Vaihtoehtoinen salasana

Yksinkertainen vaihtosalasana

Simplereplacementencryptionisanencryptionmethodthatchangestheorderoflettersinthealphabetinaspecificwayandwritesinthisorder.Suchachangedalphabetiscalledthe‘replacementtable’.Thesubstitutiontablecanbeconstructedinanoffsetorreverse(CaesarandAtbashcode(English:Atbash),respectively)ormorecomplexways,inthiscaseitiscalleda‘hybridtable’.Traditionally,akeywordiswrittenatthebeginningofthealphabet,andthenrepeatedlettersaredeleted,sothatamixedtablecanbeobtained.

Esimerkki

Hybriditaulukkojärjestelmää käytettäessä avainsana on "seeprat":

TheplaintextisABCDEFGHIJKLMNOPQRSTUVWXYZ;theciphertextisZEBRASCDFGHIJKLMNOPQTUVWXY.

Selkeä teksti:fleeatonce.wearediscovered;salauksen tulos:SIAAZQLKBA.VAZOARFPBLUAOAR.

Perinteisesti salateksti sisältää välimerkkejä ja välilyöntejä,jaonkiinteäpituinen, jotta vältetään lähetysvirheet ja näkyvät sanojen rajat naamioituneena.Näitä yksiköitä kutsutaan"ryhmiksi"(englanniksi:ryhmät), joskus kutsutaan"ryhmiksi"

SIAAZQLKBAVAZOARFPBLUAOAR

Ifthelengthoftheplaintextisnotdivisiblebyfive,itwillneedtobeattheendFillinwith"NULL".Theseemptycharacterscanbeanycharacters,becauseafterdecryption,itcanbeseenthattheyareobviousnonsense(suchasORANGEOOOO),sothereceivercaneasilyfindanddiscardthem.Ifthereceiverfindsthatthelengthoftheciphertextisnotdivisiblebyfive,itcanbeinformedthatthereisatransmissionerrorandrequestaretransmission.

Sometimesasimplereplacementpassworddoesnothavetobereplacedwithanotherletter.Forexample,inapigstypassword,theciphertextiscomposedofgridsymbols.

Theincreasedsecurityofthesefunctionsisnotmuchdifferentfrombefore,becausebasicallyallstrangesymbolswilleventuallybeconvertedintoA-Zletters.Sometimessalespeopleuseverysimpleencryptionintheirlistsandcatalogs:lettersareusedinsteadofnumbers.

Tämä artikkeli(numerot):1234567890;salatut kirjaimet:MAKEPROFIT.

Esimerkki:MATstandsfor120.

Turvallisuus

Thedisadvantageofsimplereplacementpasswordsisthatthelastfewlettersofthealphabet(mostofwhicharelowfrequency)tendtostayattheend.Thewaytostrengthenistodoacolumntranspositionagainafterencryption,butthisisoftennotdone.

Althoughthekeyusedforencryptionisverylikely(26!≈2^88.4,if88bits),itisextremelyeasytocracksingle-tableencryption.Aslongasareasonablelengthofciphertextisprovided,cryptanalysiscaninferthemeaningofthemostcommonunitthroughfrequencydistributionanalysis,thatis,frequencyanalysis.Thisallowsthecrackertousetheeliminationmethodtosolvethemeaningofaunit.Seeanexampleofcracking.Insomecases,itcanbedecipheredfromthepatternoftheirletters.Forexample,"attract"and"osseous"aretheonly"roots"ofthe"ABBCADB"modeinEnglish ,eli jos kohtaat salatun tekstin yhdellä yksinkertaisella korvaussalasanalla"ABBCADB"voi olettaa "houkuttelevan" tai "luumainen". Virkistys- ja sanomalehtipalapelit sisältävät monia sellaisia ​​salausmenetelmiä.

AccordingtotheEnglishuniquesolutiondistance(English:Unicitydistance),theaverageciphertextrequiresatleast27.6letterstocrackthesimplereplacementpasswordofthemixedtable.Undernormalcircumstances,itisassumedthatthenewarrangementisencountered,butusuallyabout50lettersarerequired(someoftheciphertextscanbeusedless).However,whentheciphertexthasanextremelyflatfrequencydistribution,thedemandforthelengthoftheciphertextmaybecomegreater.Atthesametime,theencryptorcanaddnullcharacterstocreateaflatfrequencydistribution.

Inaddition,thereisanotherwayto"fake"thefrequencydistribution,whichiscalledmissingcharacters.Asthenamesuggests,thesearticlesdeliberatelyavoidusingoneorafewspecificletters.IfitisEthatismissed,thenitisimpossibletofindtherealplaintextifwecontinuetoanalyzethenormalfrequency(estimatethehighestfrequencyasE).

