Alternativní heslo

Jednoduché náhradní heslo

Simplereplacementencryptionisanencryptionmethodthatchangestheorderoflettersinthealphabetinaspecificwayandwritesinthisorder.Suchachangedalphabetiscalledthe‘replacementtable’.Thesubstitutiontablecanbeconstructedinanoffsetorreverse(CaesarandAtbashcode(English:Atbash),respectively)ormorecomplexways,inthiscaseitiscalleda‘hybridtable’.Traditionally,akeywordiswrittenatthebeginningofthealphabet,andthenrepeatedlettersaredeleted,sothatamixedtablecanbeobtained.

Příklad

Pomocí systému hybridní tabulky je klíčové slovo "zebry":

TheplaintextisABCDEFGHIJKLMNOPQRSTUVWXYZ;theciphertextisZEBRASCDFGHIJKLMNOPQTUVWXY.

Prostý text je:objevený.fleeatonce;výsledek šifrování:SIAAZQLKBA.VAZOARFPBLUAOAR.

Šifrový text tradičně vynechá interpunkci a mezery a bude mít jednotku s pevnou délkou, aby se předešlo chybám při přenosu a zobrazovaly hranice slov v prostém textu v přestrojení.

SIAAZQLKBAVAZOARFPBLUAOAR

Ifthelengthoftheplaintextisnotdivisiblebyfive,itwillneedtobeattheendFillinwith"NULL".Theseemptycharacterscanbeanycharacters,becauseafterdecryption,itcanbeseenthattheyareobviousnonsense(suchasORANGEOOOO),sothereceivercaneasilyfindanddiscardthem.Ifthereceiverfindsthatthelengthoftheciphertextisnotdivisiblebyfive,itcanbeinformedthatthereisatransmissionerrorandrequestaretransmission.

Sometimesasimplereplacementpassworddoesnothavetobereplacedwithanotherletter.Forexample,inapigstypassword,theciphertextiscomposedofgridsymbols.

Theincreasedsecurityofthesefunctionsisnotmuchdifferentfrombefore,becausebasicallyallstrangesymbolswilleventuallybeconvertedintoA-Zletters.Sometimessalespeopleuseverysimpleencryptionintheirlistsandcatalogs:lettersareusedinsteadofnumbers.

Tento článek(čísla):1234567890;šifrované dopisy:MAKEPROFIT.

Příklad:MATstandsfor120.

Bezpečnostní

Thedisadvantageofsimplereplacementpasswordsisthatthelastfewlettersofthealphabet(mostofwhicharelowfrequency)tendtostayattheend.Thewaytostrengthenistodoacolumntranspositionagainafterencryption,butthisisoftennotdone.

Althoughthekeyusedforencryptionisverylikely(26!≈2^88.4,if88bits),itisextremelyeasytocracksingle-tableencryption.Aslongasareasonablelengthofciphertextisprovided,cryptanalysiscaninferthemeaningofthemostcommonunitthroughfrequencydistributionanalysis,thatis,frequencyanalysis.Thisallowsthecrackertousetheeliminationmethodtosolvethemeaningofaunit.Seeanexampleofcracking.Insomecases,itcanbedecipheredfromthepatternoftheirletters.Forexample,"attract"and"osseous"aretheonly"roots"ofthe"ABBCADB"modeinEnglish To znamená, že pokud narazíte na protišifrovací text s jednoduchým náhradním heslem "ABBCADB", lze předpokládat, že "přitahuje" nebo "kostní".

AccordingtotheEnglishuniquesolutiondistance(English:Unicitydistance),theaverageciphertextrequiresatleast27.6letterstocrackthesimplereplacementpasswordofthemixedtable.Undernormalcircumstances,itisassumedthatthenewarrangementisencountered,butusuallyabout50lettersarerequired(someoftheciphertextscanbeusedless).However,whentheciphertexthasanextremelyflatfrequencydistribution,thedemandforthelengthoftheciphertextmaybecomegreater.Atthesametime,theencryptorcanaddnullcharacterstocreateaflatfrequencydistribution.

Inaddition,thereisanotherwayto"fake"thefrequencydistribution,whichiscalledmissingcharacters.Asthenamesuggests,thesearticlesdeliberatelyavoidusingoneorafewspecificletters.IfitisEthatismissed,thenitisimpossibletofindtherealplaintextifwecontinuetoanalyzethenormalfrequency(estimatethehighestfrequencyasE).

