SlideShare a Scribd company logo
1 of 16
Download to read offline
Network & Information
Security Prof. Shawkat K. Guirguis 1
Network & Information Security
Shawkat K. Guirguis
Professor of Computer Science &
Informatics
Other sources of random
numbers:
Network & Information
Security Prof. Shawkat K. Guirguis 2
Network & Information
Security Prof. Shawkat K. Guirguis 3
Long Sequences from Books
 Another source of supposedly "random" numbers is any
book, piece of music, or other object of which the
structure can be analyzed.
 A possible one-time pad is a telephone book.
 The sender and the receiver both need access to
identical telephone books.
 They might agree, for example, to start at page 35, and
use two middle digits (ddd-DDdd) of each phone
number, mod 26 as a key letter for a polyalphabetic
substitution cipher using a preagreed form of Vigenere
tableau.
 This approach would not provide an unlimited number of
key digits, but it might last for a year until a new
telephone book became available.
Network & Information
Security Prof. Shawkat K. Guirguis 4
Long Sequences from Books
(cont.)
 A similar idea is the use of any book of prose as a key.
 Then, the key is the letters of the text, in order.
 For example, one might select a passage from Descarte's
meditation: "What of thinking? I am, I exist, that is
certain."
 The meditation goes on for a great length, certainly long
enough to encipher many very long messages.
 If you wanted to encipher the message MACHINES
CANNOT THINK you would write the message under
enough of the key, and encode the message, again as
with a conventional poly alphabetic cipher.
 iamie xistt hatis cert
 MACHI NESCA NNOTT HINK
Network & Information
Security Prof. Shawkat K. Guirguis 5
Long Sequences from Books
(cont.)
 It would seem as if this cipher, too, would be
impossible to break.
 Unfortunately, that is not true.
 The flaw lies in the fact that neither the
message nor the key text is evenly distributed
and, in fact, the distributions of both cluster
around high-frequency letters.
 For example, the four letters A, E, O, and T
account for approximately 40 percent of all
letters used in standard English text.
Network & Information
Security Prof. Shawkat K. Guirguis 6
Long Sequences from Books (cont.)
 Each ciphertext letter is really the intersection
of a plaintext letter and a key letter.
 But if the probability of the plaintext or the key
letter's being A, E, O, or T is 0.4, the
probability of both being one of the four is:
0.4 * 0.4 = 0.16, nearly 1/6.
 The top six letters, adding N and I, increases
the sum of the frequencies to 50 percent and
increases the probability for a pair to 0.25.
Network & Information
Security Prof. Shawkat K. Guirguis 7
Long Sequences from Books
(cont.)
 Assuming a standard Vigenere tableau has been used,
given a piece of ciphertext, we look for frequent letter
pairs that could have generated each ciphertext letter.
 The encrypted version of the message
MACHINES CANNOT THINK is
uaopm kmkvt unhbl jmed
 To break the cipher, assume that each letter of the
ciphertext comes from a situation in which the plaintext
letter (row selector) and the key letter (column selector)
are both one of the six most frequent letters.
 (This guess will be correct approximately 25 percent of
the time.)
Network & Information
Security Prof. Shawkat K. Guirguis 8
Long Sequences from Books (cont.)
 The trick is to work the cipher inside out.
 For a ciphertext letter, look in the body of the
table for the letter to appear at the intersection
of one of the six rows with one of the six
columns.
 Find combinations in the Vigenere tableau that
could yield each ciphertext letter as the result
of two high-frequency letters.
 The ciphertext u in this message could be in
row A, column u, but that is not a pair of
frequent letters, or it could be row B, column t,
but that is not a common pair, nor is Cs, Dr, Eq,
Fp, or any other pair.
 Thus, we cannot say much about the plaintext
letter that produced u.
Network & Information
Security Prof. Shawkat K. Guirguis 9
Long Sequences from Books (cont.)
 The second letter, a, could come from
row A, column a, but that is the only
plaintext-key text combination of the
letters A, E, O, T, N, I that can produce
an a.
 The likelihood is 0.25 that a represents
A.
 It will help to build a reduced table of
the six frequent letter rows and
columns.
Network & Information
Security Prof. Shawkat K. Guirguis 10
Reduced table of the six frequent
letters
a e i n o t
A a e i n o t
E e l m r s x
I i m r w x c
N n r w b c h
O o s x c d l
T t x b g h m
This table is more
useful "inside out":
a could represent A,
b could stand for N or
T, and so on.
Network & Information
Security Prof. Shawkat K. Guirguis 11
Working inside out
Searching through this table for possibilities, we
transform the cryptogram.
u a o p m k m k v t u n h b l j m e d
? A A ? E ? E ? ? A ? A N N ? ? E A ?
O I I T N T T I E
T T T
Network & Information
Security Prof. Shawkat K. Guirguis 12
Comment
 This technique does not reveal the entire message, or
even enough of it to make the message MACHI NESCA
NNOTT HINK easy to identify.
 The technique did, however, make predictions in 10
letter positions, and there was a correct prediction in 7
of those 10 positions. (The correct predictions are shown
in bold type.)
 The algorithm made 22 assertions about probable
letters, and 7 of those 22 were correct. (A score of 7 out
of 22 is 32 percent, even better than the 25 percent
expected.)
 The algorithm does not come close to solving the
cryptogram, but it reduces the 2619 possibilities for the
analyst to consider.
 Giving this much help to the cryptanalyst is significant.
Network & Information
Security Prof. Shawkat K. Guirguis 13
Dual-Message Entrapment
 We can encipher two messages at once so that
an interceptor cannot distinguish between the
messages.
 One message is the real message, and another
is a realistic-looking spurious message, called
the dummy.
 Assume that the sender and receiver both
know the dummy message. The dummy is then
used as a key.
 The cryptanalyst may deduce both key
(dummy) and plaintext messages, but nobody
can tell from the messages which is which.
Network & Information
Security Prof. Shawkat K. Guirguis 14
Dual Message Entrapment
 Consider the following two messages:
 disregard this message
 this message is crucial
 Both have the same length
 If one serves as the key for the other the
same ciphertext will be generated and a
successfully decrypted message still has a
50% chance of being the wrong message
Network & Information
Security Prof. Shawkat K. Guirguis 15
Example on dual-message
 This occurs because the encryption of letter x with
key y is the same as the encryption of letter y with
key letter x. For instance, the message and key
Key (dummy) disregardthismessage
Message THISMESSAGEISCRUCIAL
can be interchanged!
The encryption of either the key or message with the
other as the key is:
wpajqejvdzlqkovvmulgp
 Thus, the key cannot be distinguished from the
message.
Network & Information
Security Prof. Shawkat K. Guirguis 16
Summary of Substitutions
 Substitutions are effective cryptographic devices.
 In fact, they were the basis of many cryptographic
algorithms used for diplomatic communication through
the first half of this century.
 The presentation of substitution ciphers has also
introduced several cryptanalytic tools:
1. frequency distribution
2. index of coincidence
3. consideration of highly likely letters and probable
words
4. repeated pattern analysis and the Kasiski approach
5. persistence, organization, ingenuity, and luck

