06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44 CHAPTER 3. THE INTRODUCTION OF NUMBERS<br />

Instead, we need to multiply by the inverse <strong>of</strong> 7, which from Figure 3.2 is<br />

15.<br />

ciphertext M K C C K F I<br />

ciphernumbers 13 11 3 3 11 6 9<br />

×15 195 165 45 45 165 90 135<br />

%26 13 9 19 19 9 12 5<br />

plaintext m i s s i l e<br />

This works much better. The answer is missile.<br />

(3) Decipher JCPCJS if the enciphering key was k = 9.<br />

(4) Decipher RDYRSCSPQ if enciphering key was k = 19.<br />

(5) Decipher AWVFWYKLC if the enciphering key was k = 11. 11<br />

⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄ ⋄<br />

3.5 Multiplication vs. Addition<br />

We have seen that decimation ciphers cause letters which are adjacent in the<br />

plaintext alphabet to be separated in the ciphertext alphabet. How much does<br />

this improve security<br />

Consider the following ciphertext that was enciphered with a decimation<br />

cipher.<br />

UQESF YFTGW SGPVS PPVQX QEDGR PMQFP YJSFG EORVQ DQBQF PVQWO<br />

MRTQW PUOTT SPPOM QWOFE TIXQS FIMLQ DYJUY FXQDO FCW<br />

It has the letter frequency table<br />

0 1 1 4 4 9 4 0 2 2 0 1 4 0 6 9 13 3 6 5 3 4 5 3 4 0<br />

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z<br />

There are no obvious places to fit the aei, no, rst and uvwxyz patterns. Nor,<br />

for that matter, any non-obvious place! Clearly our efforts to construct and<br />

understand the Decimation Ciphers have been fruitful – the techniques that<br />

allow us to decrypt Caesar ciphers no longer suffice.<br />

3.6 Koblitz’s Kid-RSA and Public Key Codes<br />

To demonstrate the powers <strong>of</strong> the ideas we’ve studied in this chapter we are going<br />

now to explain Neal Koblitz’s toy system, “Kid-RSA”. The RSA cryptosystem,<br />

due to Rivest, Shamir, and Adelman, is one <strong>of</strong> the most important systems<br />

11 (3) divide, (4) propagate, (5) subjugate.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!