06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONTENTS 5<br />

9 Digraphic Ciphers 167<br />

9.1 Polygraphic Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

9.2 Hill Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170<br />

9.3 Recognizing and Breaking Polygraphic Ciphers . . . . . . . . . . 174<br />

9.4 Playfair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br />

9.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

9.6 Topics and Techniques . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

9.7 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180<br />

10 Transposition Ciphers 189<br />

10.1 Route Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189<br />

10.2 Geometrical Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . 190<br />

10.3 Turning Grilles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190<br />

10.4 Columnar Transposition . . . . . . . . . . . . . . . . . . . . . . . 192<br />

10.5 Transposition vs. Substitution . . . . . . . . . . . . . . . . . . . 195<br />

10.6 Letter Connections . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

10.7 Breaking the Columnar Transposition Cipher . . . . . . . . . . . 198<br />

10.8 Double Transposition . . . . . . . . . . . . . . . . . . . . . . . . 201<br />

10.9 Transposition during the Civil War . . . . . . . . . . . . . . . . 202<br />

10.10 The Battle <strong>of</strong> the Civil War Ciphers . . . . . . . . . . . . . . . . 207<br />

10.11 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

10.12 Topics and Techniques . . . . . . . . . . . . . . . . . . . . . . . 208<br />

10.13 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209<br />

11 Knapsack Ciphers 219<br />

11.1 The Knapsack Problem . . . . . . . . . . . . . . . . . . . . . . . 219<br />

11.2 A Related Knapsack Problem . . . . . . . . . . . . . . . . . . . . 220<br />

11.3 An Easy Knapsack Problem . . . . . . . . . . . . . . . . . . . . . 221<br />

11.4 The Knapsack Cipher System . . . . . . . . . . . . . . . . . . . . 223<br />

11.5 Public Key Cipher . . . . . . . . . . . . . . . . . . . . . . . . . . 227<br />

11.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

11.7 Topics and Techniques . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

11.8 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

12 RSA 231<br />

12.1 Fermat’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . 232<br />

12.2 Complication I: a small one . . . . . . . . . . . . . . . . . . . . . 234<br />

12.3 Complication II: a substantial one . . . . . . . . . . . . . . . . . 235<br />

12.4 Complication III: a mini one . . . . . . . . . . . . . . . . . . . . 238<br />

12.5 Complication IV: the last one . . . . . . . . . . . . . . . . . . . 239<br />

12.6 Putting It All Together . . . . . . . . . . . . . . . . . . . . . . . 241<br />

12.7 Exponential Problems (and answers) . . . . . . . . . . . . . . . 241<br />

12.8 RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242<br />

12.9 RSA and Public Keys . . . . . . . . . . . . . . . . . . . . . . . . 245<br />

12.10 How to break RSA . . . . . . . . . . . . . . . . . . . . . . . . . . 245<br />

12.11 Authenticity – Pro<strong>of</strong> <strong>of</strong> Authorship . . . . . . . . . . . . . . . . 248

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!