Академический Документы
Профессиональный Документы
Культура Документы
Secrecy Systems
On a paper by Shannon
(and the industry it didnt
spawn)
Gilad Tsur
Yossi Oren
December 2005
Important facts:
M. Sc. Thesis founded an industry
Ph. D. finished in 1.5 years
Married a computer in 1949
Wrote scientific papers on a variety of topics,
including juggling
From http://www.cqrsoft.com/history/scytale.htm
Themes in cryptography
Seals were used as authentication means
for signing contracts, for royal decrees
and for other documents.
Passwords were used by military and
other organizations to identify members.
From
http://images.encarta.msn.com/xrefme
dia/sharemed/targets/images/pho/t025/
T025102A.jpg
Ancient Ciphers I
Atbash cipher used in old testament =
Of course, anyone whod ever heard of this cipher could
easily crack it.
This is also true for another famous cipher, the Caesar
cipher.
A BC
D E F
X Y Z
A B C
Ancient Ciphers II
The Caesar cipher is just a specific case of what are
generally known as Shift Ciphers.
A Shift cipher is one where the code is simply a
rotation of the alphabet with K steps, where the
number K can be considered the key. Easier for us in
CS think of it as a constant added modulo the size
of the alphabet.
Obviously, finding the key for such a code is not a
lengthy process.
Ancient Ciphers IV
Both Atbash and Shift ciphers are specific cases of
a more general type of ciphers used in the ancient
world: Monoalphabetic Substitution Ciphers.
As these ciphers were used by people who wanted
to remember them, keyword and keyphrase ciphers
were often used.
The keyword could be changed daily to make it
harder to decrypt.
Some of these ciphers didnt use a 1-1
correspondence, trusting the redundancy of language
or allowing multiple representations.
Ancient Ciphers V
http://plus.maths.org/issue34/features/ekert/
Ancient Ciphers VI
The scytale was a device assisting in the creation of
a Transposition Cipher.
Perhaps the most notable example of a
transposition cipher is the column transposition.
Other geometrical transposition ciphers abound,
mostly route ciphers.
Transposition ciphers based on a local permutation
are also common, but offer a less apparently
convenient way of writing quickly.
From http://en.wikipedia.org/wiki/Caesar_cipher
http://plus.maths.org/issue34/features/ekert/
Polyalphabetic substitution
ciphers
These ciphers can simply be considered as a list of
shift ciphers or monoalphabetic substitution ciphers to
be used consecutively.
The use of some of these ciphers was aided by a
cipher disk.
Other such ciphers used tables to assist encryption and
decryption.
Notably, some in of these cipher were polygraphic
each encoded symbol represented a combination of
plaintext symbols.
Cryptanalysis of polyalphabetic
substitution ciphers
Definitions of a Cryptosystem
Definitions of a Cryptosystem:
Shannons version II
Definitions of a Cryptosystem:
modern variations
Many things have changed in our thinking about
cryptography.
Different functions: Not only trying to transmit secret
information.
Different settings for Alice and Bob we now
have public key cryptosystems and extensive use of
randomness.
Different settings for Eve we now have a variety of
attacks such as known plain text, chosen ciphertext,
chosen plain text and side channel attacks.
Main Contributions
Apriori
Theorem (Bayes):
Aposteriori
A Brief Introduction to
Information Theory
Some random events are more
unexpected than others
Some facts are more significant than
others
Shannon Entropy measures the amount
of uncertainty regarding a random
variable, or the amount of information an
event provides
Entropy Rate measures the growth of
information in an infinitely-long sequence
Definition of Entropy
(note: limx!0xlogx=0)
Entropy Rate
8 x2X
Entropy of Cryptosystem
Components
Reminder Cryptosystem = (P,K,C,E,D)
H(C|K) =H(P)
H(C|P,K)=H(P|C,K)=0
H(P,K)=H(P)+H(K)
H(C)H(P)
H(C,P,K)=H(C,K)=H(P,K)
H(K|C)=H(K)+H(P)-H(C)
H(K|Cn)=H(K)+H(Pn)-H(Cn)
Everything Haley
says is encrypted
with a
monoalphabetic
substitution cipher
Could you break
it?
Q: Which 2
romantic era
authors had their
heroes break this
cipher?
(archive.org cache)
Closing Thoughts