Ancient Cryptography Flashcards
ciphers can be thought of as this
virtual locks
cryptography requires the understanding of two very old ideas related to
number theory
probability theory
first well known cipher used by whom and when
substitution cipher
Julius Ceasar, 58 BC (Caesar cipher)
substitution cipher
(Caesar cipher)
shift each letter by so many places
(e.g., advance by 3)
The process of lock breaking and code breaking are ____ _____.
very similar
when and who, published solution to the Caesar cipher
weakness of the Caesar cipher
published 800 years after Caesar, Arab mathematician (Al-Kindi)
break by knowing frequency in texts of each letter in the alphabet
Caesar ciphers are broken by this method
frequency analysis
advancement in cryptography in mid-15th century
polyalphabetic cipher
polyalphabetic cipher
multiple shifts using code word
(shift text based repeatedly on code word shift indication)
polyalphabetic cipher result
flatter distribution of letter frequencies
code breakers look for this
information leaks
any differential in letter frequencies is an information leak
breaking the polyalphabetic cipher
first determine length of shift word used by checking the frequency distribution of different intervals (four letter code word, frequency distribution of every fourth letter will show the correct distribution)
break five Caesar ciphers in a repeating sequence
property of polyalphetetic cipher strength
the longer the code word, the stronger the cipher
cipher method from end of 19th century
one-time pad
one-time pad encryption method
shift each letter by a random amount given in list of random numbers
both the sender and receiver have this list of random numbers