Metoda homofonní substituce

Inearlyencryption,inordertoincreasethestrengthofalternativepasswordstodealwithfrequencyanalysisattacks,sometimes"homonyms"wereusedtochangethefrequencyofplaintextletters.Inthisencryptionalgorithm,plaintextletterscanbemappedtomultipleciphertextsymbols.Normally,theplaintextsymbolswiththehighestfrequency(suchasE)willhavemorehomophonicsymbolsthanthelow-frequencyletters(suchasX),makingthefrequencydistributionflatterandmakinganalysismoredifficult.

Butalsobecauseofthis,justreplacingtheletterswitheachotherwillcauseinsufficientdistribution,andthereareseveraldifferentsolutions.Thesimplestwayistoreplacesomeletterswithatotalof10numbersfrom1-0.Anothermethodistoseparatetheexistinglettersintotheoriginalletterswithsimplechanges,uppercase,lowercase,upside-downletters,mirroredtext(leftandright),etc.Althoughitismoreartistic,itdoesnotmeanthatitissafer.Someofthehomophonicsubstitutionmethodsallusenewlyinventedstrangesymbolstorepresentletters.

Aninterestingchangeisnamednamingcryptography(English:nomenclator).Therearemanydifferentversionsofthisencryptionmethod,andthedifferencebetweenthemcomesfromitsprefix.Theprefixcomesfromthenameofthepublicofficialwhoannouncesthetitleofthevisitingguest.Thiskindofcipheriscombinedwithasmallcodebook(English:Codebook)toformalargehomophonicreplacementtable.Inthispassword,commonwordswillbeencryptedaccordingtothecodebook,andtheremainingletterswillbeencryptedaccordingtoanothercodebook.Thetwosymbolsarefinallymixedintheciphertexttoreducetheriskofcrackinginthesimplereplacementpassword.ThecodeusedbyLouisXIVwasagreatcodecreatedbytheRossignols(English:Rossignols),whichwasnotcrackeduntilahundredyearsaftertheabolitionoftheFrenchroyalfamily.

Fromtheearly15thcenturytothelate18thcentury,namedpasswordswerethemostcommonlyusedencryptionfordiplomaticdocumentsandspies,butmostofthemstillusednamedpasswordswithpoorencryptionperformance.Althoughcryptanalystsofgovernmentintelligenceagencieshavecrackedsomeofthenomenclaturecodessincethemiddleofthesixteenthcentury,theusualresponseofusersissimplytoincreasethehomophonicsubstitutiontable.Whenthehomophonicsubstitutionsystembegantodieoutinthelateeighteenthcentury,somenamedpasswordshadasmanyas50,000symbols.

However,notallnamedciphershavebeencracked.Tothisday,therearestillnewsthatnewnamedpasswordshavebeencrackedfromtimetotime.

TheBillCipherisanotherexampleofhomophonicsubstitution.ThisstoryreferstotheuseofanencryptedtexttohidethetreasuresdescribedintheUnitedStatesDeclarationofIndependencebetween1819and1821.Here,eachciphertextcharacterisreplacedbyanumber.ThenumberrepresentsthefirstletterofthefirstfewwordsintheDeclarationofIndependence.ManywordsintheDeclarationofIndependencehavethesamefirstletter,andtheciphertextnumbercanbeanyoneofthem.Forexample,thesecondandsixthwordsinthemaintextbothstartwith"I",thatis,"I"canbe2orItcanbe6.Theinterpretationisjusttoputthenumbersintheciphertext(suchasthealgebraX)intotheDeclarationofIndependence(thefirstletteroftheX-thword).

Starrdescribedanotherhomophonicreplacementpassword,whosepasswordwasthefirstattempttoencryptonacomputerdatabase.InStarr'smethod,bothplaintextandciphertextarestoredinbinarystrings,sothenumberofhomophonicsoundscanbeverylarge,makingfrequencyanalysismoredifficultthanusual.

Bookcipher(English:Bookcipher)andhashboardarebothakindofhomophonicreplacementcipher.

