
































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Webcrypt is a software tool created for the purpose of learning about cryptanalysis of classical ciphers. It includes modules for substitution, affine, vigenère, hill, and enigma ciphers. Users can encrypt messages and analyze the results using various cryptanalysis tools such as frequency analysis, digrams, trigrams, quadragrams, and the friedman test. The document also covers attack models and examples of cracking substitution, vigenère, hill, and enigma ciphers.
Typology: Slides
1 / 40
This page cannot be seen from the preview
Don't miss anything!
2
4
5
3_traderjoe
hog_az_by_cx_dw_ev
∗ 26
19 3 9 17 4 14 0 17 4
7
known ciphertext: Eve only sees ciphertexts
known plaintext: Eve knows a limited number of ciphertext-plaintext pairs
chosen plaintext: Eve tricks Alice into encrypting a limited number plaintexts of Eve’s choice
chosen ciphertext: Eve tricks Bob into decrypting a limited number ciphertexts that has created
8
Will describe how to crack
Substitution and Vigenere with known ciphertext attacks
Hill and Enigma with known plaintext attacks
Affine is a special case of Substitution
Ciphertext examples used located at: ~zeph/4261/studentdirs/assignments/zeph/
10
Compare frequencies expected (from analysis of entire Moby Dick) with frequencies found in ciphertext. List from most common to least. e, t, a occur each more than 8%. O thru H all near 7% hard to distinguish. N,B,S similar. Guess {e,t,a} → {N,B,S} as unordered sets expected ACTUAL e N t B a S o E n K i Q s T h F r P l A
11
Reasonable to expect mapping between most frequent letters: e→N. Confirmed by looking at top two digraphs. Assume: (e,t,h)→(N,S,E) (as ordered tuples). Next: “BJ” at 2.4% stands above crowd, similar to “in” at 2.1%. Guess (i,n)→(B,J). expected ACTUAL t h S E h e E N in BJ er EB an JL
13
Summarize with transformation tables: plain a b c d e f g h i j k l m n o p q r s t u v w x y z CIPHER (^) T N L E B J Q S CIPHER (^) A B C D E F G H I J K L M N O P Q R S T U V WX Y Z plain i h n g e s t a
14
Assuming moderate sized keyword implies that after keyword:
cipher-alphabet monotonic
cipher letter ≤ plain letter
many simple sequences
cipher letter = plain letter rest equal plain a b c d e f g h i j k l m n o p q r s t u v w x y z CIPHER (^) T N L E B J Q S plain a b c d e f g h i j k l m n o p q r s t u v w x y z CIPHER (^) T N L E B J K M O P Q S U V W (^) X Y Z
16
Lines 6-
partial decrypt: XVING HISWH OXESP INXXE XXOXY SOTHA TWHEN HISVA STWRI NXXEX XOREH EAXRO SESOX ETWEN TYORX OREXE ETOUT OXTHE WATER THENO WRISI NGSWE XXSWI THAXX THEIR XONXX UENTW AVESX AZZXI NGXYX ROXEA GAINS TITVI NXIXT IVEXY TOSSI NGTHE IRSHI VEREX SPRAY
cipher text: FVBJL EBQWE KFNQM BJAFN ARKAY QKSET SWENJ EBQVT QSWPB JDFNA GKPNE NTAPK QNQKH NSWNJ SYKPH KPNGN NSKUS KGSEN WTSNP SENJK WPBQB JLQWN FFQWB SETFF SENBP IKJGF UNJSW TVNQA TZZFB JLFYR PKDNT LTBJQ SBSVB JABIS BVNFY SKQQB JLSEN BPQEB VNPNA QMPTY
(c,d,l) →(I,A,F)
17
Summarize with transformation tables: Can now guess keyword... plain a b c d e f g h i j k l m n o p q r s t u v w x y z CIPHER (^) T R I A N L E B C D F J K M O P Q S U V W (^) X Y Z CIPHER (^) A B C D E F G H I J K L M N O P Q R S T U V W (^) X Y Z plain d i j k h l c n o g p e q r s b t a u v w x y z
19
the blue whale is the biggest creature
the blu ewh ale ist heb
= -6496 not invertible mod 26
Try another matrix: = -3317. Mod 26 11.
det 19 1 0 7 1111 5 20 4 det 19 1 4 7 1122 5 20 7
20
Corresponding texts:
plain = the blu ewh ale ist
Solution to is
− 1
− 1