More Related Content

Similar to Part4_Long_Sequence_and_dual_message.pdf

Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Saif Kassim
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptJohnree4
 
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...Emeka Ikpeazu
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsjohnhwoodsslideshare
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptxMahmoodTareq3
 
The tyranny of averages
The tyranny of averagesThe tyranny of averages
The tyranny of averagesPVS-Studio
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
 
2 Unit 1. Traditional Symmetric Ciphers.pdf
2 Unit 1. Traditional Symmetric Ciphers.pdf2 Unit 1. Traditional Symmetric Ciphers.pdf
2 Unit 1. Traditional Symmetric Ciphers.pdfNandiniLokanath1
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...SrideviM4
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Basic review on topic modeling
Basic review on  topic modelingBasic review on  topic modeling
Basic review on topic modelingHiroyuki Kuromiya
 
Understanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding theUnderstanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding thecorbing9ttj
 

Similar to Part4_Long_Sequence_and_dual_message.pdf (20)

Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Unit i
Unit iUnit i
Unit i
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...
Numerical Cryptography as a More Efficient Method of Data Disclosure and Acce...
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
Informationtoinformation///Security.pptx
Informationtoinformation///Security.pptxInformationtoinformation///Security.pptx
Informationtoinformation///Security.pptx
 
The tyranny of averages
The tyranny of averagesThe tyranny of averages
The tyranny of averages
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 
Ch02
Ch02Ch02
Ch02
 
2 Unit 1. Traditional Symmetric Ciphers.pdf
2 Unit 1. Traditional Symmetric Ciphers.pdf2 Unit 1. Traditional Symmetric Ciphers.pdf
2 Unit 1. Traditional Symmetric Ciphers.pdf
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Basic review on topic modeling
Basic review on  topic modelingBasic review on  topic modeling
Basic review on topic modeling
 
Understanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding theUnderstanding the History of EncryptionUnderstanding the
Understanding the History of EncryptionUnderstanding the
 
