11.07.2015 Views

Cryptography - Sage

Cryptography - Sage

Cryptography - Sage

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checking possible keys, the partial key I****IL*A*W gives the following text which issuggestive of English:1 2 3 41 W****OS*I*I N****ND*M*N E****BE*T*E E****LL*H*D2 A****YV*E*T H****UN*E*P E****BU*W*E N****EP*N*R3 E****HE*L*O K****EE*N*D A****BR*G*T A****IG*T*N4 D****IR*C*E D****TH*U*H O****AD*W*H A****DO*H*A5 K****GH*H*W W****TH*S*A D****OR*F*R M****YS*O*T6 O****LE*R*A Y****TH*M*C H****RE*L*G H****NT*U*S7 E****EY*S*H Y****ES*I*E S****WW*U*D I****IN*E*E8 S****ES*E*M A****LO*K*N G****EE*N*H E****NG*A*W9 H****DE*D*I G****YF*I*I M****EC*S*A D****OU*H*E10 A****EE*O*S I****ES*E*E S****ST*Y*L L****AR*N*G11 H****SE*T*L L****TH*E*N D****TS*R*G H****SW*E*D12 R****DO*H*W T****E3.4 Cryptanalysis of Transposition CiphersA transposition cipher can easily be recognized by an analysis of character frequencies. Iteratingtransposition ciphers can greatly increase security, but as with substitution ciphers,almost all such ciphers can be broken. Although many modern cryptosystems incorporatetransposition ciphers, the operation on large blocks has the disadvantage of requiring a lotof memory.3.5 Statistical MeasuresSo far we have focused on Vigenère ciphers, and their reduction to monoalphabetic substitutions.Here we show how to use SAGE to complete the final step of breaking theseciphers. Recall that the reduction to monoalphabetic substitution is done by the process ofdecimation, by which we lose all 2-character frequency structure of the language. A moresophisticated approach will be necessary for breaking more complex ciphers.Correlation. We first introduce the concept of correlation of two functions. Let X and Ybe discrete random variables on a space Ω of n symbols, with values (x 1 , x 2 , . . . , x n ) and(y 1 , y 2 , . . . , y n ), respectively. For simplicity we assume that all n symbols of Ω occur withequal likihood. We define the correlation of the two sequences to beCorr(X, Y) =∑ ni=1 (x i − µ(X))(y i − µ(Y))σ(X)σ(Y)26 Chapter 3. Elementary Cryptanalysis

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!