEVQMWCXYMDAVQEEFIQCAYTQOW
CXYMWMSEMEFCFWYEYQETRLIQYCG
MTWCWFBSMYFPLRXTQYEEXMRULUK
SGWFPTLRQAERLUVPMVYQYCXTWFQ
LMTELSFJPQEHMOZCIWCIWFPZSLMA
EZIQVLQMZVPPXAWCSMZMORVGVVQ
SZETRLQZPBJAZVQIYXEWWOICCGDW
HQMMVOWSGNTJPFPPAYBIYBJUTWRL
QKLLLMDPYVACDCFQNZPIFPPKSDVPT
IDGXMQQVEBMQALKEZMGCVKUZKIZB
ZLIUAMMVZ
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
M 35 9.537
Q 27 7.357
P 23 6.267
E 21 5.722
L 21 5.722
V 21 5.722
W 19 5.177
Z 18 4.905
F 17 4.632
Y 17 4.632
I 16 4.360
C 16 4.360
T 13 3.542
R 11 2.997
S 11 2.997
U 10 2.725
A 10 2.725
X 9 2.452
B 8 2.180
O 8 2.180
G 8 2.180
D 8 2.180
K 7 1.907
J 5 1.362
H 4 1.090
N 4 1.090
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
2
4
6
8
10
12
M Q P E L V W Z F Y I C T R S U A X B O G D K J H N
0
2
4
6
8
10
12
14
16
J Y S T M F W X N R Q I B Z H D G P K A L U O
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQQMVMVJLEYMHFEFNZPSDLPPSD
LPEVQMWCXYMDAVQEEFIQCAYTQOW
CXYMWMSEMEFCFWYEYQETRLIQYCG
MTWCWFBSMYFPLRXTQYEEXMRULUK
SGWFPTLRQAERLUVPMVYQYCXTWFQ
LMTELSFJPQEHMOZCIWCIWFPZSLMA
EZIQVLQMZVPPXAWCSMZMORVGVVQ
SZETRLQZPBJAZVQIYXEWWOICCGDW
HQMMVOWSGNTJPFPPAYBIYBJUTWRL
QKLLLMDPYVACDCFQNZPIFPPKSDVPT
IDGXMQQVEBMQALKEZMGCVKUZKIZB
ZLIUAMMVZ
Information Security ------------- Fall 2013
Van Hoang Nguyen
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
E-F-I-Q 95
E-T-R-L 120
P-S-D-L-P 5
W-C-X-Y-M 20
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Arthur Zimmermann
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
APOCALYPTIC, CRYPT, EGYPT
Information Security ------------- Fall 2013
Van Hoang Nguyen
N Q C B E O T H E X G
A P O C A L Y P T I C
APOCALYPTIC, CRYPT, EGYPT
C I T H E
C R Y P T
A T T H E
E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E A T T H E
C A N A D A E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G A T T H E
C A N A D A B R A Z E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E
C A N A D A B R A Z I L E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E D O C K
C A N A D A B R A Z I L E G Y P T C U B A
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by The Code book – Simon Sigh
Information Security ------------- Fall 2013
Van Hoang Nguyen
10 000 000 000 000 000
Information Security ------------- Fall 2013
Van Hoang Nguyen
Marian Rejewski (1905-1980)
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen

Classical ciphers