| |
| |
Note to the Reader | |
| |
| |
Introduction | |
| |
| |
Acknowledgments | |
| |
| |
| |
Classical Cryptology | |
| |
| |
| |
Ancient Roots | |
| |
| |
| |
Caveman Crypto | |
| |
| |
| |
Greek Cryptography | |
| |
| |
| |
Skytale Cipher | |
| |
| |
| |
Polybius Cipher | |
| |
| |
| |
Viking Cryptography | |
| |
| |
| |
Early Steganography | |
| |
| |
References and Further Reading | |
| |
| |
| |
Monalphabetic Substitution Ciphers, or MASCs: Disguises for Messages | |
| |
| |
| |
Caesar Cipher | |
| |
| |
| |
Other MASC Systems | |
| |
| |
| |
Edgar Allan Poe | |
| |
| |
| |
Arthur Conan Doyle | |
| |
| |
| |
Frequency Analysis | |
| |
| |
| |
Biblical Cryptology | |
| |
| |
| |
More Frequencies and Pattern Words | |
| |
| |
| |
Vowel Recognition Algorithms | |
| |
| |
| |
Sukhotin's Method | |
| |
| |
| |
More MASCs | |
| |
| |
| |
Cryptanalysis of a MASC | |
| |
| |
| |
Unsolved Ciphers by a Killer and a Composer | |
| |
| |
| |
Affine Ciphers | |
| |
| |
| |
Morse Code and Huffman Coding | |
| |
| |
| |
MASC Miscellanea | |
| |
| |
| |
Nomenclators | |
| |
| |
| |
Cryptanalysis of Nomenclators | |
| |
| |
| |
Book Codes | |
| |
| |
References and Further Reading | |
| |
| |
| |
Simple Progression to an Unbreakable Cipher | |
| |
| |
| |
Vigen�re Cipher | |
| |
| |
| |
History of the Vigen�re Cipher | |
| |
| |
| |
Cryptanalysis of the Vigen�re Cipher | |
| |
| |
| |
Kryptos | |
| |
| |
| |
Autokeys | |
| |
| |
| |
Running Key Cipher and Its Cryptanalysis | |
| |
| |
| |
One-Time Pad or Vernam Cipher | |
| |
| |
| |
Breaking the Unbreakable | |
| |
| |
| |
Faking Randomness | |
| |
| |
| |
Unsolved Cipher from 1915 | |
| |
| |
| |
OTPs and the SOE | |
| |
| |
| |
History Rewritten! | |
| |
| |
References and Further Reading | |
| |
| |
| |
Transposition Ciphers | |
| |
| |
| |
Simple Rearrangements and Columnar Transposition | |
| |
| |
| |
Rail-Fence Transposition | |
| |
| |
| |
Rectangular Transposition | |
| |
| |
| |
More Transposition Paths | |
| |
| |
| |
Cryptanalysis of Columnar Transposition | |
| |
| |
| |
Historic Uses | |
| |
| |
| |
Anagrams | |
| |
| |
| |
Double Transposition | |
| |
| |
| |
Word Transposition | |
| |
| |
| |
Civil War Reenactors | |
| |
| |
| |
Transposition Devices | |
| |
| |
References and Further Reading | |
| |
| |
| |
Shakespeare, Jefferson, and JFK | |
| |
| |
| |
Shakespeare vs. Bacon | |
| |
| |
| |
Thomas Jefferson: President, Cryptographer | |
| |
| |
| |
Cipher Wheel Cryptanalysis | |
| |
| |
| |
Playfair Cipher | |
| |
| |
| |
Playfair Cryptanalysis | |
| |
| |
| |
Computer Cryptanalysis | |
| |
| |
| |
Kerckhoffs' Rules | |
| |
| |
References and Further Reading | |
| |
| |
| |
World War I and Herbert O. Yardley | |
| |
| |
| |
Zimmermann Telegram | |
| |
| |
| |
ADFCX: A New Kind of Cipher | |
| |
| |
| |
Cryptanalysis of ADFGX | |
| |
| |
| |
Herbert O. Yardley | |
| |
| |
| |
Peacetime Victory and a Tell-All Book | |
| |
| |
| |
The Case of the Seized Manuscript | |
| |
| |
| |
Cashing in, Again | |
| |
| |
| |
Herbert O. Yardley: Traitor? | |
| |
| |
| |
Censorship | |
| |
| |
References and Further Reading | |
| |
| |
| |
Matrix Encryption | |
| |
| |
| |
