SlideShare a Scribd company logo
1 of 9
Understanding the History of Encryption
Understanding the History of Encryption
Few facts -
Encryption has been around for a very long time. Instead of
explaining the History of Cryptography, I am going to
recommend a very good book by David Khan called "The Code
Breakers" , published in 1996.
Instead of starting with early encryption algorithm, I am going
to used two interesting encryption algorithms that will capture
manu of the concepts that Khan outline in his book. The first
algorithm is Character Substitution. Remember, the problem we
are trying to solve is "how do we secure communications?". An
example is - Suppose Alice and Bob wants to communicate
securely using Eve is an attacker that wants to eavesdrop on the
conversation. In order to communicate securely, Alice and Bob
are going to share a secret key, which we are going to call K.
Eve does not know anything about the key K.
Alice, Bob and even Eve know the algorithm (say character
substitution). We all have played the substitution game in
School. A is map to C and B is map to X and C is map to W
and so on and so forth. So, if EVE gets the mapping and the
ciphered text, she will be able to decipher the secret. Let
supposed Eve gets the ciphered text but not the mapping (key).
It will be difficult to figure the key out.
Assuming we have 26 letters, how many possibilities are there -
-> guess?
1. 26
2. 26X26
3. 26! (factorial)
4. 2^26
The answer is 26! which is about 2^88 if I remember correctly,
which is a very large sample space. I hope you understand
where I got the 26!. Think of one mapping and now think of
another mapping and so on.
What is factorial? 1! = 1, 2! = 1X2 = 2, 3! = 1X2X3 = 6 and so
on.
When I said 2^88, it is a good key since it is using 88 bits. Note
that I am not saying it is great.
What I want you to do is to think about how you would break a
substitution cipher? It is not hard but it needs some
imagination.
The Substitution Cipher and How to break the Cipher
Breaking The Substitution Cipher
One way to break a substitution cipher is to use frequency
analysis. Let's focus on the English language for now but the
process works the same way for other languages. The character
"e" occurs 12.7% in the Eglish language and the letter "t"
occurs 9.35% and the letter "a" is 8.2% of the time. So, you can
count each character in the ciphered text, compute its frequency
and start replacing it. After you complete the first say 4
characters, you may want to change your strategy. Can you
explain why you want to stop after the first 4 characters? The
two-character "of" is about 4.16% and "to" is about 2%. Now
try three characters frequency.
After a period of time, you will be able to decipher most of the
text. I am going to ask you to do your first significant
homework using frequency analysis.
One possibility for the substitution cipher:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
↕
V
J
Z
B
G
N
F
E
P
L
I
T
M
X
D
W
K
Q
U
C
R
Y
A
H
S
O
Note that we can have 25 factorial of these possibilities
(remember 2^88 - 28-bit key)
Here is your homework - A character sub was used. Can you
decipher as much of this text as you can? Submit your results in
the drop box below (Frequency Analysis). You may use Python
to code the solution.
ztrfqvdjrzqt
rci wzyabi wdmwrzrdrzqt jzacif zw g jzacif rcgr cgw miit zt dwi
hqf ygtx cdtvfivw qh xigfw (gt iojibbitr czwrqfx zw lzsit zt
wzyqt wztlcw 'rci jqvi mqqk'). zr mgwzjgbbx jqtwzwrw qh
wdmwrzrdrztl isifx abgztrior jcgfgjrif hqf g vzhhifitr jzacifrior
jcgfgjrif. zr vzhhifw hfqy rci jgiwgf jzacif zt rcgr rci jzacif
gbacgmir zw tqr wzyabx rci gbacgmir wczhriv, zr zw jqyabiribx
udymbiv.
rci wzyabi wdmwrzrdrzqt jzacif qhhifw sifx bzrrbi jqyydtzjgrzqt
wijdfzrx, gtv zr pzbb mi wcqpt rcgr zr jgt mi igwzbx mfqkit isit
mx cgtv, iwaijzgbbx gw rci yiwwgliw mijqyi bqtlif (yqfi rcgt
wisifgb cdtvfiv jzacifrior jcgfgjrifw).
Understanding Vignere
Vignere Cipher
Our follow on topic is Vignere Cipher which is an interesting
algorithm developed by French Cryptographer Vignere. I will
post more about the Vignere Cipher tomorrow and ways to hack
the Vigenere cipher.
(You will run into different spelling of Vignere)
Vignere Cipher is a primitive Cipher and is not practical for the
computing today but it uses an interesting substitution. There is
something called Vignere table:
The Vignere cipher requires a key of fixed length. For our
example we are going to use the word CRYPTO. Please do not
worry about upper case and lower case.
The clear text we are going to encrypt is:
IT IS A GREAT DAY AT MARYMOUNT
What we do next is to paste the key below the clear text with all
spaces removed.
ITISAGREATDAYATMARYMOUNT <--------------- Clear Text
CRYPTO
CRYPTOCRYPTOCRYPT <-------------- Key
To encrypt the letter "I" in the message, you would look at row
"I" and column "C" - the "C" in CRYPTO since they lined up.
The result is "K". Next, we move to the next character, which is
a "T" for the row and an column "R". I will let you complete the
rest.
ITISAGREATDAYATMARYMOUNT <--------------- Clear Text
CRYPTO
CRYPTOCRYPTOCRYPT <-------------- Key
KK <--------------
CIPHERED TEXT
Assume you know the length of the key, how would you break
this encryption? Think about this question and come up with
ideas and we'll use next week discussion to post your findings