C017261823
C017261823C017261823
C017261823
 

More from MohamedAli17961

Introduction - Lec. 1.pdf
Introduction - Lec. 1.pdfIntroduction - Lec. 1.pdf
Introduction - Lec. 1.pdfMohamedAli17961
 
Research Fundamentals_ lecture2.pdf
Research Fundamentals_ lecture2.pdfResearch Fundamentals_ lecture2.pdf
Research Fundamentals_ lecture2.pdfMohamedAli17961
 
Lec 3 - Research Problem.pdf
Lec 3 - Research Problem.pdfLec 3 - Research Problem.pdf
Lec 3 - Research Problem.pdfMohamedAli17961
 
Literature Survey-Lect. 4.pdf
Literature Survey-Lect. 4.pdfLiterature Survey-Lect. 4.pdf
Literature Survey-Lect. 4.pdfMohamedAli17961
 
Lec 6 - Data Collection.pdf
Lec 6 - Data Collection.pdfLec 6 - Data Collection.pdf
Lec 6 - Data Collection.pdfMohamedAli17961
 

More from MohamedAli17961 (6)

Introduction - Lec. 1.pdf
Introduction - Lec. 1.pdfIntroduction - Lec. 1.pdf
Introduction - Lec. 1.pdf
 
Research Fundamentals_ lecture2.pdf
Research Fundamentals_ lecture2.pdfResearch Fundamentals_ lecture2.pdf
Research Fundamentals_ lecture2.pdf
 
Lec 3 - Research Problem.pdf
Lec 3 - Research Problem.pdfLec 3 - Research Problem.pdf
Lec 3 - Research Problem.pdf
 
Lec 5 - Hypotheses.pdf
Lec 5 - Hypotheses.pdfLec 5 - Hypotheses.pdf
Lec 5 - Hypotheses.pdf
 
Literature Survey-Lect. 4.pdf
Literature Survey-Lect. 4.pdfLiterature Survey-Lect. 4.pdf
Literature Survey-Lect. 4.pdf
 
Lec 6 - Data Collection.pdf
Lec 6 - Data Collection.pdfLec 6 - Data Collection.pdf
Lec 6 - Data Collection.pdf
 

Recently uploaded

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Creating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsCreating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsNurulAfiqah307317
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and ClassificationsAreesha Ahmad
 

Recently uploaded (20)

Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Creating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening DesignsCreating and Analyzing Definitive Screening Designs
Creating and Analyzing Definitive Screening Designs
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 

