23
CRYPTOGRAPHY Lecture 2

CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

CRYPTOGRAPHY

Lecture 2

Page 2: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Course structure

• Format: Part lecture, part group activities

• HW: – Daily assignments, some in-class and some

take home. Keep these in a portfolio.– One 7-10 page essay on a related topic of

your choice. Final project and presentation (you propose the topic and format)

– Final grade will be determined by portfolio of work including the above.

Page 3: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Expectations

• Most work should be typed. Even work done in class should (usually) be typed and added to portfolio.

• Attendance is mandatory.• Respectful behavior to your peers.• Your day is devoted to this class.

Page 4: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

General Rules

• When decrypting or deciphering, all tools are fair. You may do anything legal to obtain the information you want.

• However, you must disclose the methods you used. In unusual cases, you can keep some technique secret from your peers, with my approval, for a limited amount of time.

Page 5: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Cryptography

The aim is to hide the meaning of the message rather than its presence. This can be done by scrambling the letters around.

Page 6: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition CiphersMake an anagram according to a straightforward system (404 BCE):The sender winds a piece of cloth or leather on the scytale and writes the message along the length of the scytale. Then unwinds the strip, which now appears to carry a list of meaningless letters. The messenger would take the leather strip (sometime wearing it as a belt) and when he arrives at his destination, the receiver winds the strip back on a scytale of the same diameter.

Page 7: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition Ciphers

Rail fence transposition:

Round and round the mulberry bush the monkey chased the weasel

r u d n r u d h m l e r b s t e o k y h s d h w a e o n a d o n t e u b r y u h h m n e c a e t e e s l

Becomes:rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmnecaeteesl

Page 8: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Simple Transposition• Simple Columnar Transposition• The key information is the number k of

columns.• Encipherment: Plaintext is written in lines kletters wide and then transcribed column bycolumn left to right to produce ciphertext.

This and the next few slides copied from:http://www.rhodes.edu/mathcs/faculty/barr/Math103CUSummer04/TranspositionSlides.pdf

Page 9: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Simple Transposition: example

“April come she willWhen streams are ripe and swelled with rain”

Convert to a transposition cipher using k=10

Page 10: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Simple Transposition: example

1234567890APRILCOMESHEWILLWHENSTREAMSARERIPEANDSWELLEDWITHRAIN

AHSRL IPETI LNRWR PEIIE EDLLA AWCLM NIOWS DTMHA SHEER WRSNE EA

Page 11: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Simple Transposition• Decipherment: If n is the length of the ciphertext,it is

written column by column left to right down in a k ×(n DIV k )rectangular array with a “tail ” of length n MOD k as shown. Transcribing row by row produces plaintext.

M E S S A G E A N D M O R EA N D S T I LL M O R E U NT I L I T E ND S

The message is n=37 letters long. It is set up in k=7 columns. So there are 37 DIV 7 = 5 rows and the tail is37 mod 7 = 2

Page 12: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

HW#2a1. Given the message

NNDATEAOIIOTINHRNNODTHSGAECSUIHEMENIECSTIWORSGAISYNOROINNETGREUNODNUILDSCRCTP

with k=8: Decipher it.

Page 13: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

HW#2a2. Encipher 3 messages with with some value

of k. Now the groups swap messages and are given the value of k. Decipher the messages.

3. Encipher a message with a value of k between 2 and 10 and swap ciphers. Now swap messages, without sharing the value of k. Now decipher the message . . .

Page 14: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition Ciphers

A double transposition offers more security:rudnrudhmlerbsteokyhsdhwaeonadonteubryuhhmnecaeteesl

Becomesunuhlrsekhdwendnebyhmeatelrdrdmebtoyshaoaoturuhncees

Page 15: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Column Transposition

A G A M E M N O N key phrase1 4 2 5 3 6 7 9 8 convert to numbers

ABCDEFGHIJKLMNOPQRSTUVWXYZAEGMNO delete the letters not used

134579 assign them numbers

2 68 according to how they appear

Example from http://hem.passagen.se/tan01/transpo.html

Page 16: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Column Transposition

A G A M E M N O N key phrase1 4 2 5 3 6 7 9 8 convert to numberss e n d a r m o ur e d c a r t o h e a d q u a r t e r s j * * * * * *

The code is then Srer-nddj-aau-eeas-dcq-rra-mtr-uhe-oot

Page 17: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Double Column Transposition

M Y C E N A E key phrase5 7 2 3 6 1 4 convert to numberss r e r n d d j a a u e e a s d c q r r a m t r u h e o o tThe code is then DEREE ACRRU QUDAA OSJSM ONERH RADTT

Page 18: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition Grille

Example from http://hem.passagen.se/tan01/transpo.html

Page 19: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition Grille

We need more machine gun ammunition fast xx

Page 20: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition Grille

Page 21: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Transposition

How do you get back to where you started? Reverse the process.

Page 22: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

Secure transmission

Steganography cryptography

Transposition Substitution

Page 23: CRYPTOGRAPHY Lecture 2. Course structure Format: Part lecture, part group activities HW: – Daily assignments, some in-class and some take home. Keep these

HW #2b

• Use each of the transposition ciphers we talked about today to encode your own messages. Now swap them and (without sharing the key, or even the method of encryption) try to decipher them.

http://math.ucsd.edu/~crypto/java/EARLYCIPHERS/RectTran.htmlDon’t feel bad if you can’t decipher. It is hard, that’s the point!

• Look online for tools to help decipher transposition cipher and use them.