More Related Content

Similar to Understanding the History of EncryptionUnderstanding the

M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.pptutsavkakkad1
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101 Andy Fisher
 
perl 6 hands-on tutorial
perl 6 hands-on tutorialperl 6 hands-on tutorial
perl 6 hands-on tutorialmustafa sarac
 
Generating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksGenerating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksJonathan Mugan
 
writing self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniqueswriting self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniquesRussell Sanford
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques parves kamal
 
Erlang Concurrency
Erlang ConcurrencyErlang Concurrency
Erlang ConcurrencyBarry Ezell
 
Counting (Notes)
Counting (Notes)Counting (Notes)
Counting (Notes)roshmat
 
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...Codemotion
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 
crypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfcrypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfMajidMumtaz3
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptxRavikumarVadana
 

Similar to Understanding the History of EncryptionUnderstanding the (20)

Crypto
CryptoCrypto
Crypto
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
classicalencryptiontechniques.ppt
classicalencryptiontechniques.pptclassicalencryptiontechniques.ppt
classicalencryptiontechniques.ppt
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
HackIM 2012 CTF Walkthrough
HackIM 2012 CTF WalkthroughHackIM 2012 CTF Walkthrough
HackIM 2012 CTF Walkthrough
 
perl 6 hands-on tutorial
perl 6 hands-on tutorialperl 6 hands-on tutorial
perl 6 hands-on tutorial
 
Generating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksGenerating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural Networks
 
writing self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniqueswriting self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniques
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Classical crypto techniques
Classical crypto techniques Classical crypto techniques
Classical crypto techniques
 
Erlang Concurrency
Erlang ConcurrencyErlang Concurrency
Erlang Concurrency
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Counting (Notes)
Counting (Notes)Counting (Notes)
Counting (Notes)
 
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
Amanda Sopkin - Computational Randomness: Creating Chaos in an Ordered Machin...
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
CH4__crypto.pptx
CH4__crypto.pptxCH4__crypto.pptx
CH4__crypto.pptx
 
defense
defensedefense
defense
 
crypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdfcrypto_graphy_PPTs.pdf
crypto_graphy_PPTs.pdf
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptxCyber Security Part-2.pptx
Cyber Security Part-2.pptx
 

More from corbing9ttj

1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docxcorbing9ttj
 
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docxcorbing9ttj
 
1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docxcorbing9ttj
 
1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docxcorbing9ttj
 
1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docxcorbing9ttj
 
1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docx1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docxcorbing9ttj
 
1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docxcorbing9ttj
 
1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docxcorbing9ttj
 
1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docxcorbing9ttj
 
1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docxcorbing9ttj
 
1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docx1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docxcorbing9ttj
 
1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docxcorbing9ttj
 
1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docx1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docxcorbing9ttj
 
1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docxcorbing9ttj
 
1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docx1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docxcorbing9ttj
 
1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docx1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docxcorbing9ttj
 
1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docx1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docxcorbing9ttj
 
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docxcorbing9ttj
 
1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docx1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docxcorbing9ttj
 
1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docx1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docxcorbing9ttj
 

More from corbing9ttj (20)

1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx
 
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
 
1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx
 
1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx
 
1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx
 
1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docx1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docx
 
1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx
 
1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx
 
1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx
 
1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx
 
1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docx1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docx
 
1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx
 
1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docx1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docx
 
1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx
 
1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docx1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docx
 
1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docx1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docx
 
1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docx1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docx
 
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
 
1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docx1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docx
 
1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docx1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docx
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Understanding the History of EncryptionUnderstanding the

