Professional Documents
Culture Documents
j k l m n o p q r
.002 .008 .040 .024 .067 .075 .019 .001 .060
s t u v w x y z
.063 .091 .028 .010 .023 .001 .020 .001
Vigenere Cipher
The same letter need not be enciphered as the same letter
Key: vector=(21,4,2,19,14,17)
h e r e i s h o wi t w o r k s
v e c t o r v e c t o r v e c t
C I TXWJCS YBHNJ VML
0 1 C 0 1
1 1 C1 0
Cryptanalysis
• If the linear recurrence of length is less
than m,then
X1 X2 ... Xm
X2 X3 ... X m 1
det( M ) det 0 (mod 2)
X3 X4 ... ...
X X6 .... ...
4
Irreducible Polynomial mod 2
• xn+m=c0xn+c1xn+1+····+cm-1xn+m-1 (mod 2)
• f(T)=Tm –cm-1 Tm-1 - ‥‥ - c1T1 – c0
• If f(T) is irreducible, then its period divides
2m – 1, an interesting case is when 2m – 1 i
s a prime (Mersenne primes)
• 231 – 1 =2147483647 is a prime number
• Further discuss this topic later
Enigma
• A mechanical
encryption device
used by the Germans
in World War II.
• A rotor machine
Enigma
Schematic diagram of Enigma
Schematic diagram of Enigma
Schematic diagram of Enigma
• K:keyboard
• R:revering drum
• S:plugboard
• L,M,M:rotors
Single Rotor
• 26 substitution cipher
• A1,A27,A53….
• A2,A28,A54….
• Frequency analysis
Three Rotors
• 26*26*26*6=105456 possibilities.
• 100391791500 ways of interchanging six p
airs of letters on the plugboard.
To Attack Enigma
• A codebook containing the daily settings.
• During a given day,every first letters in
plaintexts is encrypted in the same
substitution cipher.
To Attack Enigma
• Message key:a sequence of three letters,f
or example,r,f,u.
• rfurfu
• Daily setting
• Encrypting the message key
• Reset
To Attack Enigma
• dmqvbn
• vonpuy
• pucfmq
• AD=(dvpf..)…
• AD=(dvpfkxgzyo)(eijmunqlht)(bc)(rw)(a)(s)
The Effect of the Plugboard
• AD has cycles of length 10,10,2,2,1,1.
• SADS-1 has cycles of length 10,10,2,2,1,1.
• The cycle lengths remain unchanged.
• Substitution cipher
Bletchley Park
Exercises
• Problems from 2.13 Exercises
on p.55~59
• Problems from 2.14 Exercises
• on p.59~62