Levine and Hill | |
| |
| |
| |
How Matrix Encryption Works | |
| |
| |
| |
Levine's Attacks | |
| |
| |
| |
Bauer and Millward's Attack | |
| |
| |
| |
More Stories Left to Tell | |
| |
| |
References and Further Reading | |
| |
| |
| |
World War II: The Enigma of Germany | |
| |
| |
| |
Rise of the Machines | |
| |
| |
| |
How Enigma Works | |
| |
| |
| |
Calculating the Keyspace | |
| |
| |
| |
Cryptanalysis Part 1. Recovering the Rotor Wirings | |
| |
| |
| |
Cryptanalysis Part 2. Recovering the Daily Keys | |
| |
| |
| |
After the Break | |
| |
| |
| |
Alan Turing and Bletchley Park | |
| |
| |
| |
Lorenz Cipher and Colossus | |
| |
| |
| |
What if Enigma Had Never Been Broken? | |
| |
| |
| |
Endings and New Beginnings | |
| |
| |
References and Further Reading | |
| |
| |
| |
Cryptologic War against Japan | |
| |
| |
| |
Forewarning of Pearl Harbor | |
| |
| |
| |
Friedman's Team Assembles | |
| |
| |
| |
Cryptanalysis of Red, a Japanese Diplomatic Cipher | |
| |
| |
| |
Orange | |
| |
| |
| |
Purple: How It Works | |
| |
| |
| |
Purple Cryptanalysis | |
| |
| |
| |
Practical Magic | |
| |
| |
| |
Code Talkers | |
| |
| |
| |
Code Talkers in Hollywood | |
| |
| |
| |
Use of Languages as Oral Codes | |
| |
| |
References and Further Reading | |
| |
| |
| |
Modern Cryptology | |
| |
| |
| |
Claude Shannon | |
| |
| |
| |
Entropy | |
| |
| |
| |
One More Time | |
| |
| |
| |
Unicity Points | |
| |
| |
| |
Dazed and Confused | |
| |
| |
References and Further Reading | |
| |
| |
| |
National Security Agency | |
| |
| |
| |
Origins of NSA | |
| |
| |
| |
TEMPEST | |
| |
| |
| |
Size and Budget | |
| |
| |
| |
The Liberty and the Pueblo | |
| |
| |
| |
Church Committee Investigations | |
| |
| |
| |
Post Cold War Downsizing | |
| |
| |
| |
Some Speculation | |
| |
| |
| |
2000 and Beyond | |
| |
| |
| |
Interviewing with NSA | |
| |
| |
| |
BRUSA, UKUSA, and Echelon | |
| |
| |
References and Further Reading | |
| |
| |
| |
Data Encryption Standard | |
| |
| |
| |
How DES Works | |
| |
| |
| |
Reactions to and Cryptanalysis of DES | |
| |
| |
| |
Objection 1: Key Size Matters | |
| |
| |
| |
Objection 2: S-Box Secrecy | |
| |
| |
| |
S-Boxes Revealed! | |
| |
| |
| |
EFF vs. DES | |
| |
| |
| |
Second Chance | |
| |
| |
| |
Interesting Feature | |
| |
| |
| |
Cryptologic Humor | |
| |
| |
| |
Modes of Encryption | |
| |
| |
| |
Levine's Methods | |
| |
| |
| |
Modern Modes | |
| |
| |
References and Further Reading | |
| |
| |
| |
Birth of Public Key Cryptography | |
| |
| |
| |
Revolutionary Cryptologist | |
| |
| |
| |
Diffie-Hellman Key Exchange | |
| |
| |
| |
RSA: Solution from MIT | |
| |
| |
| |
Fermat's Little Theorem (1640) | |
| |
| |
| |
Euclidean Algorithm | |
| |
| |
| |
Government Control of Cryptologic Research | |
| |
| |
| |
RSA Patented, Alice and Bob Born Free | |
| |
| |
References and Further Reading | |
| |
| |
| |
Attacking RSA | |
| |
| |
| |
Eleven Non-Factoring Attacks | |
| |
| |
| |
Attack 1. Common Modulus Attack | |
| |
| |
| |
Attack 2. Man-in-the-Middle | |
| |
| |
| |
Attack 3. Low Decryption Exponent | |
| |
| |
| |
Attack 4. Partial Knowledge of p or q | |
| |
| |
| |
Attack 5. Partial Knowledge of d | |
