SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Sustitution cyphers: why they should
not be used & and how to crack them
Frequency Analysis
Andrea Tino
This document uses graphic assets from Freepik
Cyphers
A cypher is an algorithm which takes an input text
called plain text, and generates another text, called
cypher text, by transforming the priginal one. The
plain text is not limited its length can vary.
Every cypher needs a key to work. The key allows the
plain text to be encrypted into a cypher text and it
The role of Cryptography
Security is a branch of Computer Science, So ware
Engineering and Mathematics which deals with
problems related to confining access to data only to
those who have the proper set of permissions.
Encryption is a crucial part of this story and it
consists in a broad collection of techniques used to
guarantee that secrets can safely be delivered on
non-secure channels. Encryption is used today in
order to deliver private information over the Internet:
the biggest network we have in the world.
Thanks to cryptography, we do many things over the
Internet: we can pay bills, we can use our credit cards,
check our emails and safely use social networks.
Security is a very important ma er today. Everything we
have is moving to the Cloud and all our data are stored
over the Internet. In order to protect all this information,
Substitution cyphers
Cyphers can work in several different ways. The
oldest, and today least secure, type of cyphers
employ a technique called: key-replacement.
also allows the reverse process to take place:
decryption. The key has a fixed size, it cannot vary.
To successfully decrypt a message, it is necessary to
use the same exact key that was used to encrypt the
message. That is why the key must be kept safe and
distributed (safely), only to authorized people.
The most famous cypher and oldest known in
hostory is Caesar’s cypher: the Roman Emperor used
to send messages to his generals by encrypting them
with a substitution cypher always with the same key
known to him and his closest men in the military.
As it is possible to see, this mechanism allows secret messages to be exchanged even if the message ends up in
the wrong hands. However they key must be not be sent over a non-safe channel.
we must encrypt our data and be sure nobody can
access it except us. This is done automatically by the
services we use: email accounts, smart-phones, etc.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A B CD E F G H I J K L M N O P Q R S T U V W X Y Z
Plain text
#$%!?+0^!@
?+0^!!?+0^
!@?+0^!?+0
^!@?+0^!!@
#$%!!?+0^!
Cypher text
ENCRYPT
DECRYPT
ALICEBOB Message
Message
#$%!?+0^!@
?+0^!!?+0^
!@?+0^!?+0
^!@?+0^!!@
#$%!!?+0^!
Encrypted
message
Original
message
TRUDY
Hey Alice, it
was Trudy who
ate your cake
yesterday!
Don’t tell her
I told you.
Khb Dmlfh, lw
zdv Wuxgb zkr
dwh brxu fdnh
bhvwhugdb!
Grq’w whoo khu
L wrog brx.
Bob sends the
message but before
it encrypts the
message using
Caesar’s Cypher.
Khb Dmlfh, lw
zdv Wuxgb zkr
dwh brxu fdnh
bhvwhugdb!
Grq’w whoo khu
L wrog brx.
Khb Dmlfh, lw
zdv Wuxgb zkr
dwh brxu fdnh
bhvwhugdb!
Grq’w whoo khu
L wrog brx.
Bob sends Alice the
message over Wi-Fi. Since
this is not a secure
channel, Bob decides to
encrypt the message.
Trudy is sniffing Bob and
Alice’s communications
and she successfully
acquires the message.
Alice is Bob’s friend, and
he will send her an
important secret message
that only she should read.
Trudy tries to read the
message content, but she
realizes she cannot as it is
encrypted.
E F G H J MA B C DE F G I J OA B C D
English language Cypher text
D = A
H = E
M = J
Trudy knows Alice and Bob communicate in
English, so she calculates how many times
each le er appears in the cypher-text and
builds the frequency histogram.
Later, she compares the cypher-text
histogram with the one relative to the English
language. The highest and lowest bars give
Trudy indication on the main associations.

Más contenido relacionado

Similar a Workshop on Cryptography - Frequency Analysis (basic)

Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
ahmad amiruddin
 
encryption
encryptionencryption
encryption
s1170037
 
Encryption
EncryptionEncryption
Encryption
s1170037
 

Similar a Workshop on Cryptography - Frequency Analysis (basic) (20)

Crypt
CryptCrypt
Crypt
 
Ss
SsSs
Ss
 
Criptography
CriptographyCriptography
Criptography
 
Crypto
CryptoCrypto
Crypto
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Information Security
Information SecurityInformation Security
Information Security
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography
CryptographyCryptography
Cryptography
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Más de Andrea Tino

Más de Andrea Tino (20)

Our Journey: from Waterfall to Agile to DevOps
Our Journey: from Waterfall to Agile to DevOpsOur Journey: from Waterfall to Agile to DevOps
Our Journey: from Waterfall to Agile to DevOps
 
Development & GDPR (v2)
Development & GDPR (v2)Development & GDPR (v2)
Development & GDPR (v2)
 
Development & GDPR
Development & GDPRDevelopment & GDPR
Development & GDPR
 
Cutting Edge on Development Methodologies in IT
Cutting Edge on Development Methodologies in ITCutting Edge on Development Methodologies in IT
Cutting Edge on Development Methodologies in IT
 
An introduction to DevOps
An introduction to DevOpsAn introduction to DevOps
An introduction to DevOps
 
Continuous Everything
Continuous EverythingContinuous Everything
Continuous Everything
 
Modern Trends in UI Decoupling Design
Modern Trends in UI Decoupling DesignModern Trends in UI Decoupling Design
Modern Trends in UI Decoupling Design
 
