11
Hill Cipher Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher text letters. Each character is assigned a numerical value (a=0,… z=25). 26 mod 3 2 1 33 32 31 23 22 21 13 12 11 3 2 1 P P P K K K K K K K K K C C C P P KK C K P KP C 1 1 26 mod 26 mod

Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Embed Size (px)

Citation preview

Page 1: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Hill CipherHill Cipher

• Developed by the mathematician Lester Hill in 1929.

• The encryption algorithm takes m successive plain text and substitute for them m cipher text letters.

• Each character is assigned a numerical value (a=0,…z=25).

26mod

3

2

1

333231

232221

131211

3

2

1

P

P

P

KKK

KKK

KKK

C

C

C

PPKKCKP

KPC

11 26mod

26mod

Page 2: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Polyalphabetic CiphersPolyalphabetic Ciphers

• Another approach to improving security is to use multiple cipher alphabets

• Called polyalphabetic substitution ciphers • Makes cryptanalysis harder with more alphabets to

guess and flatter frequency distribution • Use a key to select which alphabet is used for each

letter of the message • Use each alphabet in turn • Repeat from start after end of key is reached

2

Page 3: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

One-Time PadOne-Time Pad

• A truly random key as long as the message is used, the cipher will be secure

• Called a One-Time pad

• Is unbreakable since ciphertext bears no statistical relationship to the plaintext

• Since for any plaintext & any ciphertext there exists a key mapping one to other

• Can only use the key once though

3

Page 4: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Continue…Continue…

• Have problem of safe distribution of key

• There is a practical problem making large quantities of random keys.

4

Page 5: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Transposition CiphersTransposition Ciphers

• Now consider classical transposition or permutation ciphers

• These hide the message by rearranging the letter order

• Without altering the actual letters used

• Can recognise these since have the same frequency distribution as the original text

5

Page 6: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Rail-Fence Cipher TechniqueRail-Fence Cipher Technique

• The plain text is written down a sequence of columns and then read off as a sequence of rows.

Example ciphering of “meet me after the party”Example ciphering of “meet me after the party”

Plaintext with Rail-Fence of depth 2:

The encrypted message is

mematrhpryetefeteat

m e m a t r h p r y

e t e f e t e a t -

6

Page 7: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Row Transposition CiphersRow Transposition Ciphers

• A more complex scheme• Write letters of message out in rows over a specified

number of columns• Then reorder the columns according to some key

before reading off the rows

Key: 3 4 2 1 5 6 7Plaintext: a t t a c k p o s t p o n e d u n t i l t w o a m x y zCiphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ

7

Page 8: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Product CiphersProduct Ciphers

• Ciphers using substitutions or transpositions are not secure because of language characteristics

• Hence consider using several ciphers in succession to make harder, but: – two substitutions make a more complex substitution

– two transpositions make more complex transposition

– but a substitution followed by a transposition makes a new much harder cipher

• This is bridge from classical to modern ciphers

8

Page 9: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Rotor MachinesRotor Machines

• Before modern ciphers, rotor machines were most common product cipher

• Were widely used in WW2– German Enigma, Allied Hagelin, Japanese Purple

• Implemented a very complex, varying substitution cipher

• Used a series of cylinders, each giving one substitution, which rotated and changed after each letter was encrypted

• With 3 cylinders have 263=17576 alphabets

9

Page 10: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

Rotor MachinesRotor Machines

10

Page 11: Hill Cipher Developed by the mathematician Lester Hill in 1929. The encryption algorithm takes m successive plain text and substitute for them m cipher

SteganographySteganography

• Steganography, is a term derived from the Greek words steganos, which means covered and graphia which means writing

• An alternative to encryption• Hides existence of message

– using only a subset of letters/words in a longer message marked in some way

– using invisible ink– hiding in LSB in graphic image or sound file

• Has drawbacks– high overhead to hide relatively few info bits

11