History of Cryptography Flashcards
Cryptography
Science of altering communication so that it cannot be understood without a key
Mono-Alphabet Substitution Cipher
Algorithms that simply substitute one character of ciphertext for one character of plain text, these are the most primitive algorithm
Caesar Cipher
Every letter is simply shifted a fixed number of places to the left or to the right
Atbash Cipher
Hebrew cipher which substitutes the first letter of the alphabet for the last, and the second letter for the second-to-last, in other words, it simply reverses the alphabet.
Affine Cipher
Any single substitution alphabet ciphers where each letter in the alphabet is mapped to some numeric value, permuted with some relatively simple mathematical function, and then converted back to a letter.
The formula for any basic cipher of this type is ax+b(modM), M being the size of the alphabet, so for example Caeser cipher would be 1x+3(mod26)
ROT13 Cipher
A single alphabet substitution cipher where all characters are rotated 13 characters through the alphabet.
Scytale Cipher
Physical cylinder that was used to encrypt messages. Turning the cylinder produced different ciphertexts. Required a cylinder of the same diameter as the cylinder used to create the message to read the message.
Single substitution weaknesses
Literacy rates have risen since ancient times, all languages have certain word and letter frequencies, underlying word and letter frequencies lead to vulnerability to cryptanalysis
Examples of Multi-Alphabet Substitution
Cipher Disk, Vigenere Cipher
Cipher Disk
Invented by Leon Alberti in 1466, physical device, each turn of the disk produces a new cipher
Vigenere Cipher
Once considered very secure, invented by Giovan Battista Bellaso in 1553. Used until early 1900’s. Encrypts text by using a series of different Caesar cipher based on a keyword.
Friedrich Kasiski
First-person to carry out a successful attack on a Vigenere cipher
Playfair Cipher
Invented by Charles Wheatstone in 1854. Encrypts two letters instead of one, this makes it more complex. Uses a 5x5 table containing a keyword. No more secure than any other older ciphers.
ADFVGX Cipher
A transposition cipher invented in 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition
Homophonic Substitution
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple ciphertext symbols
Null Ciphers
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple ciphertext symbols
Null Ciphers
The message is hidden in the unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind
Book Ciphers
Sender and receiver agree on a particular book, coordinates are then used to locate words of an intended message in the book
Rail Fence Cipher
The most widely known transposition cipher encrypts the message by altering each letter on a different row, message must then be written down the left to right and put into rows
Enigma Machine
The electromechanical rotor-based cipher used in World War II
CrypTool
A free tool that allows you to enter text and then choose a historical algorithm to encrypt the text