Javascript cheatsheet
Javascript cheatsheetJavascript cheatsheet
Javascript cheatsheet
 
Master Thesis - A Distributed Algorithm for Stateless Load Balancing
Master Thesis - A Distributed Algorithm for Stateless Load BalancingMaster Thesis - A Distributed Algorithm for Stateless Load Balancing
Master Thesis - A Distributed Algorithm for Stateless Load Balancing
 
Modern web applications
Modern web applicationsModern web applications
Modern web applications
 
Visual Studio Tools for Cordova
Visual Studio Tools for CordovaVisual Studio Tools for Cordova
Visual Studio Tools for Cordova
 
Microsoft + Agile (light)
Microsoft + Agile (light)Microsoft + Agile (light)
Microsoft + Agile (light)
 
Microsoft + Agile
Microsoft + AgileMicrosoft + Agile
Microsoft + Agile
 
The World of Stylesheet Languages
The World of Stylesheet LanguagesThe World of Stylesheet Languages
The World of Stylesheet Languages
 
How to Develop Cross-Platform Apps
How to Develop Cross-Platform AppsHow to Develop Cross-Platform Apps
How to Develop Cross-Platform Apps
 
The Asynchronous Pattern (for beginners)
The Asynchronous Pattern (for beginners)The Asynchronous Pattern (for beginners)
The Asynchronous Pattern (for beginners)
 
Designing an effective hybrid apps automation framework
Designing an effective hybrid apps automation frameworkDesigning an effective hybrid apps automation framework
Designing an effective hybrid apps automation framework
 
7 tips for more effective morning SCRUM
7 tips for more effective morning SCRUM7 tips for more effective morning SCRUM
7 tips for more effective morning SCRUM
 
Powerful tools for building web solutions
Powerful tools for building web solutionsPowerful tools for building web solutions
Powerful tools for building web solutions
 
Working with Agile technologies and SCRUM
Working with Agile technologies and SCRUMWorking with Agile technologies and SCRUM
Working with Agile technologies and SCRUM
 

Último

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Último (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

Workshop on Cryptography - Frequency Analysis (basic)

  • 1. Sustitution cyphers: why they should not be used & and how to crack them Frequency Analysis Andrea Tino This document uses graphic assets from Freepik Cyphers A cypher is an algorithm which takes an input text called plain text, and generates another text, called cypher text, by transforming the priginal one. The plain text is not limited its length can vary. Every cypher needs a key to work. The key allows the plain text to be encrypted into a cypher text and it The role of Cryptography Security is a branch of Computer Science, So ware Engineering and Mathematics which deals with problems related to confining access to data only to those who have the proper set of permissions. Encryption is a crucial part of this story and it consists in a broad collection of techniques used to guarantee that secrets can safely be delivered on non-secure channels. Encryption is used today in order to deliver private information over the Internet: the biggest network we have in the world. Thanks to cryptography, we do many things over the Internet: we can pay bills, we can use our credit cards, check our emails and safely use social networks. Security is a very important ma er today. Everything we have is moving to the Cloud and all our data are stored over the Internet. In order to protect all this information, Substitution cyphers Cyphers can work in several different ways. The oldest, and today least secure, type of cyphers employ a technique called: key-replacement. also allows the reverse process to take place: decryption. The key has a fixed size, it cannot vary. To successfully decrypt a message, it is necessary to use the same exact key that was used to encrypt the message. That is why the key must be kept safe and distributed (safely), only to authorized people. The most famous cypher and oldest known in hostory is Caesar’s cypher: the Roman Emperor used to send messages to his generals by encrypting them with a substitution cypher always with the same key known to him and his closest men in the military. As it is possible to see, this mechanism allows secret messages to be exchanged even if the message ends up in the wrong hands. However they key must be not be sent over a non-safe channel. we must encrypt our data and be sure nobody can access it except us. This is done automatically by the services we use: email accounts, smart-phones, etc. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A B CD E F G H I J K L M N O P Q R S T U V W X Y Z Plain text #$%!?+0^!@ ?+0^!!?+0^ !@?+0^!?+0 ^!@?+0^!!@ #$%!!?+0^! Cypher text ENCRYPT DECRYPT ALICEBOB Message Message #$%!?+0^!@ ?+0^!!?+0^ !@?+0^!?+0 ^!@?+0^!!@ #$%!!?+0^! Encrypted message Original message TRUDY Hey Alice, it was Trudy who ate your cake yesterday! Don’t tell her I told you. Khb Dmlfh, lw zdv Wuxgb zkr dwh brxu fdnh bhvwhugdb! Grq’w whoo khu L wrog brx. Bob sends the message but before it encrypts the message using Caesar’s Cypher. Khb Dmlfh, lw zdv Wuxgb zkr dwh brxu fdnh bhvwhugdb! Grq’w whoo khu L wrog brx. Khb Dmlfh, lw zdv Wuxgb zkr dwh brxu fdnh bhvwhugdb! Grq’w whoo khu L wrog brx. Bob sends Alice the message over Wi-Fi. Since this is not a secure channel, Bob decides to encrypt the message. Trudy is sniffing Bob and Alice’s communications and she successfully acquires the message. Alice is Bob’s friend, and he will send her an important secret message that only she should read. Trudy tries to read the message content, but she realizes she cannot as it is encrypted. E F G H J MA B C DE F G I J OA B C D English language Cypher text D = A H = E M = J Trudy knows Alice and Bob communicate in English, so she calculates how many times each le er appears in the cypher-text and builds the frequency histogram. Later, she compares the cypher-text histogram with the one relative to the English language. The highest and lowest bars give Trudy indication on the main associations.