Homofoninen substituutiomenetelmä

Inearlyencryption,inordertoincreasethestrengthofalternativepasswordstodealwithfrequencyanalysisattacks,sometimes"homonyms"wereusedtochangethefrequencyofplaintextletters.Inthisencryptionalgorithm,plaintextletterscanbemappedtomultipleciphertextsymbols.Normally,theplaintextsymbolswiththehighestfrequency(suchasE)willhavemorehomophonicsymbolsthanthelow-frequencyletters(suchasX),makingthefrequencydistributionflatterandmakinganalysismoredifficult.

Butalsobecauseofthis,justreplacingtheletterswitheachotherwillcauseinsufficientdistribution,andthereareseveraldifferentsolutions.Thesimplestwayistoreplacesomeletterswithatotalof10numbersfrom1-0.Anothermethodistoseparatetheexistinglettersintotheoriginalletterswithsimplechanges,uppercase,lowercase,upside-downletters,mirroredtext(leftandright),etc.Althoughitismoreartistic,itdoesnotmeanthatitissafer.Someofthehomophonicsubstitutionmethodsallusenewlyinventedstrangesymbolstorepresentletters.

Aninterestingchangeisnamednamingcryptography(English:nomenclator).Therearemanydifferentversionsofthisencryptionmethod,andthedifferencebetweenthemcomesfromitsprefix.Theprefixcomesfromthenameofthepublicofficialwhoannouncesthetitleofthevisitingguest.Thiskindofcipheriscombinedwithasmallcodebook(English:Codebook)toformalargehomophonicreplacementtable.Inthispassword,commonwordswillbeencryptedaccordingtothecodebook,andtheremainingletterswillbeencryptedaccordingtoanothercodebook.Thetwosymbolsarefinallymixedintheciphertexttoreducetheriskofcrackinginthesimplereplacementpassword.ThecodeusedbyLouisXIVwasagreatcodecreatedbytheRossignols(English:Rossignols),whichwasnotcrackeduntilahundredyearsaftertheabolitionoftheFrenchroyalfamily.

Fromtheearly15thcenturytothelate18thcentury,namedpasswordswerethemostcommonlyusedencryptionfordiplomaticdocumentsandspies,butmostofthemstillusednamedpasswordswithpoorencryptionperformance.Althoughcryptanalystsofgovernmentintelligenceagencieshavecrackedsomeofthenomenclaturecodessincethemiddleofthesixteenthcentury,theusualresponseofusersissimplytoincreasethehomophonicsubstitutiontable.Whenthehomophonicsubstitutionsystembegantodieoutinthelateeighteenthcentury,somenamedpasswordshadasmanyas50,000symbols.

However,notallnamedciphershavebeencracked.Tothisday,therearestillnewsthatnewnamedpasswordshavebeencrackedfromtimetotime.

TheBillCipherisanotherexampleofhomophonicsubstitution.ThisstoryreferstotheuseofanencryptedtexttohidethetreasuresdescribedintheUnitedStatesDeclarationofIndependencebetween1819and1821.Here,eachciphertextcharacterisreplacedbyanumber.ThenumberrepresentsthefirstletterofthefirstfewwordsintheDeclarationofIndependence.ManywordsintheDeclarationofIndependencehavethesamefirstletter,andtheciphertextnumbercanbeanyoneofthem.Forexample,thesecondandsixthwordsinthemaintextbothstartwith"I",thatis,"I"canbe2orItcanbe6.Theinterpretationisjusttoputthenumbersintheciphertext(suchasthealgebraX)intotheDeclarationofIndependence(thefirstletteroftheX-thword).

Starrdescribedanotherhomophonicreplacementpassword,whosepasswordwasthefirstattempttoencryptonacomputerdatabase.InStarr'smethod,bothplaintextandciphertextarestoredinbinarystrings,sothenumberofhomophonicsoundscanbeverylarge,makingfrequencyanalysismoredifficultthanusual.

Bookcipher(English:Bookcipher)andhashboardarebothakindofhomophonicreplacementcipher.

Usean taulukon korvaussalaus

In1467,themulti-tablesubstitutionpasswordwasfirstdescribedintheformofadiscbyLeonBattistaAlberti.Atable(AncientGreek:tableau)isintroducedin"Steganography"(AncientGreek:Steganographia)byJohannesTritmius(seebelow;completedinthe15thcenturybutpublishedalongtimelater)).In1563,GiovanniBattistadelaPorta(English:Giovanni_Battista_della_Porta)describedamorecomplexmixed-letterversionin"HiddenCharactersinWriting"(AncientGreek:DeFurtivisLiterarumNotis).

