寻找可能频率和以减小谐音替换密码的密钥空间

Floe Foxon
{"title":"寻找可能频率和以减小谐音替换密码的密钥空间","authors":"Floe Foxon","doi":"10.22186/jyi.38.1.1-5","DOIUrl":null,"url":null,"abstract":"Publication date: July 2020 Clearly, brute-force decryption attempts are an inefficient means of decryption. Fortunately, patterns in the distribution of letter frequencies in languages may be used to immediately identify which cipher characters are likely to represent which plaintext characters. For example, the letter ‘e’ is the most frequent letter in English text (Friedman, 1938), therefore the most frequent cipher character in a given monoalphabetic substitution cipher text likely represents the letter ‘e’. This frequency analysis approach may be repeated for all character frequencies in the cipher text for complete decryption. Homophonic substitution ciphers circumvent frequency analysis by mapping each character in a plaintext alphabet to multiple cipher characters (e.g. a {e, !}, b {~, q}, c {z, X}, etc.). In this way, the ciphertext alphabet is greater than the plaintext alphabet, and the frequency distribution of ciphertext characters does not immediately resemble that of the underlying plaintext language. For a cipher of this kind with two unique homophones mapped to each character of the plaintext English alphabet, there are ~1.2 × 1060 possible keys. A machine capable of one trillion decryption attempts per second would take ~3.8 × 1040 years to brute-force the entire key space. Decrypting such a cipher exhaustively in a reasonable amount of time is far beyond the current technological grasp of cryptanalysts (Diffie and Hellman, 1977), and consequently many homophonic substitution ciphers remain unsolved (Kahn, 2005). Arguably, the strongest decryption method for homophonic substitution ciphers is the hill-climbing algorithm (Dhavare et al., 2013), wherein a parent key is generated and used to decrypt the ciphertext, and the fitness of this decryption attempt is measured. The key is then modified, and another decryption attempt is made with this modified key. If the fitness of the modified attempt is better than the initial attempt, the modified key is carried forward; otherwise, INTRODUCTION Substitution ciphers are a form of encryption whereby each character in a plaintext message is substituted for a corresponding cipher character. These cryptograms have existed in various forms for millennia (Whitman and Herbert, 2017) and, for some time, were secure means of exchanging data and information due to the nature of their encryption (Singh, 2000). For a plaintext alphabet of 26 characters like the English language, a monoalphabetic substitution cipher key which maps each of these to different singular cipher characters (e.g. a e, b h, c z, etc.) is concealed by the vast size of the key space, or the number of possible mixed alphabet cipher keys. In this case, the key space is 26! ≈ 4 × 1026. A single machine capable of one billion decryption attempts per second would take ~13 billion years to brute-force every solution of such a cipher, which implies trying every possible key exhaustively. This number is comparable to the age of the observable universe (Planck Collaboration et al., 2016). Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers","PeriodicalId":74021,"journal":{"name":"Journal of young investigators","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers\",\"authors\":\"Floe Foxon\",\"doi\":\"10.22186/jyi.38.1.1-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Publication date: July 2020 Clearly, brute-force decryption attempts are an inefficient means of decryption. Fortunately, patterns in the distribution of letter frequencies in languages may be used to immediately identify which cipher characters are likely to represent which plaintext characters. For example, the letter ‘e’ is the most frequent letter in English text (Friedman, 1938), therefore the most frequent cipher character in a given monoalphabetic substitution cipher text likely represents the letter ‘e’. This frequency analysis approach may be repeated for all character frequencies in the cipher text for complete decryption. Homophonic substitution ciphers circumvent frequency analysis by mapping each character in a plaintext alphabet to multiple cipher characters (e.g. a {e, !}, b {~, q}, c {z, X}, etc.). In this way, the ciphertext alphabet is greater than the plaintext alphabet, and the frequency distribution of ciphertext characters does not immediately resemble that of the underlying plaintext language. For a cipher of this kind with two unique homophones mapped to each character of the plaintext English alphabet, there are ~1.2 × 1060 possible keys. A machine capable of one trillion decryption attempts per second would take ~3.8 × 1040 years to brute-force the entire key space. Decrypting such a cipher exhaustively in a reasonable amount of time is far beyond the current technological grasp of cryptanalysts (Diffie and Hellman, 1977), and consequently many homophonic substitution ciphers remain unsolved (Kahn, 2005). Arguably, the strongest decryption method for homophonic substitution ciphers is the hill-climbing algorithm (Dhavare et al., 2013), wherein a parent key is generated and used to decrypt the ciphertext, and the fitness of this decryption attempt is measured. The key is then modified, and another decryption attempt is made with this modified key. If the fitness of the modified attempt is better than the initial attempt, the modified key is carried forward; otherwise, INTRODUCTION Substitution ciphers are a form of encryption whereby each character in a plaintext message is substituted for a corresponding cipher character. These cryptograms have existed in various forms for millennia (Whitman and Herbert, 2017) and, for some time, were secure means of exchanging data and information due to the nature of their encryption (Singh, 2000). For a plaintext alphabet of 26 characters like the English language, a monoalphabetic substitution cipher key which maps each of these to different singular cipher characters (e.g. a e, b h, c z, etc.) is concealed by the vast size of the key space, or the number of possible mixed alphabet cipher keys. In this case, the key space is 26! ≈ 4 × 1026. A single machine capable of one billion decryption attempts per second would take ~13 billion years to brute-force every solution of such a cipher, which implies trying every possible key exhaustively. This number is comparable to the age of the observable universe (Planck Collaboration et al., 2016). Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers\",\"PeriodicalId\":74021,\"journal\":{\"name\":\"Journal of young investigators\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of young investigators\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22186/jyi.38.1.1-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of young investigators","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22186/jyi.38.1.1-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

显然,暴力破解尝试是一种低效的解密方式。幸运的是,语言中字母频率分布的模式可以用来立即识别哪些密码字符可能表示哪些明文字符。例如,字母“e”是英文文本中最常见的字母(Friedman, 1938),因此在给定的单字母替换密码文本中最常见的密码字符可能代表字母“e”。这种频率分析方法可以对密文中的所有字符频率重复,以完成解密。谐音替代密码通过将明文字母表中的每个字符映射到多个密码字符(例如a {e, !}, b {~, q}, c {z, X}等)来规避频率分析。这样,密文字母表大于明文字母表,并且密文字符的频率分布不会立即与底层明文语言的频率分布相似。对于这种密码,两个唯一的同音异义字映射到明文英文字母表的每个字符,有大约1.2 × 1060个可能的密钥。一台每秒能够进行1万亿次解密尝试的机器将需要3.8 × 1040年的时间来暴力破解整个密钥空间。在合理的时间内彻底解密这样的密码远远超出了密码分析人员目前的技术掌握(Diffie和Hellman, 1977),因此许多同音替代密码仍然没有解决(Kahn, 2005)。可以说,同音替换密码的最强解密方法是爬坡算法(dhahavare et al., 2013),该算法生成父密钥并用于解密密文,并测量该解密尝试的适合度。然后修改密钥,并使用修改后的密钥进行另一次解密尝试。如果修改后的尝试的适应度优于初始尝试,则将修改后的密钥结转;替换密码是一种加密形式,明文消息中的每个字符都被替换为相应的密码字符。这些密码已经以各种形式存在了数千年(Whitman和Herbert, 2017),并且在一段时间内,由于其加密的性质,它们是交换数据和信息的安全手段(Singh, 2000)。对于像英语这样的26个字符的明文字母表,将这些字符中的每个映射到不同的单个密码字符(例如a e, b h, c z等)的单字母替换密码密钥被密钥空间的巨大大小或可能的混合字母密码密钥的数量所隐藏。在本例中,键空间为26!≈4 × 1026。一台每秒能够进行10亿次解密尝试的机器将需要大约130亿年的时间来破解这样一个密码,这意味着要用尽可能的方法尝试每一个密钥。这个数字与可观测宇宙的年龄相当(Planck Collaboration et al., 2016)。寻找可能频率和以减小谐音替换密码的密钥空间
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers
Publication date: July 2020 Clearly, brute-force decryption attempts are an inefficient means of decryption. Fortunately, patterns in the distribution of letter frequencies in languages may be used to immediately identify which cipher characters are likely to represent which plaintext characters. For example, the letter ‘e’ is the most frequent letter in English text (Friedman, 1938), therefore the most frequent cipher character in a given monoalphabetic substitution cipher text likely represents the letter ‘e’. This frequency analysis approach may be repeated for all character frequencies in the cipher text for complete decryption. Homophonic substitution ciphers circumvent frequency analysis by mapping each character in a plaintext alphabet to multiple cipher characters (e.g. a {e, !}, b {~, q}, c {z, X}, etc.). In this way, the ciphertext alphabet is greater than the plaintext alphabet, and the frequency distribution of ciphertext characters does not immediately resemble that of the underlying plaintext language. For a cipher of this kind with two unique homophones mapped to each character of the plaintext English alphabet, there are ~1.2 × 1060 possible keys. A machine capable of one trillion decryption attempts per second would take ~3.8 × 1040 years to brute-force the entire key space. Decrypting such a cipher exhaustively in a reasonable amount of time is far beyond the current technological grasp of cryptanalysts (Diffie and Hellman, 1977), and consequently many homophonic substitution ciphers remain unsolved (Kahn, 2005). Arguably, the strongest decryption method for homophonic substitution ciphers is the hill-climbing algorithm (Dhavare et al., 2013), wherein a parent key is generated and used to decrypt the ciphertext, and the fitness of this decryption attempt is measured. The key is then modified, and another decryption attempt is made with this modified key. If the fitness of the modified attempt is better than the initial attempt, the modified key is carried forward; otherwise, INTRODUCTION Substitution ciphers are a form of encryption whereby each character in a plaintext message is substituted for a corresponding cipher character. These cryptograms have existed in various forms for millennia (Whitman and Herbert, 2017) and, for some time, were secure means of exchanging data and information due to the nature of their encryption (Singh, 2000). For a plaintext alphabet of 26 characters like the English language, a monoalphabetic substitution cipher key which maps each of these to different singular cipher characters (e.g. a e, b h, c z, etc.) is concealed by the vast size of the key space, or the number of possible mixed alphabet cipher keys. In this case, the key space is 26! ≈ 4 × 1026. A single machine capable of one billion decryption attempts per second would take ~13 billion years to brute-force every solution of such a cipher, which implies trying every possible key exhaustively. This number is comparable to the age of the observable universe (Planck Collaboration et al., 2016). Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automated Exposure Notification for COVID-19. Does Providing Hiding Spaces for Zebrafish in Large Groups Reduce Aggressive Behaviour? Structural Analysis of a New Saccharomyces cerevisiae α-glucosidase Homology Model and Identification of Potential Inhibitor Enzyme Docking Sites The Engineering of Natural Killer Cells as an Emerging Adoptive Cancer Immunotherapy A Novel Nickel-Titanium Wire-Actuated Prosthetic Motor Clutch
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1