Šifrování substitucí více tabulek

In1467,themulti-tablesubstitutionpasswordwasfirstdescribedintheformofadiscbyLeonBattistaAlberti.Atable(AncientGreek:tableau)isintroducedin"Steganography"(AncientGreek:Steganographia)byJohannesTritmius(seebelow;completedinthe15thcenturybutpublishedalongtimelater)).In1563,GiovanniBattistadelaPorta(English:Giovanni_Battista_della_Porta)describedamorecomplexmixed-letterversionin"HiddenCharactersinWriting"(AncientGreek:DeFurtivisLiterarumNotis).

Inamulti-tablereplacementpassword,multipleletterswillbeusedasthepassword.Inordertospeedupencryptionordecryption,alllettersareusuallywrittenonaform,whichiscalledtableauincryptography.Thiskindofformisusually26×26,becauseitcanfitall26Englishletters.Themethodoffillingintheformandselectingtheletterstobeusednexttimeistoreplacethedefinitionsbetweendifferentmulti-letterpasswords.Multi-letterreplacementpasswordsaremoredifficulttobreakthansingle-letterpasswords,becausetheyhavemorepossibilitiesforreplacementandrequirelongerciphertexts.

OneofthemostfamousistheVirginiaCodeintroducedbyGeovanBattistaBellasoin1585.Ithasnotbeencrackeduntil1863.TheFrenchcallit"acodethatcannotbedeciphered"(French:lechiffreindéchiffrable).(ThispasswordwasmistakenlythoughttobecreatedbyBrycedeVirginia,soitwascalledtheVirginiapassword.)

IntheVirginiapassword,thefirstrowofthetableJustfillin26lettersdirectly,andthenthelettersineachrowbelowareoffsetbyonespacetotheleft.(Thisiscalledatabletraverse,andmathematically,eachcolumniscongruence26.)Tousethiskindofpassword,youneedtouseakeywordasthekey.Repeateachtimethekeywordisusedup.Assumingthatthekeywordis"CAT",thefirstwordoftheplaintextisencryptedby"C",thesecondwordisencryptedby"A",thethirdwordisencryptedby"T",andthenbacktoCencryption,repeating.Thenencryptitaccordingtothepasswordtableontheright.Forexample,whenBALLusesCATasakeyword,itwillbeencryptedtoDAEN.Itcanbeseenthateventhesame"L"willbeencryptedtoanotherletter.Inreality,thekeywordsoftheVirginiapasswordareverylong.

In1863,MajorFriedrichKasiski(English:FriedrichKasiski)inventedamethod(itwassecretlyandindependentlyinventedbyCharlesBabbagebeforetheCrimeanWar)),whichmakesitpossibletocalculatethelengthofthekeywordintheVirginiapassword.Thismethodrequiresalongerciphertext,becauseitsoperationreliesonfindingthenumberofcommonwords(suchasTHE)thatusethesamekeywords(suchasABC).Therefore,itisdifficulttofindveryshortciphertextsbythismethod.

Therefore,eventoday,ifyouusehybridtableencryptioninthetable,orifthekeywordsarerandom,theVirginiacipheristheoreticallydifficulttocrack.Butbecausethesemethodsareactuallydifficulttouse,theuseofVirginiaciphersisbecominglessandless.

Mezi další známé šifrování pro substituci více písmen patří:

Glanschfeldcipher-similartotheVirginiacipher,butbecausetheentirecipherusesonly10units,thekeyisThewordlengthislimitedanditiseasytocrack.BeaufortCipher-ThisisactuallytheVirginiaCipher,exceptthat"tabula"isshiftedbackwardbyonegrid,mathematicallytheequationis:ciphertext=key-plaintext.TheBeaufortcipherbelongstopeer-to-peerencryption,thatis,theencryptionalgorithmisthesameasthedecryptionalgorithm.Automatickeycipher-Ithasakeywordatthebeginningofthekey,followedbyarepetitionofplaintexttoavoidperiodicfunctions.Thesportskeypassword,keywordsaretakenfromsomearticlesorfamoussentences,soitcanbeverylong.

Itcanbeseenfrommodernstreamciphersthatmodernmulti-tablesubstitutionencryptionstrivestoimprovethestreamkeytomakeitaslongaspossibleandunpredictable.

