Cryptology - Mu Alpha Theta
Download
Report
Transcript Cryptology - Mu Alpha Theta
BASIC CRYPTOLOGY
What is Cryptology?
Cryptology is the umbrella word that represents the
art of enciphering words so as to protect their
original meaning (cryptography) and also
represents the science of breaking these enciphered
codes (cryptanalysis)
Parts of a Cipher
Alphabet Position
The
number of the letter from 1-26 (i.e. A=1
B=2…etc.)
A B C
D E F G H I
0 0 0
1 2 3
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
J
K L
M N O P Q R S T U V W X Y Z
Key
The
operation used to encipher or decipher a code
The Key
Used to change cipher-text to plain-text or vice versa
Always in the form of N=Ax+B
N being the resulting alphabet position number
A being the multiplicative number
B being the additive number
X being the original alphabet position
Example: N=3x+2 for letter “b”
N=3(2)+2
N=6+2
N=8
“h”
Wraparound
Wraparound is the term used to define the act of
restarting a series when the end is reached
e.g. Assigning 4 blocks 3 different colors in order; the colors
being red, green, and blue.
Block 1-red, Block 2-green, Block 3-blue, Block 4-red
Wraparound caused the sequence of colors to restart in order to
complete the task
In cryptology, wraparound is used when N>26
e.g. N=6(3)+10
N=28
28-26=2
“b”
The Modulus Function
The denotation of the “wraparound formula” is
donated by the inclusion of a “mod”
From
the previous example:
28-26=2
28mod26=2
The modulus function also works in multiples
54mod26
also equals 2
54-26=28
28-26=2
Types of Basic Cryptography
Additive
Cipher
involving the shift of letters by a set number of
places
Multiplicative
Cipher
involving the multiplication of a letter’s position
by a set amount
Affine
Combination
of multiplicative and additive
Vigenere
Use
of a system of alphabets shifted additively 26
times over (Vigenere Square)
Multiplicative Complications
Occasionally when two numbers are decoded using
a multiplicative cipher, they come out to equal the
same number
To
deter this, only numbers that are relatively prime to
26 may be used
1,
3, 5, 7, 9, 11, 15, 17, 19, 21, 23, 25
Vigenere Square
Cryptanalysis
The most important part of Cryptanalysis is the
Frequency Table
When a message is enciphered, every letter
corresponds to a plain-text letter, so the frequency
should be the same
Ergo, the frequency for an enciphered ‘e’ will be the same
as the plain-text ‘e’ in the original message
Generally, an enciphered message is placed into blocks
of 4 or 5 letters, making it harder for the cryptanalyst
to decode the message
English Alphabet Frequency Table
Letter Relative Frequency
E
11.1607%
M
3.0129%
A
8.4966%
H
3.0034%
R
7.5809%
G
2.4705%
I
7.5448%
B
2.0720%
O
7.1635%
F
1.8121%
T
6.9509%
Y
1.7779%
N
6.6544%
W
1.2899%
S
5.7351%
K
1.1016%
L
5.4893%
V
1.0074%
C
4.5388%
X
0.2902%
U
3.6308%
Z
0.2722%
D
3.3844%
J
0.1965%
P
3.1671%
Q
0.1962%
Additive Cipher
ROLKY HAZGC GRQOT MYNGJ UCGVU UXVRG
EKXZN GZYZX AZYGT JLXKZ
YNOYN UAXAV UTZNK YZGMK GTJZN KTOYN
KGXJT USUXK OZOYG ZGRKZ
URJHE GTOJO UZLAR RULYU ATJGT JLAXE YOMTO
LEOTM TUZNO TMGHI
Frequency Table
7- A
0 -B
2- C
0- D
4- E
0 -F
15- G
3- H
1- I
8- J
9- K
6- L
5- M
8- N
12- O
0- P
1- Q
7- R
1- S
13- T
12- U
3- V
0- W
8- X
11- Y
14- Z
G to E
PMJIW FYXEA EPOMR KWLEH SAETS SVTPE CIVXL
EXWXV YXWER HJVIX
WLMWL SYVYT SRXLI WXEKI ERHXL IRMWL IEVHR
SQSVI MXMWE XEPIX
SPHFC ERMHM SXJYP PSJWS YRHER HJYVC
WMKRM JCMRK RSXLM RKEFG
G to A
LIFES BUTAW ALKIN GSHAD OWAPO ORPLA
YERTH ATSTR UTSAN DFRET SHISH OURUP ONTHE
STAGE ANDTH ENISH EARDN OMORE ITISA TALET
OLDBY ANIDI OTFUL LOFSO UNDAN DFURY SIGNI
FYING NOTHI NGABC
Text Manipulated
LIFE'S BUT A WALKING SHADOW, A POOR PLAYER
THAT STRUTS AND FRETS HIS HOUR UPON THE
STAGE AND THEN IS HEARD NO MORE: IT IS A
TALE TOLD BY AN IDIOT, FULL OF SOUND AND
FURY, SIGNIFYING NOTHING.
References
Cryptology. (n.d.). Retrieved September 24, 2009, from
http://www.resonancepub.com/homecrypto.htm
Knight, J. (2004). Cryptology, History. Retrieved September 24, 2009, from
http://www.encyclopedia.com/doc/1G2-3403300200.html
Lewand, R. E. (2000). Cryptological Mathematics (Classroom Resource Materials).
Washington: The Mathematical Association Of America.
Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to
Quantum Cryptography. New York: Anchor.
Waggener, J. (1998, June 11). CRYPTOGRAPHY. Retrieved September 24, 2009,
from
http://jwilson.coe.uga.edu/emt668/EMT668.Folders.F97/Waggener/Units/Crypto
graphy/cryptography.htm