EKRJGTU CTG CYGUQOG Can you break the code
EKRJGTU CTG CYGUQOG! Can you break the code?
CIPHERS ARE AWESOME! Can you break the code?
5 Min Task ■ Convert a 5 letter word into Ciphertext using an any key of shift cipher. ■ Pass on to partner to decipher without telling them the key. ■ Use the shift cipher list to help you https: //goo. gl/3 Ah 3 G 8
Brute Force Attack For the name ALICE and a key of 3 the encoded word would be DOLFH. Any Ceaser cipher (regardless of length) can be brute forced in 25 versions of this decoding.
Relative Frequency (Standard)
Relative Frequency (Cypher)
Relative Frequency (transition)
Programmatically… A B C D E F G H I J K L M N 0 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25
Programmatically… A B C D E F G H I J K L M N 0 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25 Letter Number Shift New Position H 7 +16 E 4 +16 L 11 +16 O 14 +16 23 20 27 27 30 Quotient Remainder New Letter X U 27 = 1 ● 26 + 1 30 = 1 ● 26 + 4 1 B 4 E
Weakness and Improvements ■ Number of possible keys is too small. (25) ■ Same shift is applied to each character making it easy for relative frequency analysis. ■ Same shift is likely to be used for each message. ■ Use a key word at the beginning of the shift cipher – BESWAX example. ■ Moving the order of the letters around in a known pattern.
Keyword Shift Example A B C D E F G H I J K L M N B E S W A X C D F G H I J K O P Q R S T U V W X Y Z L M N O P Q R T U V Y Z ■ Select a keyword to use with cipher (BEESWAX) ■ Remove any duplicate characters (BESWAX) ■ Place this at the first in the shift, then fill in unused letters. ■ More possibilities (different words = different order). ■ Letters not shifted by the same number.
Rail Fence Cipher ■ Splits the letters of words into new order, known to both parties (so can be decoded). ■ This_is_scrambled T i h _ s s i s _ r c m a l b d e ■ Ti_ssrmldhsi_cabe ■ Can also be done over more than two lines. ■ Other methods (such as a standard shift cipher or keyword cipher can be used).
One Time Pad Example Plain Text Numierical Value Key Random* Shift Cipher Numerical Remainder Cipher Text A L I C E 1 11 8 2 4 4 11 4 24 25 5 22 12 F W M 26 = 1 ● 26 + 0 29 = 1 ● 26 + 3 0 A ■ Key length is same as plain text length ■ Shift is random (if not chosen by computer) 3 3
One Time Pad ■ Shift does not fall into repetitive pattern. ■ More possibilities for a brute force attack. – Shift Cipher 25 total – One Time Pad 25^5 = 11, 881, 376 (where 5 is length of message) ■ Ciphertext destitution is ‘flat’ or even. ■ https: //youtu. be/Q-XKOPNIDAg? t=3 m 16 s ■ Sharing the pad can be difficult ■ Can only be used once
Vernam Cipher ■ Uses similar process as One Time Pad ■ Converts characters to binary values ■ Random key is converted into binary values ■ Uses e. Xclusive-OR (XOR) to generate cipher text Plaintext ⊕ Key = Ciphertext ⊕ Key = Plaintext
Vernam Cipher
A CIPHER IS… … the method or process used when hiding the meaning of a message.
- Slides: 19