Šifrování výměny formátu tabulky

Inthetableformatreplacementpassword,theplaintextnolongerreplacesaletteralone,butreplacesalargerletterunit(usuallyapairofletters)atonetime).Thefirstadvantageisthatthefrequencydistributionisflatterthanthatofasingleletter(althoughitisactuallynotflat,becauseineverydaylanguage,"TH"ismuchmorecommonthan"XQ").Secondly,thelargenumberofsymbolsitgeneratesrequiresmoreciphertextforefficientletterfrequencyanalysis.

Chcete-li nahradit každý"pár"písmen,budevyžadovánocelkem676symbolů(26^2=676).V dříve uvedené knize "Skryté znaky v psaní"nastavtenavrženýsystém:použijte20x20tabulku(20písmenvitalštiněnebolatinskriptu,praxe,kterýjesystémspeciálněvyplněnývícejakvkolikaždémpísmen.

TheearliestpracticaltableformatreplacementcodeisthePorefercodecreatedbySirCharlesWheatstonein1854.Inthispassword,the5×5squareisfilledwithmixedletters(twoletters,usuallyIandJaresidebyside,thatis,IequalsJ).Everytwolettersintheplaintextareaunit,usuallythisunitwillformasquareonthetable(thecontentoftheunitoccupiestwocorners),andthentaketheothertwocornersastheciphertext.Whenthecellcontentisinthesamecolumnorrow(thatis,itcannotformasquare),theciphertextofthesamecolumnistheplaintextoffsetbyonegrid;theciphertextofthesamecolumnistheplaintextoffsetbyonegrid.Forthetwounitswiththesameletter,addX(orQ)tothefrontofthelist(thatis,allofthemareshiftedbackbyonegrid).ThePoreficipherwasusedformilitarypurposesfromthebeginningoftheSecondBohrWaruntiltheSecondWorldWar.

V roce 1901 FelixDelastelle (anglicky:Felix_Delastelle) zavedl další praktickou tabulku pro šifrování na místo, včetně dvoudílného (anglicky:Bifid_cipher), čtyřstranného a třídílného šifrovacího hesla.

LesterS.Hill(English:LesterS.Hill)inventedtheHillcipherin1929,whichisatableformatreplacementencryption.Hillciphercanuselinearalgebratocombineunitswithverymanyletters.Eachletteristreatedasahexadecimalnumber:A=0,B=1,andsoon.(Insomevariants,3extrasymbolsareaddedtoturnthebaseintoaprimenumber.)Astringoflettersistreatedasann-dimensionalvector,multipliedbyann×nmatrix,andtheresultiscongruence26.Payattentiontothematrix(key)usedforencryption, jinak to nebude možné dekódovat. Pouze determinant matice a 26 jsou vzájemně prvočísla, jsou invertovatelné.

BecausetheHillcipheriscompletelybasedonalinearrelationship,itwillbevulnerabletoknown-plaintextattack(English:Known-plaintextattack),therefore,sometimesitwillcombinesomenon-linearstepstoreducebeingbrokenchance.

MechanicalReplacementEncryption

ComputersthatwerewidelyusedduringtheFirstWorldWar(somegovernmentsbegantousetheminthe1950sand1960s;otherorganizationsLater,therewasnorecordofpersonalusebefore1975),makingthemulti-lettersubstitutionpasswordwidelyusedmechanically.Severalinventorshadsimilarideasatthesametime.Therewerefourpatentapplicationsforrotatingdisks(English:Rotormachine)in1919.OneofthemostimportantandfamousistheEnigmaciphermachineusedbytheGermanWehrmachtinthe1930s.Atthesametime,theAlliedforcesalsohadtheirownencryptionsystems:Sigaba(English:SIGABA)intheUnitedStatesandTypex(English:Typex)intheUnitedKingdom.

Thesimilaritybetweenthemisthattheybothusemechanicalrotatingdisksforencryption.Sincemorethanonerotatingdiskiscomposedofciphertext,ifeachwordisequippedwithasymbol,theamountofsymbolswillbehigherthantheastronomicalnumber.However,earlyversionsofthesemachinesareextremelyeasytocrack.WilliamF.FriedmanoftheSignalIntelligenceService,WilliamF.Friedman(English:WilliamF.Friedman)foundtheHebernRotor(English:Hebern_Rotor_Machine)vulnerabilitiesearlyon;GovernmentCryptographySchool(English:DillwynKnoxofGC%26CS(English:DillwynKnox)​​crackedtheversionoftheEnigmacipherwithoutaterminalboardbeforeWorldWarII.TheanalystsatBletchleyParkwereabletocrackthemilitaryversionoftheEnigmaciphermachineatalaterstage,inspiredbythePolishmathematicianMarianRejewski.

