cipher machines

Information about cipher machines

Published on January 1, 2008

Author: The_Rock

Source: authorstream.com

Content

Cipher Machines: From Antiquity to the Enigma Machine:  Cipher Machines: From Antiquity to the Enigma Machine Dr. Wayne Summers TSYS Department of Computer Science Columbus State University [email protected] http://csc.colstate.edu/summers Introduction to Cryptography and Encryption:  Introduction to Cryptography and Encryption cryptography Greek words kryptos meaning hidden and grafi meaning writing and is the study of hiding written information through encoding or enciphering code is the replacing of a word or phrase with a word, number or symbol cipher involves making letter-for-letter substitutions. Information can be hidden by either substituting other letters, words or symbols for the letters or words in the message or transposing the letters or words in the message. Cryptology is the overall study of codes and ciphers cryptoanalysis is the science of the decryption of codes and ciphers Early Encryption:  Early Encryption began in Egypt around 1900 BCE. The scribe for the Pharaoh Amenemhet II “used hieroglyphic substitutions to impart dignity and authority” to the inscriptions in the pyramids 500-1500 BCE, Assyrian and other cultures began hiding information tattooing the message on the heads of the messengers, “carving” the message in the stomach of animals, hiding the message under new wax 600 BCE, Hebrew scribes used a simple substitution cipher known as ATBASH using a reverse alphabet. (used in book of Jeremiah) SCYTALE:  SCYTALE Caesar cipher :  Caesar cipher The message “the caesar cipher is a substitution cipher” becomes WKHFD HVDUF LSKHU LVDVX EVWLW XWLRQ FLSKH U Early Encryption:  Early Encryption Arab Cryptanalysis developed around the 8th century A.D. by Abu 'Abd al-Rahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi who solved a cryptogram in Greek for the Byzantine emperor; first to discover and write down the methods of cryptanalysis. Another Arab of the 9th century, Abu Yusuf Ya'qub ibn Is-haq ibn as-Sabbah ibn 'omran ibn Ismail al-Kindi wrote "A Manuscript on Deciphering Cryptographic Messages“ 1412, Arabic knowledge of cryptology fully described in the Subh al-a 'sha, 14-volume encyclopedia, written by Shihab al-Din abu 'l-Abbas Ahmad ben Ali ben Ahmad Abd Allah al-Qalqashandi During the Middle Ages in Europe, encryption was primarily restricted to the monks. " Around 1250 A.D., Roger Bacon, wrote the "Epistle on the Secret Works of Art and the Nullity of Magic” describing seven deliberately vague methods of concealing a secret Around 1392 A.D., Geoffrey Chaucer wrote six short passages in cipher in his "The Equatorie of the Planetis" notes to his "Treatise on the Astrolabe” Early Cipher Machines:  Early Cipher Machines Leon Battista Alberti (1404-1472) developed a cipher machine for mechanical encryption based on the Caesar cipher algorithm Alberti developed and published the first polyalphabetic cipher and designed a cipher disk to simplify the process "Father of Western Cryptography" Jefferson Cylinder – built late 1790s:  Jefferson Cylinder – built late 1790s Wheatstone Cryptograph, originally invented by Wadsworth in 1817 :  Wheatstone Cryptograph, originally invented by Wadsworth in 1817 Popular Cryptography:  Popular Cryptography Jules Verne's - decipherment of a parchment filled with runic characters in the Journey to the Center of the Earth. Sir Arthur Conan Doyle's detective, Sherlock Holmes, was an expert in cryptography. The Adventure of the Dancing Men, involves a cipher consisting of stick men, each representing a distinct letter. Edgar Allan Poe issued a challenge to the readers of Philadelphia's Alexander Weekly Messenger, claiming that he could decipher any mono-alphabetic substitution cipher. He successfully deciphered