One-time Pads, Codebook Ciphers, History




CS166

Chris Pollett

Aug. 29, 2012

Outline

Introduction

One-Time Pad: Encryption Example

One Time Pad Encryption Example to encrypt Heil Hitler

One-Time Pad: Decryption Example

One Time Pad Decryption Example to recover message of last slide

But what was the Random String? - Part 1

Suppose the ciphertext was intercepted by the Americans and the receiver (thought to be on the American side) was a double agent. A double agent might claim the one-time pad was as follows, and so the receiver should be let go!

One Time Pad Decryption with fake key 1

But what was the Random String? - Part 2

Suppose the ciphertext was intercepted by the Americans and the sender was captured but not the key. The sender might claim the one-time pad was as follows, and so the sender should be let go!

One Time Pad Decryption with fake key 2

One-Time Pad Summary

A Real-World One-Time Pad --

VENONA Decrypt (1944)

[C% Ruth] learned that her husband [v] was called up by the army
but he was not sent to the front. He is a mechanical engineer
and is now working at the ENORMOUS [ENORMOZ] [vi] plant in 
SANTA FE, New Mexico. 

[45 groups  unrecoverable]

detain VOLOK [vii] who is working in a plant on ENORMOUS. He is a 
FELLOWCOUNTRYMAN  [ZEMLYaK] [viii]. Yesterday  he learned that 
they had dismissed him from his work. His active work 
in progressive organizations in the past was cause of his dismissal. 

In the FELLOWCOUNTRYMAN line LIBERAL is in touch with CHESTER [ix]. 
They meet once a month for the payment of dues. CHESTER is 
interested in whether we are satisfied with the collaboration and
whether there are not any misunderstandings. He does not inquire
about specific items of work [KONKRETNAYa RABOTA]. In  as much 
as CHESTER knows about the role of  LIBERAL's group we beg consent
to ask C. through LIBERAL about leads from among people who are 
working on ENOURMOUS and in other technical fields.

HW Exercise 1.11

(a) Give an example of biometric-based authentication.

A computer which allows you to log in by using your thumb print in a thumb print scanner would be an example of biometric authentication.

(b) Give an example of authentication based on something you have.

You might be allowed in to a building based on whether or not you have a RFID badge with the correct code in it.

(c) Give an example from everyday life where two-factor authentication is used. Which of "something you know", "something you have", "something you are" are used?

To get into my safety deposit box, I go through a door in which my hand is scanned. I then need a key to open the box. This two-factor authentication involves "something you have" (a deposit box key) and "something you are" (a unique hand print).

Codebook Cipher

Codebook Cipher: Additive

Zimmerman Telegram

Zimmerman's Telegram

Zimmerman Telegram Decrypted

Zimmerman's Telegram Decrypted

Random Historical Items

Election of 1876

Election of 1876 and Crypto

1876 Encryption Algorithm/Cryptanalysis

Example of 1876 Encryption/Decryption

Early 20th Century

Post-WWII History

Claude Shannon

Taxonomy of Cryptography

Taxonomy of Cryptanalysis

From perspective of info available to Trudy