cryptography v/s cryptanalysis by raghuveer mohan hardik barot neethi varun neethi sekar

20
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Upload: sharlene-hart

Post on 01-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

CRYPTOGRAPHYv/s

CRYPTANALYSIS

ByRaghuveer MohanHardik BarotNeethi Varun Neethi Sekar

Page 2: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Topics Covered

• Introduction• Short History• Transposition• Substitution• Frequency Analysis• Vigenere Cipher• Enigma Machine• Conclusion

Page 3: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

INTRODUCTION• Motivation

– Threat of enemy interception– Nations have operated code-making departments

• Ongoing Battle– Code Makers - Make stronger Codes– Code Breakers - Invented more powerful methods for attacking them– In this war, both side have used diverse range of disciplines and technologies

• From mathematics to linguistics,• From information theory to quantum theory.

– In return, code makers and code breakers have enriched these subjects, and their work has accelerated technological development, most notably in the case of the modern computer.

Page 4: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

SHORT HISTORY• AD 800 -1200

– Arab Scholars were enjoying vigorous period of Intellectual Achievement– Europe was at nascent stage struggling with cryptography. – Only European Monasteries were ahead where monks studied bible in search of hidden

messages. – Medieval monks were intrigued by the fact that Old Testaments used Hebrew Cipher

where letter replacement happened as follows.– a=>z b=>y and so on

• AD 1300– First known European book - Included 7 methods to keep messages secret written by

English Franciscan Monk and Polymath Roger Bacon.

Page 5: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Contin…• AD 1400

– Use of Cryptography became extremely wide spread with alchemists and scientists using it to keep their discoveries secret.

– Famous works include Geffrey Chaucer. He replaced plaintext with symbols e.g b with delta sign. But level of security is the same as letter for letter substitution.

• AD 1500 -1600– European Cryptography was burgeoning industry– Science of cryptanalysis was beginning in the west. The First great cryptanalyst was

SORO appointed as Venetion cipher secretary.– Towards the end of sixteenth century French consolidated their code breaking prowess

with the arrival of Francois Viete.– Spain was much more naive compared to their rivals elsewhere in Europe. Their

cryptgraphers were stunned to know that their messages were transparent to French.– Period of transition where crytanalysts had started using frequency analysis whereas

Cryptogaphers relied on monoalphabetic substitution ignorant of the extent to which cryptnalysts like SORO and VIETE were able to read their messages.

Page 6: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Transposition• Transposition

– In transposition the letters of the message are simply re-arranged effectively giving an anagram. Transposition offers high security for the large sentences but if the sender and the receiver do not agree upon a protocol it is going to be difficult even for the receiver to unscramble the message.

– Example 1 - Rail-Fence Algorithm• Plaintext

THY SECRET IS THY PRISONER; IF THOU LET IT GO, THOU ART A PRISONER TO IT• Rail-fence Algorithm

T Y E R T S H P I O E I T O L T T O H U R A R S N R O T H S C E I T Y R S N R F H U E I G T O A T P I O E T I

• CiphertextT Y E R T S H P I O E I T O L T T O H U R A R S N R O T H S C E I T Y R S N R F H U E I

G T O A T P I O E T I• The receiver can recover the message by simply reversing the process.

Page 7: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Substitution

• The next form of cipher is the substitution cipher in which we pair letters of the alphabets at random and than substitute each letter in the originals with it partner.

• Example 1 - Randomly assigned partners– Letters : A D H I K M R S U W Y Z– Partners : V X B G J C Q L N E F P T

– Text : MEET AT MIDNIGHT– Cipher : CUUZ VZ CGXSGYBZ

Page 8: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Caesar Cipher• Example 2 - Caesar’s Cipher

– Caesar used a shift by 3 cipher in which every plain text letter is shifted by 3 letters deep in the alphabet sequence after it. It is possible to substitute by any places in the alphabet sequence.

– Plaintext : veni vidi vici– Cipher text : yhql ylgl ylfl

Page 9: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Cryptographic Process

The above figure has three components :• Plaintext : Normal readable message• Key : Used to convert Plaintext to cipher text and vice versa• Cipher text : Message obtained after applying the key to Plaintext

Page 10: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Frequency Analysis So what is Frequency analysis and how it works?

Here the variation in the frequencies of letters were exploited to break ciphers. Study text to establish the frequency of each letter in the alphabets. Next we examine the cipher text and workout the frequency of each letter. In English e is the most common letter followed by t than a, and so on given in the table. If the most common letter in the cipher text is J than it is likely that the substitute for this is e

and so on

Page 11: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

VIGENERE CIPHERExample:

– Key : K I N G K I N G K I N G K I N G K I N G K I N G – Plain text : T H E S U N A N D T H E M A N I N T H E M O O N– Cipher text : Z P D X V P A Z H S L Z B H L W Z B K M Z N M T

Vigenere Square

Page 12: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Breaking Vigenere• Charles Babbage, the person who came up with a blue print of computer

was able to come up with a method to crack the Vigenere cipher.

• His Observation– Key : K I N G K I N G K I N G K I N G K I N G K I N G – Plain text : T H E S U N A N D T H E M A N I N T H E M O O N– Cipher text : B P R Y E V N T N B U K W I A O X B U K W W B T

Page 13: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

ENIGMA• Most fearsome encryption machine• Components

– Input Keyboard– Scrambler– Output Lamp board– Reflector– Plug board

Page 14: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Enigma Encryption

Page 15: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Contin…

Page 16: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Cracking the ENIGMA1st 2nd 3rd 4th 5th 6th

1st Message L O K R G M2nd MessageM V T X Z E3rd Message J K T M P E4th Message D V Y P Z X

1st LETTER A B C D E F G H I J K L M N O P Q R S T U V W X Y Z4TH LETTER P M R X

1st LETTER A B C D E F G H I J K L M N O P Q R S T U V W X Y Z4TH LETTER F Q H P L W O G B M V R X U Y C Z I T N J E A S D K

Page 17: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Contin…A => F => W => A 3 LinksB => Q => Z => K => V => E => L => R => I => B 9 LinksC => H => G => O => Y => D => P => C 7 LinksJ => M => X => S => T => N => U => J 7 Links

Page 18: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Conclusion

• Throughout history there has been rivalry between code makers and code breakers. Whenever code makers come up with a new form of encryption the code breakers come up with the methods to crack it. The emergence of RSA has shifted the tide on the favor of Cryptographers. Whether Cryptanalysts will be able to break this code remain to be seen.

Page 19: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Bibliograpgy• Simon Singh : The Code Book• http://www.simonsingh.net/The_Code_Book.html• wikipedia.org• cpsc420.clemson.edu

Page 20: CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Thank You