| |
| |
| |
Attack 6. Low Encryption Exponent Attack | |
| |
| |
| |
Attack 7. Common Enciphering Exponent Attack | |
| |
| |
| |
Attack 8. Searching the Message Space | |
| |
| |
| |
Attack 9. Adaptive Chosen Ciphertext Attacks | |
| |
| |
| |
Attack 10. Timing Attack | |
| |
| |
| |
Attack 11. Ron Was Wrong, Whit Is Right Attack | |
| |
| |
| |
Factoring Challenge | |
| |
| |
| |
Old Problem | |
| |
| |
| |
Trial Division and the Sieve of Eratosthenes (ca. 284-204 BCE) | |
| |
| |
| |
Fermat's Factorization Method | |
| |
| |
| |
Euler's Factorization Method | |
| |
| |
| |
Pollard's p-1 Algorithm | |
| |
| |
| |
Dixon's Algorithm | |
| |
| |
| |
Quadratic Sieve | |
| |
| |
| |
Pollard's Number Field Sieve | |
| |
| |
| |
Other Methods | |
| |
| |
| |
Cryptological Humor | |
| |
| |
References and Further Reading | |
| |
| |
| |
Primality Testing and Complexity Theory | |
| |
| |
| |
Some Facts about Primes | |
| |
| |
| |
Fermat Test | |
| |
| |
| |
Miller-Rabin Test | |
| |
| |
| |
Generating Primes | |
| |
| |
| |
Deterministic Tests for Primality | |
| |
| |
| |
AKS Primality Test (2002) | |
| |
| |
| |
GIMPS | |
| |
| |
| |
Complexity Classes, P vs. NP, Probabilistic vs. Deterministic | |
| |
| |
| |
Cryptologic Humor | |
| |
| |
| |
Ralph Merkle's Public Key Systems | |
| |
| |
| |
Knapsack Encryption | |
| |
| |
| |
Elgamal Encryption | |
| |
| |
References and Further Reading | |
| |
| |
| |
Authenticity | |
| |
| |
| |
Problem from World War II | |
| |
| |
| |
Digital Signatures (and Some Attacks) | |
| |
| |
| |
Attack 12. Chosen Ciphertext Attack | |
| |
| |
| |
Attack 13. Insider's Factoring Attack on the Common Modulus | |
| |
| |
| |
Attack 14. Insider's Nonfactoring Attack | |
| |
| |
| |
Elgamal Signatures | |
| |
| |
| |
Hash Functions: Speeding Things Up | |
| |
| |
| |
Rivest's MD5 and NIST's SHA-1 | |
| |
| |
| |
Digital Signature Algorithm | |
| |
| |
References and Further Reading | |
| |
| |
| |
Pretty Good Privacy | |
| |
| |
| |
Best of Both Worlds | |
| |
| |
| |
Birth of PGP | |
| |
| |
| |
In Zimmermann's Own Words | |
| |
| |
| |
Impact of PGP | |
| |
| |
| |
Implementation Issues | |
| |
| |
References and Further Reading | |
| |
| |
| |
Stream Ciphers | |
| |
| |
| |
Congruential Generators | |
| |
| |
| |
Linear Feedback Shift Registers | |
| |
| |
| |
LFSR Attack | |
| |
| |
| |
Cellphone Stream Cipher A5/1 | |
| |
| |
| |
RC4 | |
| |
| |
References and Further Reading | |
| |
| |
| |
Suite B All-Stars | |
| |
| |
| |
Elliptic Curve Cryptography | |
| |
| |
| |
Elgamal, ECC Style | |
| |
| |
| |
Personalities behind ECC | |
| |
| |
| |
Advanced Encryption Standard (AES) | |
| |
| |
| |
SubBytes | |
| |
| |
| |
ShiftRows | |
| |
| |
| |
MixColumns | |
| |
| |
| |
AddRoundKey | |
| |
| |
| |
Putting It All Together: How AES-128 Works | |
| |
| |
| |
AES Attacks | |
| |
| |
| |
Security Guru Bruce Schneier | |
| |
| |
References and Further Reading | |
| |
| |
| |
Possible Futures | |
| |
| |
| |
Quantum Cryptography: How It Works | |
| |
| |
| |
Quantum Cryptography: Historical Background | |
| |
| |
| |
DNA Computing | |
| |
| |
References and Further Reading | |
| |
| |
Index | |