1 / 13

Vigenere cipher

Vigenere cipher. Asad Gondal Ali Haider Mansoor. Presentation Outline. Vigenere cipher. Attacks on Vigenere : Kasisky Test. Towards the Polyalphabetic Substitution Ciphers. Main weaknesses of monoalphabetic substitution ciphers In ciphertext, different letters have different frequency

bharbour
Download Presentation

Vigenere cipher

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vigenere cipher Asad Gondal Ali Haider Mansoor

  2. Presentation Outline • Vigenere cipher. • Attacks on Vigenere : Kasisky Test

  3. Towards the Polyalphabetic Substitution Ciphers • Main weaknesses of monoalphabetic substitution ciphers • In ciphertext, different letters have different frequency • each letter in the ciphertext corresponds to only one letter in the plaintext letter • Idea for a stronger cipher (1460’s by Alberti) • Use more than one cipher alphabet, and switch between them when encrypting different letters • As result, frequencies of letters in ciphertext are similar • Developed into a practical cipher by Vigenère (published in 1586)

  4. The Vigenère Cipher Treat letters as numbers: [A=0, B=1, C=2, …, Z=25] Number Theory Notation: Zn= {0, 1, …, n-1} Definition: Given m, a positive integer, P = C = (Z26)n, and K = (k1, k2, … , km) a key, we define: Encryption: ek(p1, p2… pm) = (p1+k1, p2+k2…pm+km) (mod 26) Decryption: dk(c1, c2… cm) = (c1-k1, c2-k2 … cm- km) (mod 26) Example: Plaintext: C R Y P T O G R A P H Y Key: L U C K L U C K L U C K Ciphertext: N L A Z E I I B L J J I

  5. Security of Vigenere Cipher • Vigenere masks the frequency with which a character appears in a language: one letter in the ciphertext corresponds to multiple letters in the plaintext. Makes the use of frequency analysis more difficult. • Any message encrypted by a Vigenere cipher is a collection of as many shift ciphers as there are letters in the key.

  6. Vigenere Cipher: Cryptanalysis • Find the length of the key. • Divide the message into that many simple substitution encryptions. • Solve the resulting simple substitutions. • how?

  7. How to Find the Key Length? • For Vigenere, as the length of the keyword increases, the letter frequency shows less English-like characteristics and becomes more random. • Two methods to find the key length: • Kasisky test • Index of coincidence (Friedman)

  8. Kasisky Test • The Kasiski examination, also called the Kasiski test, takes advantage of the fact that repeated words may, by chance, sometimes be encrypted using the same key letters, leading to repeated groups in the ciphertext . •  For example, Consider the following encryption using the keyword ABCD:

  9. Example of the Kasisky Test • Key: ABCDABCDABCDABCDABCDABCDABCD Plaintext: CRYPTOISSHORTFORCRYPTOGRAPHY Ciphertext: CSASTPKVSIQUTGQUCSASTPIUAQJB

  10. Kasisky Test • There is an easily seen repetition in the ciphertext, and the Kasiski test will be effective. • Here the distance between the repetitions of CSASTP is 16. • .Assuming that the repeated segments represent the same plaintext segments, this implies that the key is 16, 8, 4, 2, or 1 characters long.

  11. Kasisky Test • The following ciphertext has two segments that are repeated: • Ciphertext: VHVSSPQUCEMRVBVBBBVHVSURQGIBDUGRNICJQUCERVUAXSSR

  12. Kasisky Test • The distance between the repetitions of VHVS is 18. • Assuming that the repeated segments represent the same plaintext segments, this implies that the key is 18, 9, 6, 3, 2, or 1 characters long. • The distance between the repetitions of QUCE is 30 characters.

  13. Kasisky Test • This means that the key length could be 30, 15, 10, 6, 5, 3, 2, or 1 characters long. • By taking the intersection of these sets one could safely conclude that the most likely key length is 6, since 3, 2, and 1 are unrealistically short.

More Related