Inamulti-tablereplacementpassword,multipleletterswillbeusedasthepassword.Inordertospeedupencryptionordecryption,alllettersareusuallywrittenonaform,whichiscalledtableauincryptography.Thiskindofformisusually26×26,becauseitcanfitall26Englishletters.Themethodoffillingintheformandselectingtheletterstobeusednexttimeistoreplacethedefinitionsbetweendifferentmulti-letterpasswords.Multi-letterreplacementpasswordsaremoredifficulttobreakthansingle-letterpasswords,becausetheyhavemorepossibilitiesforreplacementandrequirelongerciphertexts.

OneofthemostfamousistheVirginiaCodeintroducedbyGeovanBattistaBellasoin1585.Ithasnotbeencrackeduntil1863.TheFrenchcallit"acodethatcannotbedeciphered"(French:lechiffreindéchiffrable).(ThispasswordwasmistakenlythoughttobecreatedbyBrycedeVirginia,soitwascalledtheVirginiapassword.)

IntheVirginiapassword,thefirstrowofthetableJustfillin26lettersdirectly,andthenthelettersineachrowbelowareoffsetbyonespacetotheleft.(Thisiscalledatabletraverse,andmathematically,eachcolumniscongruence26.)Tousethiskindofpassword,youneedtouseakeywordasthekey.Repeateachtimethekeywordisusedup.Assumingthatthekeywordis"CAT",thefirstwordoftheplaintextisencryptedby"C",thesecondwordisencryptedby"A",thethirdwordisencryptedby"T",andthenbacktoCencryption,repeating.Thenencryptitaccordingtothepasswordtableontheright.Forexample,whenBALLusesCATasakeyword,itwillbeencryptedtoDAEN.Itcanbeseenthateventhesame"L"willbeencryptedtoanotherletter.Inreality,thekeywordsoftheVirginiapasswordareverylong.

In1863,MajorFriedrichKasiski(English:FriedrichKasiski)inventedamethod(itwassecretlyandindependentlyinventedbyCharlesBabbagebeforetheCrimeanWar)),whichmakesitpossibletocalculatethelengthofthekeywordintheVirginiapassword.Thismethodrequiresalongerciphertext,becauseitsoperationreliesonfindingthenumberofcommonwords(suchasTHE)thatusethesamekeywords(suchasABC).Therefore,itisdifficulttofindveryshortciphertextsbythismethod.

Therefore,eventoday,ifyouusehybridtableencryptioninthetable,orifthekeywordsarerandom,theVirginiacipheristheoreticallydifficulttocrack.Butbecausethesemethodsareactuallydifficulttouse,theuseofVirginiaciphersisbecominglessandless.

Muita tunnettuja monikirjaimien korvaussalauksia ovat:

Glanschfeldcipher-similartotheVirginiacipher,butbecausetheentirecipherusesonly10units,thekeyisThewordlengthislimitedanditiseasytocrack.BeaufortCipher-ThisisactuallytheVirginiaCipher,exceptthat"tabula"isshiftedbackwardbyonegrid,mathematicallytheequationis:ciphertext=key-plaintext.TheBeaufortcipherbelongstopeer-to-peerencryption,thatis,theencryptionalgorithmisthesameasthedecryptionalgorithm.Automatickeycipher-Ithasakeywordatthebeginningofthekey,followedbyarepetitionofplaintexttoavoidperiodicfunctions.Thesportskeypassword,keywordsaretakenfromsomearticlesorfamoussentences,soitcanbeverylong.

Itcanbeseenfrommodernstreamciphersthatmodernmulti-tablesubstitutionencryptionstrivestoimprovethestreamkeytomakeitaslongaspossibleandunpredictable.

Taulukkomuodonvaihtosalaus

Inthetableformatreplacementpassword,theplaintextnolongerreplacesaletteralone,butreplacesalargerletterunit(usuallyapairofletters)atonetime).Thefirstadvantageisthatthefrequencydistributionisflatterthanthatofasingleletter(althoughitisactuallynotflat,becauseineverydaylanguage,"TH"ismuchmorecommonthan"XQ").Secondly,thelargenumberofsymbolsitgeneratesrequiresmoreciphertextforefficientletterfrequencyanalysis.

Jokaisen"kirjainparin"korvaamiseen vaaditaan yhteensä 676 symbolia(26^2=676).Aiemmin mainitussa kirjassa "HiddenCharactersinWriting"

TheearliestpracticaltableformatreplacementcodeisthePorefercodecreatedbySirCharlesWheatstonein1854.Inthispassword,the5×5squareisfilledwithmixedletters(twoletters,usuallyIandJaresidebyside,thatis,IequalsJ).Everytwolettersintheplaintextareaunit,usuallythisunitwillformasquareonthetable(thecontentoftheunitoccupiestwocorners),andthentaketheothertwocornersastheciphertext.Whenthecellcontentisinthesamecolumnorrow(thatis,itcannotformasquare),theciphertextofthesamecolumnistheplaintextoffsetbyonegrid;theciphertextofthesamecolumnistheplaintextoffsetbyonegrid.Forthetwounitswiththesameletter,addX(orQ)tothefrontofthelist(thatis,allofthemareshiftedbackbyonegrid).ThePoreficipherwasusedformilitarypurposesfromthebeginningoftheSecondBohrWaruntiltheSecondWorldWar.