all of the hundreds of submissions. In 1843, he wrote a short story, "The Gold Bug” Mexican Army Cipher Disk (1913):  Mexican Army Cipher Disk (1913) Use MERT as key m=1, e=27, r=53,t=79 The word “College” is ciphered as 1703262619 2119 or 6476269719 6890 etc. Rotor Cipher Machines:  Rotor Cipher Machines first rotor machine was built in 1915 by two Dutch naval officers, Theo A. van Hengel and R. P.C. Spengler (de Leeuw) number of inventors independently developed similar rotor machines Most of the rotor machines used a typewriter-like keyboard for input and lighted letters for the output. Some of the later devices used punched card and paper tape for input and/or output Enigma machine :  Enigma machine designed by Arthur Scherbius (~1918) three interchangeable rotors geared together 26 x 26 x 26 (17,576) combinations of letters Steckerverbindungen (plug-board) was introduced in 1928. Initially Stecker allowed 6 pairs of letters to be swapped. later expanded to 10 pairs. increased the number of possible settings (keys) to 159,000,000,000,000,000,000 (159 million million million)  if 1,000 cryptographers, each with a captured Enigma, tested 4 keys/minute, all day, every day, it would take 1.8 billion years to try them all. Enigma machine:  Enigma machine Enigma operators were provided a codebook each month that specified the key for each day during the month. Use rotors 2-4-3 Set the rotors to V-F-P Use plugboard settings B/T – D/G – I/R - P/Y – S/V – W/Z each message was assigned a random key. message key was transmitted twice prior to the message being transmitted. E.g. if the day key is V-F-P, the operator might pick a message key of WAS. Using the day key to encrypt the message key, the operator would then transmit WAS WAS followed by the message. Enigma machine:  Enigma machine Cracking the Enigma machine :  Cracking the Enigma machine Polish mathematicians, Marian Rejewski, Henryk Zigalski, and Jerzy Rozycki, reduced the problem of cracking the enigma code significantly, concentrating on the rotor settings exploiting the fact that the message key was transmitted twice. provided the design of the Enigma machine from a disgruntled German civil servant, Hans-Thilo Schmidt. Rejewski and his team developed a machine called a bombe that simulated the working of six Enigma machines working in unison to try and determine the daily key. Cracking the Enigma machine:  Cracking the Enigma machine British Government Code and Cipher School (GC&CS) opened secret site at Bletchley Park team of codebreakers was led by Alan Turing and Gordon Welchman Turing and Welchman’s bombe consisted of twelve sets of electrically linked Enigma scramblers crib - piece of plaintext associated with a piece of ciphertext (ex. Wetter) Over 400 bombes built for use at Bletchley Park Bombe:  Bombe Lorenz :  Lorenz Bletchley Park:  Bletchley Park Other Rotor Machines:  Other Rotor Machines Slide22:  “The paramount requirement for all cryptosystems is reliability. This means that cryptosystems must be decipherable without ambiguity, without delay, and without error…secondary requirements are security and rapidity.” [Kahn, pg. 453] Resources:  Resources Codes and Ciphers in History, Part 1 - To 1852, (last viewed 14 July 2005), http://www.smithsrisca.demon.co.uk/crypto-ancient.html Copeland, B. Jack (ed), The Essential Turing, (Oxford: Oxford University Press, 2004). English Heritage – Bletchley Park, (last viewed 14 July 2005), http://www.english-heritage.org.uk/bletchleypark History of Encryption, (last viewed 14 July 2005), http://www.deathstar.ch/security/encryption/history/history.htm Kahn, David, The Codebreakers: The Story of Secret Writing (New York: Macmillan, 1967). Kallis, Jr., Stephen A., (last viewed 14 July 2005), Codes and Ciphers, http://www.otr.com/ciphers.html Singh, Simon(1999), The Code Book. Doubleday.