Part4_Long_Sequence_and_dual_message.pdf

  • 1. Network & Information Security Prof. Shawkat K. Guirguis 1 Network & Information Security Shawkat K. Guirguis Professor of Computer Science & Informatics
  • 2. Other sources of random numbers: Network & Information Security Prof. Shawkat K. Guirguis 2
  • 3. Network & Information Security Prof. Shawkat K. Guirguis 3 Long Sequences from Books  Another source of supposedly "random" numbers is any book, piece of music, or other object of which the structure can be analyzed.  A possible one-time pad is a telephone book.  The sender and the receiver both need access to identical telephone books.  They might agree, for example, to start at page 35, and use two middle digits (ddd-DDdd) of each phone number, mod 26 as a key letter for a polyalphabetic substitution cipher using a preagreed form of Vigenere tableau.  This approach would not provide an unlimited number of key digits, but it might last for a year until a new telephone book became available.
  • 4. Network & Information Security Prof. Shawkat K. Guirguis 4 Long Sequences from Books (cont.)  A similar idea is the use of any book of prose as a key.  Then, the key is the letters of the text, in order.  For example, one might select a passage from Descarte's meditation: "What of thinking? I am, I exist, that is certain."  The meditation goes on for a great length, certainly long enough to encipher many very long messages.  If you wanted to encipher the message MACHINES CANNOT THINK you would write the message under enough of the key, and encode the message, again as with a conventional poly alphabetic cipher.  iamie xistt hatis cert  MACHI NESCA NNOTT HINK
  • 5. Network & Information Security Prof. Shawkat K. Guirguis 5 Long Sequences from Books (cont.)  It would seem as if this cipher, too, would be impossible to break.  Unfortunately, that is not true.  The flaw lies in the fact that neither the message nor the key text is evenly distributed and, in fact, the distributions of both cluster around high-frequency letters.  For example, the four letters A, E, O, and T account for approximately 40 percent of all letters used in standard English text.
  • 6. Network & Information Security Prof. Shawkat K. Guirguis 6 Long Sequences from Books (cont.)  Each ciphertext letter is really the intersection of a plaintext letter and a key letter.  But if the probability of the plaintext or the key letter's being A, E, O, or T is 0.4, the probability of both being one of the four is: 0.4 * 0.4 = 0.16, nearly 1/6.  The top six letters, adding N and I, increases the sum of the frequencies to 50 percent and increases the probability for a pair to 0.25.
  • 7. Network & Information Security Prof. Shawkat K. Guirguis 7 Long Sequences from Books (cont.)  Assuming a standard Vigenere tableau has been used, given a piece of ciphertext, we look for frequent letter pairs that could have generated each ciphertext letter.  The encrypted version of the message MACHINES CANNOT THINK is uaopm kmkvt unhbl jmed  To break the cipher, assume that each letter of the ciphertext comes from a situation in which the plaintext letter (row selector) and the key letter (column selector) are both one of the six most frequent letters.  (This guess will be correct approximately 25 percent of the time.)
  • 8. Network & Information Security Prof. Shawkat K. Guirguis 8 Long Sequences from Books (cont.)  The trick is to work the cipher inside out.  For a ciphertext letter, look in the body of the table for the letter to appear at the intersection of one of the six rows with one of the six columns.  Find combinations in the Vigenere tableau that could yield each ciphertext letter as the result of two high-frequency letters.  The ciphertext u in this message could be in row A, column u, but that is not a pair of frequent letters, or it could be row B, column t, but that is not a common pair, nor is Cs, Dr, Eq, Fp, or any other pair.  Thus, we cannot say much about the plaintext letter that produced u.
  • 9. Network & Information Security Prof. Shawkat K. Guirguis 9 Long Sequences from Books (cont.)  The second letter, a, could come from row A, column a, but that is the only plaintext-key text combination of the letters A, E, O, T, N, I that can produce an a.  The likelihood is 0.25 that a represents A.  It will help to build a reduced table of the six frequent letter rows and columns.
  • 10. Network & Information Security Prof. Shawkat K. Guirguis 10 Reduced table of the six frequent letters a e i n o t A a e i n o t E e l m r s x I i m r w x c N n r w b c h O o s x c d l T t x b g h m This table is more useful "inside out": a could represent A, b could stand for N or T, and so on.
  • 11. Network & Information Security Prof. Shawkat K. Guirguis 11 Working inside out Searching through this table for possibilities, we transform the cryptogram. u a o p m k m k v t u n h b l j m e d ? A A ? E ? E ? ? A ? A N N ? ? E A ? O I I T N T T I E T T T
  • 12. Network & Information Security Prof. Shawkat K. Guirguis 12 Comment  This technique does not reveal the entire message, or even enough of it to make the message MACHI NESCA NNOTT HINK easy to identify.  The technique did, however, make predictions in 10 letter positions, and there was a correct prediction in 7 of those 10 positions. (The correct predictions are shown in bold type.)  The algorithm made 22 assertions about probable letters, and 7 of those 22 were correct. (A score of 7 out of 22 is 32 percent, even better than the 25 percent expected.)  The algorithm does not come close to solving the cryptogram, but it reduces the 2619 possibilities for the analyst to consider.  Giving this much help to the cryptanalyst is significant.
  • 13. Network & Information Security Prof. Shawkat K. Guirguis 13 Dual-Message Entrapment  We can encipher two messages at once so that an interceptor cannot distinguish between the messages.  One message is the real message, and another is a realistic-looking spurious message, called the dummy.  Assume that the sender and receiver both know the dummy message. The dummy is then used as a key.  The cryptanalyst may deduce both key (dummy) and plaintext messages, but nobody can tell from the messages which is which.
  • 14. Network & Information Security Prof. Shawkat K. Guirguis 14 Dual Message Entrapment  Consider the following two messages:  disregard this message  this message is crucial  Both have the same length  If one serves as the key for the other the same ciphertext will be generated and a successfully decrypted message still has a 50% chance of being the wrong message
  • 15. Network & Information Security Prof. Shawkat K. Guirguis 15 Example on dual-message  This occurs because the encryption of letter x with key y is the same as the encryption of letter y with key letter x. For instance, the message and key Key (dummy) disregardthismessage Message THISMESSAGEISCRUCIAL can be interchanged! The encryption of either the key or message with the other as the key is: wpajqejvdzlqkovvmulgp  Thus, the key cannot be distinguished from the message.
  • 16. Network & Information Security Prof. Shawkat K. Guirguis 16 Summary of Substitutions  Substitutions are effective cryptographic devices.  In fact, they were the basis of many cryptographic algorithms used for diplomatic communication through the first half of this century.  The presentation of substitution ciphers has also introduced several cryptanalytic tools: 1. frequency distribution 2. index of coincidence 3. consideration of highly likely letters and probable words 4. repeated pattern analysis and the Kasiski approach 5. persistence, organization, ingenuity, and luck