SIGABAandTypexencryptedmessageshavenotbeencrackedbythepublic.

Jednorázová podložka

Jednorázová podložkaisaveryspecialreplacementpassword.ItwasestablishedbyJosephMauborgneinthelateWorldWarI.DuringtheSecondWorldWar,ClaudeShannonprovedmathematicallythatitssecrecywasunbreakable,andtheprocesswasfirstpublishedinlate1940.Incommonpractice,theone-timepadcanbereferredtoasaone-timereplacementpassword.Normally,theplaintextletterswillbecombined(notreplaced)withkeywordsinsomeway(usuallyalogicalexclusiveOR).

Jednorázová podložkasareimpracticalordifficulttouseinmostcasesbecausetheyrequirekeywordstobethesame(orlonger)astheplaintext,"completely"random,andcanonlybeusedonce.Makesurethateveryoneexceptthesenderandreceiverdoesnotknow.Whenoneoftheseconditionsisnotimplemented,orevenonlyslightlyviolated,theone-timepadisnolongerindestructible,orevencollapsed.TheUnitedStatesusedanon-randomone-timepadtoencryptmessagesduringWorldWarIIbeforesendingthemtotheSovietUnion.Americancryptographershavebeenabletocrackveryfewone-timepadssincethe1940s.(SeetheVENONAproject(English:Venonaproject))

AftertheCubancrisis,theMoscow-Washingtonhotlinebegantouseone-timepasswordstoencryptmessages.

Moderní alternativní šifrování

Theabove-mentionedalternativepasswords,especiallythosemanualencryptionpasswordsthatonlyusepencilandpaper,arenolongerusedfrequently.However,eventoday,theconceptofreplacementencryptionisstilladvancing.Fromanovelperspective,modernbit-orientedblockciphers(suchasdataencryptionstandardsandhigh-levelencryptionstandards)canstillberegardedasalternativeencryptionusingalargenumberofbinaryletters.Inaddition,blockciphersusuallycontainasmallerreplacementtablenamedS-box(English:S-box),whichalsocontainsalogicalexclusiveORalgorithm.SeeSubstitution-permutation_network(English:Substitution-permutation_network).

Sekvenční výměna hesel

ROT5,ROT13,ROT18,ROT47encodingisasimplecodeelementpositionsequencereplacementpassword.Thistypeofcodeisreversibleandcanbeself-decrypted.Itismainlyusedtorespondtofastbrowsingormachinereadingwithoutallowingittounderstanditsmeaning.

ROT5istheabbreviationofrotateby5places,whichmeanstorotate5places,allothersarethesame.Let'stalkabouttheirencodingmethodsrespectively:ROT5:Onlyencodethenumber,replacethecurrentnumberwiththefifthnumberfromthepreviousnumber,forexample,thecurrentnumberis0,anditbecomes5afterencoding.Thecurrentvalueis1,anditbecomes6afterencoding,andsoon.ROT13:Onlyencodetheletters,replacethecurrentletterwiththe13thletterfromthecurrentletter,forexample,thecurrentletterisA,afterencoding,itbecomesN,thecurrentisB,andafterencoding,itbecomesO,Andsoon.ROT18:Thisisaheterogeneous,originallythereisno,itisacombinationofROT5andROT13,forthesakeofgoodtitle,nameditROT18.ROT47:Encodenumbers,letters,andcommonlyusedsymbols,andperformpositionreplacementaccordingtotheirASCIIvalue,andreplacethecurrentcharacterwiththecorrespondingcharacterofthe47thdigitfromthepreviousASCIIvalueofthecurrentcharacter,forexample,thecurrentcharacterislowercaseTheletterzbecomesacapitalletterKafterencoding,thecurrentnumberis0,anditbecomesthesymbol_afterencoding.TheASCIIvaluerangeofcharactersusedforROT47encodingis33-126.Fordetails,pleaserefertoASCIIencoding.

Související články
HORNÍ