Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen

Чтение книги онлайн.

Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 25

Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen

Скачать книгу

Frequency (%) a 7.44 b 1.46 c 2.52 d 3.53 e 12.22 f 2.68 g 1.84 h 5.97 i 6.82 j 0.20 k 0.65 l 4.28 m 2.71 n 6.32 o 8.25 p 1.97 q 0.12 r 6.21 s 6.99 t 9.85 u 3.67 v 0.12 w 2.09 x 0.18 y 1.87 z 0.03

      Source: These percentages are based on the book “The Tragical History of Doctor Faustus”, by Christopher Marlowe, which is a book of approximately 100 000 characters that was chosen randomly from the Project Gutenberg.

      Frequency analysis can be used for cryptanalysis. However, one needs a lot of craft in its use, along with any information that can be gathered about the contents of the message and the sender.

      Now that the Vigenère cipher has been defined, we will show how to use the frequencies of letters in English, to break this cipher. We have two tasks.

       Find the keyword length.

       Find the keyword itself.

      We will use two fundamental principles in carrying out our tasks.

       “E” is the most frequent letter of the English language.

       Informally, written English tends to “repeat itself.” This means that the frequencies of a passage starting in position 1 are similar to the frequencies of the passage starting in position when we slide the text along itself.

      Once we obtain n, the key‐length, we can find the keyword itself. We do this by using the first fundamental property above. Namely, we exploit the statistics of the letters in English, or pairs of letters (i.e. digrams), or trigrams, etc.

      The second principle has two important interpretations. For the Babbage–Kasiski method, this means that if we find a repeated letter (or sequence of letters) in the cipher text there is a good chance that it comes from a given letter (or sequence of letters) in the plain text that has been enciphered by a given letter (or letters) in the key. Thus, there is a reasonable expectation that the distances between such repeated sequences of letters equals the key length or a multiple of the key length.

      The second principle has an important implication in terms of our second method, called the method of “coincidences,” as well. The basic idea is explained in an example below.

      The Babbage–Kasiski method

      To demonstrate this method for finding n, suppose we received the following cipher text:

EHMVL VDWLP WIWXW PMMYD PTKNF RHWXS
LTWLP OSKNF WDGNF DEWLP SOXWP HIWLL
EHMYD LNGPT EEUWE QLLSX TUP

      Our task is to search for repetitions in the above text. For a small cipher text, the brute‐force method is not too difficult. We focus on trigrams, and highlight some as follows:

images
EHM 60
WLP 25,15,40
XWP 39
MYD 45

      We note that with the exception of 39, 5 divides all of the distances. In fact, if we proceed with frequency analysis, it turns out that we can decipher this message with a key length of 5. The codeword is “ladel,” and the plain text is “Thor and the little mouse thought that they should douse the house with a thousand liters of lithium” (Who said that secret messages have to have a clear meaning!) Frequency analysis is used in our next example below.

      It is purely by chance that we had the repeated trigram WXP – this repeated trigram was not the result of the same three letters being enciphered by the same part of the keyword. This highlights the fact that the above method is probabilistic.

Скачать книгу