Classical Ciphers Flashcards
Assume all algorithms are ____
public
Security is determined ____ by key size
only
Making your own security is _______
insecure
Simplest and earliest known use of substitution cipher
Caesar Cipher
Replace each letter in alphabet with another letter $n mod |A|$ places down
Caesar Cipher
Vulnerable to word / letter frequency analysis
Substitution Ciphers
Different monoalphabetic substitutions as one proceeds through plaintext message
Polyalphabetic cipher
Key determines which particular rule is chosen for given transformation
Polyalphabetic cipher
Key is required that is as long as the word
Vigenere Cipher
Usually a repeating keyword
Vigenere Cipher
Key: dogdogdog
Plaintext: abcdefghi
Ciphetext: dpigsljvo
Key and plaintext share same frequency distribution of letters
Vigenere Cipher
Plaintext written down as sequence of diagonals, read off as sequence of rows
Rail fence cipher
Plaintext (depth = 3):
whatsgoingonpal
Ciphertext: whtogpasioagnnl
Write messages in rectangle, row by row, and read message off column by column, permuting order of columns
Row transposition cipher