Related presentations


Other presentations created by The_Rock

airlines
30. 03. 2008
0 views

airlines

tradepolicy
22. 04. 2008
0 views

tradepolicy

AVCA CHRIS MWEBESA
13. 04. 2008
0 views

AVCA CHRIS MWEBESA

wolf032806
10. 04. 2008
0 views

wolf032806

UEI SI2006 CitiesIntro
07. 04. 2008
0 views

UEI SI2006 CitiesIntro

Wisenews
28. 03. 2008
0 views

Wisenews

Mogi Tsinghua
27. 03. 2008
0 views

Mogi Tsinghua

2007070302122666487
26. 03. 2008
0 views

2007070302122666487

networking 101
19. 06. 2007
0 views

networking 101

Bowen Family Systems Theory
19. 02. 2008
0 views

Bowen Family Systems Theory

huwang
29. 09. 2007
0 views

huwang

amart3
02. 10. 2007
0 views

amart3

Finland Nokia
07. 09. 2007
0 views

Finland Nokia

SINUS Milieu stud
12. 10. 2007
0 views

SINUS Milieu stud

AAS SD05 present
29. 11. 2007
0 views

AAS SD05 present

Germany Voting
27. 08. 2007
0 views

Germany Voting

disaster 2001
27. 08. 2007
0 views

disaster 2001

Bergstrom
27. 08. 2007
0 views

Bergstrom

workshop24 2
27. 08. 2007
0 views

workshop24 2

History of electric charge
20. 11. 2007
0 views

History of electric charge

Debra Lieberman
22. 11. 2007
0 views

Debra Lieberman

Reading Genres
27. 08. 2007
0 views

Reading Genres

Plant Establishment
02. 01. 2008
0 views

Plant Establishment

SPACE
03. 01. 2008
0 views

SPACE

IntroductionTo OWL
04. 01. 2008
0 views

IntroductionTo OWL

HBCU Deans Seminar 2005
01. 10. 2007
0 views

HBCU Deans Seminar 2005

genX
27. 09. 2007
0 views

genX

499HodoCuba04
11. 12. 2007
0 views

499HodoCuba04

ext ref uncertainty
27. 08. 2007
0 views

ext ref uncertainty

Intro HTML
09. 10. 2007
0 views

Intro HTML

Ransom Pollen Drift in Wheat
04. 10. 2007
0 views

Ransom Pollen Drift in Wheat

overview norway with notes final
07. 09. 2007
0 views

overview norway with notes final

2004 CFS Power Point for LEPC
26. 02. 2008
0 views

2004 CFS Power Point for LEPC

fps ml talk
28. 02. 2008
0 views

fps ml talk

11979
29. 02. 2008
0 views

11979

presentation cons 2007 e
04. 03. 2008
0 views

presentation cons 2007 e

knox trail proposal
10. 03. 2008
0 views

knox trail proposal

wwired scare
03. 01. 2008
0 views

wwired scare

Banff
13. 03. 2008
0 views

Banff

Technological Prerequisites
18. 03. 2008
0 views

Technological Prerequisites

SKH TOURCAN POWERPOINT
21. 03. 2008
0 views

SKH TOURCAN POWERPOINT

Un Arco Iris para ti 2066
21. 06. 2007
0 views

Un Arco Iris para ti 2066

Diarréia Crônica em AIDS
28. 12. 2007
0 views

Diarréia Crônica em AIDS

liebeversicherung
19. 06. 2007
0 views

liebeversicherung

Lab49 Algo v6
19. 06. 2007
0 views

Lab49 Algo v6

SWR0311
19. 06. 2007
0 views

SWR0311

Tibetan Dali Lama questions
19. 06. 2007
0 views

Tibetan Dali Lama questions

15828233
03. 10. 2007
0 views

15828233

strand
19. 06. 2007
0 views

strand

Yo quisiera ser 1953
21. 06. 2007
0 views

Yo quisiera ser 1953

Sin vicios para matrimonio 2008
21. 06. 2007
0 views

Sin vicios para matrimonio 2008

Lesson7 OverheadT ransparencies
19. 06. 2007
0 views

Lesson7 OverheadT ransparencies

Profesiones 1950
21. 06. 2007
0 views

Profesiones 1950

slides oct04
19. 06. 2007
0 views

slides oct04

Suarez pres
28. 09. 2007
0 views

Suarez pres

140103
10. 10. 2007
0 views

140103

Lec1 intro
21. 11. 2007
0 views

Lec1 intro

FIcase Oslo workshop
07. 09. 2007
0 views

FIcase Oslo workshop

two years
19. 06. 2007
0 views

two years

MEDITARE
19. 06. 2007
0 views

MEDITARE

Se necesita amor 1955
21. 06. 2007
0 views

Se necesita amor 1955

OAG Sinha
19. 06. 2007
0 views

OAG Sinha

spit
19. 06. 2007
0 views

spit