  • 1. Understanding the History of Encryption Understanding the History of Encryption Few facts - Encryption has been around for a very long time. Instead of explaining the History of Cryptography, I am going to recommend a very good book by David Khan called "The Code Breakers" , published in 1996. Instead of starting with early encryption algorithm, I am going to used two interesting encryption algorithms that will capture manu of the concepts that Khan outline in his book. The first algorithm is Character Substitution. Remember, the problem we are trying to solve is "how do we secure communications?". An example is - Suppose Alice and Bob wants to communicate securely using Eve is an attacker that wants to eavesdrop on the conversation. In order to communicate securely, Alice and Bob are going to share a secret key, which we are going to call K. Eve does not know anything about the key K. Alice, Bob and even Eve know the algorithm (say character substitution). We all have played the substitution game in School. A is map to C and B is map to X and C is map to W and so on and so forth. So, if EVE gets the mapping and the ciphered text, she will be able to decipher the secret. Let supposed Eve gets the ciphered text but not the mapping (key). It will be difficult to figure the key out. Assuming we have 26 letters, how many possibilities are there -
  • 2. -> guess? 1. 26 2. 26X26 3. 26! (factorial) 4. 2^26 The answer is 26! which is about 2^88 if I remember correctly, which is a very large sample space. I hope you understand where I got the 26!. Think of one mapping and now think of another mapping and so on. What is factorial? 1! = 1, 2! = 1X2 = 2, 3! = 1X2X3 = 6 and so on. When I said 2^88, it is a good key since it is using 88 bits. Note that I am not saying it is great. What I want you to do is to think about how you would break a substitution cipher? It is not hard but it needs some imagination. The Substitution Cipher and How to break the Cipher Breaking The Substitution Cipher One way to break a substitution cipher is to use frequency analysis. Let's focus on the English language for now but the process works the same way for other languages. The character "e" occurs 12.7% in the Eglish language and the letter "t" occurs 9.35% and the letter "a" is 8.2% of the time. So, you can count each character in the ciphered text, compute its frequency
  • 3. and start replacing it. After you complete the first say 4 characters, you may want to change your strategy. Can you explain why you want to stop after the first 4 characters? The two-character "of" is about 4.16% and "to" is about 2%. Now try three characters frequency. After a period of time, you will be able to decipher most of the text. I am going to ask you to do your first significant homework using frequency analysis. One possibility for the substitution cipher: A B C D E F G H I J K L
  • 7. D W K Q U C R Y A H S O Note that we can have 25 factorial of these possibilities (remember 2^88 - 28-bit key) Here is your homework - A character sub was used. Can you decipher as much of this text as you can? Submit your results in the drop box below (Frequency Analysis). You may use Python to code the solution. ztrfqvdjrzqt rci wzyabi wdmwrzrdrzqt jzacif zw g jzacif rcgr cgw miit zt dwi hqf ygtx cdtvfivw qh xigfw (gt iojibbitr czwrqfx zw lzsit zt
  • 8. wzyqt wztlcw 'rci jqvi mqqk'). zr mgwzjgbbx jqtwzwrw qh wdmwrzrdrztl isifx abgztrior jcgfgjrif hqf g vzhhifitr jzacifrior jcgfgjrif. zr vzhhifw hfqy rci jgiwgf jzacif zt rcgr rci jzacif gbacgmir zw tqr wzyabx rci gbacgmir wczhriv, zr zw jqyabiribx udymbiv. rci wzyabi wdmwrzrdrzqt jzacif qhhifw sifx bzrrbi jqyydtzjgrzqt wijdfzrx, gtv zr pzbb mi wcqpt rcgr zr jgt mi igwzbx mfqkit isit mx cgtv, iwaijzgbbx gw rci yiwwgliw mijqyi bqtlif (yqfi rcgt wisifgb cdtvfiv jzacifrior jcgfgjrifw). Understanding Vignere Vignere Cipher Our follow on topic is Vignere Cipher which is an interesting algorithm developed by French Cryptographer Vignere. I will post more about the Vignere Cipher tomorrow and ways to hack the Vigenere cipher. (You will run into different spelling of Vignere) Vignere Cipher is a primitive Cipher and is not practical for the computing today but it uses an interesting substitution. There is something called Vignere table: The Vignere cipher requires a key of fixed length. For our example we are going to use the word CRYPTO. Please do not worry about upper case and lower case. The clear text we are going to encrypt is:
  • 9. IT IS A GREAT DAY AT MARYMOUNT What we do next is to paste the key below the clear text with all spaces removed. ITISAGREATDAYATMARYMOUNT <--------------- Clear Text CRYPTO CRYPTOCRYPTOCRYPT <-------------- Key To encrypt the letter "I" in the message, you would look at row "I" and column "C" - the "C" in CRYPTO since they lined up. The result is "K". Next, we move to the next character, which is a "T" for the row and an column "R". I will let you complete the rest. ITISAGREATDAYATMARYMOUNT <--------------- Clear Text CRYPTO CRYPTOCRYPTOCRYPT <-------------- Key KK <-------------- CIPHERED TEXT Assume you know the length of the key, how would you break this encryption? Think about this question and come up with ideas and we'll use next week discussion to post your findings