Day1Fall06

Day1Fall06 - An Introduction to Cryptology and Coding...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College sarah.adams@olin.edu Gordon Prichett Babson College prichett@babson.edu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Communication System Digital Source Digital Sink Source Encoding Source Decoding Encryption Decryption Error Control Encoding Error Control Decoding Modulation Channel Demodulation
Background image of page 2
Cryptology Cryptography Inventing cipher systems; protecting communications and storage Cryptanalysis Breaking cipher systems
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cryptography
Background image of page 4
Cryptanalysis
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is used in Cryptology? Cryptography: Linear algebra, abstract algebra, number theory Cryptanalysis: Probability, statistics, combinatorics, computing
Background image of page 6
Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Key = 3 DEFGHIJKLMNOPQRSTUVWXYZABC Example Plaintext: OLINCOLLEGE Encryption: Shift by KEY = 3 Ciphertext: ROLQFROOHJH Decryption: Shift backwards by KEY = 3
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cryptanalysis of Caesar Try all 26 possible shifts Frequency analysis
Background image of page 8
Substitution Cipher Permute A-Z randomly: A B C D E F G H I J K L M N O P… becomes H Q A W I N F T E B X S F O P C… Substitute H for A, Q for B, etc. Example Plaintext: OLINCOLLEGE Key: PSEOAPSSIFI
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cryptanalysis of Substitution Ciphers Try all 26! permutations – TOO MANY! Bigger than Avogadro's Number! Frequency analysis
Background image of page 10
Map A, B, C, … Z to 0, 1, 2, …25 A B … M N T U 0 1 … 13 14 20 21 Plaintext: MATHISUSEFULANDFUN Key: NGUJKAMOCTLNYBCIAZ
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/11/2011 for the course MATH 110 taught by Professor Staff during the Winter '08 term at BYU.

Page1 / 32

Day1Fall06 - An Introduction to Cryptology and Coding...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online