cryptography & cryptanalysis classics. the evolution of secret writing 1. steganography
TRANSCRIPT
![Page 1: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/1.jpg)
Cryptography&
Cryptanalysis
Classics
![Page 2: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/2.jpg)
The Evolution of Secret Writing
1. Steganography
![Page 3: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/3.jpg)
2. Cryptography “The aim of cryptography is not to hide the
existence of a message, but rather to hide its meaning, a process known as encryption”
![Page 4: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/4.jpg)
• Transposition
Cow cow, cwo, owc, ocw, wco, woc.
• Substitution
c Xo Gw P
cow XGP
![Page 5: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/5.jpg)
“For example, consider this short sentence”has
50,000,000,000,000,000,000,000,000,000,000rearrangements.
![Page 6: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/6.jpg)
Rail Fence Transposition
![Page 7: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/7.jpg)
Spartan Scytale
![Page 8: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/8.jpg)
Substitution
Cipher
meet at midnight CUUZ VZ CGXSGIBZ
![Page 9: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/9.jpg)
CAESAR Shift Cipher
![Page 10: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/10.jpg)
![Page 11: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/11.jpg)
Kerckhoffs’ Principle: The security of a cryptosystem must not depend on keeping secret the cryptoalgorithm. The security depends only
on keeping secret the key.
![Page 12: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/12.jpg)
JULIUS CAESAR
JULISCAER
![Page 13: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/13.jpg)
Muslims
Monoalphabetic Substitution Cipher
a #b +
Cryptanalysis
The Science of Unscrambling a message without knowledge of the key.
![Page 14: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/14.jpg)
Frequency Analysis
al-Kindı’s“A Manuscript on Deciphering Cryptographic
Messages”
![Page 15: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/15.jpg)
English
![Page 16: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/16.jpg)
![Page 17: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/17.jpg)
![Page 18: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/18.jpg)
![Page 19: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/19.jpg)
P is a consonant.
![Page 20: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/20.jpg)
• Combination OO appears twice, whereas XX does not appear at all.• X and Y appear on their own in the ciphertext. (a and I are the only English
word that consisit of a single letter)• In the English language, the letter h frequently goes before the letter e (as
in the, then, they, etc.), but rarely after e.
h
![Page 21: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/21.jpg)
O=e, X=a, Y=i, B=h.
the most common three-letter words in English are the and and, and these are relatively easy to spot—Lhe, which appears six times, and aPV, which appears five times.
P=n, V=d, L=t.
![Page 22: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/22.jpg)
• Every word has a vowel in it, so C in Cn is a vowel. The only vowels remaining are o and u. u does not fit so C = o.
• We also have the word Khe, which implies that K represents either t or s. But we already know that L = t, so it becomes clear that K = s.
• thoMsand and one niDhts thousand and one nights
![Page 23: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/23.jpg)
A VOID BY GEORGES PEREC AVOIDBYGERSPC
![Page 24: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/24.jpg)
![Page 25: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/25.jpg)
1. Begin by counting up the frequencies of all the letters in the ciphertext. About five of the letters should have a frequency of less than 1 percent, and these probably represent j, k, q, x and z. One of the letters should have a frequency greater than 10 percent, and it probably represents e. If the cipher-text does not obey this distribution of frequencies, then con-sider the possibility that the original message was not written in English.
2. the most common repeated letters are ss, ee, tt, ff, ll, mm and oo.3. The only one-letter words in English are a and I. The commonest two-letter
words are of, to, in, it, is, be, as, at, so, we, he,by, or, on, do, if,me,my, up, an, go, no, us, am . The most common three-letter words are the and and.
![Page 26: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/26.jpg)
Code
• One of the simplest improvements to the security of the monoalphabetic substitution cipher was the introduction of nulls, symbols or letters that were not substitutes for actual letters, merely blanks that represented nothing.
![Page 27: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/27.jpg)
![Page 28: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/28.jpg)
![Page 29: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/29.jpg)
The Pigpen Cipher
![Page 30: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/30.jpg)
New Ciphers
Leon Battista Alberti
hello AFPAD
![Page 31: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/31.jpg)
![Page 32: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/32.jpg)
![Page 33: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/33.jpg)
![Page 34: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/34.jpg)
![Page 35: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/35.jpg)
![Page 36: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/36.jpg)
L1-L2-L3-L4-L5
![Page 37: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/37.jpg)
![Page 38: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/38.jpg)
![Page 39: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/39.jpg)
![Page 40: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/40.jpg)
EMILY
![Page 41: Cryptography & Cryptanalysis Classics. The Evolution of Secret Writing 1. Steganography](https://reader035.vdocument.in/reader035/viewer/2022062321/56649e2f5503460f94b1f418/html5/thumbnails/41.jpg)
THANK YOU!!