Vuonna 1901 FelixDelastelle (englanniksi: Felix_Delastelle) otti käyttöön muun käytännöllisen muodonvaihtosalauksen, mukaan lukien kahden osasalauksen (englanniksi: Bifid_cipher), neljän osapuolen salaussalasanan ja kolmen osapuolen salaussalasanan.

LesterS.Hill(English:LesterS.Hill)inventedtheHillcipherin1929,whichisatableformatreplacementencryption.Hillciphercanuselinearalgebratocombineunitswithverymanyletters.Eachletteristreatedasahexadecimalnumber:A=0,B=1,andsoon.(Insomevariants,3extrasymbolsareaddedtoturnthebaseintoaprimenumber.)Astringoflettersistreatedasann-dimensionalvector,multipliedbyann×nmatrix,andtheresultiscongruence26.Payattentiontothematrix(key)usedforencryption, Muutoin sitä ei voida purkaa. Vain matriisin determinantti ja 26 ovat keskenään alkulukuja, ne ovat käänteisiä.

BecausetheHillcipheriscompletelybasedonalinearrelationship,itwillbevulnerabletoknown-plaintextattack(English:Known-plaintextattack),therefore,sometimesitwillcombinesomenon-linearstepstoreducebeingbrokenchance.

MekaaninenReplacementEncryption

ComputersthatwerewidelyusedduringtheFirstWorldWar(somegovernmentsbegantousetheminthe1950sand1960s;otherorganizationsLater,therewasnorecordofpersonalusebefore1975),makingthemulti-lettersubstitutionpasswordwidelyusedmechanically.Severalinventorshadsimilarideasatthesametime.Therewerefourpatentapplicationsforrotatingdisks(English:Rotormachine)in1919.OneofthemostimportantandfamousistheEnigmaciphermachineusedbytheGermanWehrmachtinthe1930s.Atthesametime,theAlliedforcesalsohadtheirownencryptionsystems:Sigaba(English:SIGABA)intheUnitedStatesandTypex(English:Typex)intheUnitedKingdom.

Thesimilaritybetweenthemisthattheybothusemechanicalrotatingdisksforencryption.Sincemorethanonerotatingdiskiscomposedofciphertext,ifeachwordisequippedwithasymbol,theamountofsymbolswillbehigherthantheastronomicalnumber.However,earlyversionsofthesemachinesareextremelyeasytocrack.WilliamF.FriedmanoftheSignalIntelligenceService,WilliamF.Friedman(English:WilliamF.Friedman)foundtheHebernRotor(English:Hebern_Rotor_Machine)vulnerabilitiesearlyon;GovernmentCryptographySchool(English:DillwynKnoxofGC%26CS(English:DillwynKnox)​​crackedtheversionoftheEnigmacipherwithoutaterminalboardbeforeWorldWarII.TheanalystsatBletchleyParkwereabletocrackthemilitaryversionoftheEnigmaciphermachineatalaterstage,inspiredbythePolishmathematicianMarianRejewski.

SIGABAandTypexencryptedmessageshavenotbeencrackedbythepublic.

Kertakäyttöinen alusta

Kertakäyttöinen alustaisaveryspecialreplacementpassword.ItwasestablishedbyJosephMauborgneinthelateWorldWarI.DuringtheSecondWorldWar,ClaudeShannonprovedmathematicallythatitssecrecywasunbreakable,andtheprocesswasfirstpublishedinlate1940.Incommonpractice,theone-timepadcanbereferredtoasaone-timereplacementpassword.Normally,theplaintextletterswillbecombined(notreplaced)withkeywordsinsomeway(usuallyalogicalexclusiveOR).

Kertakäyttöinen alustasareimpracticalordifficulttouseinmostcasesbecausetheyrequirekeywordstobethesame(orlonger)astheplaintext,"completely"random,andcanonlybeusedonce.Makesurethateveryoneexceptthesenderandreceiverdoesnotknow.Whenoneoftheseconditionsisnotimplemented,orevenonlyslightlyviolated,theone-timepadisnolongerindestructible,orevencollapsed.TheUnitedStatesusedanon-randomone-timepadtoencryptmessagesduringWorldWarIIbeforesendingthemtotheSovietUnion.Americancryptographershavebeenabletocrackveryfewone-timepadssincethe1940s.(SeetheVENONAproject(English:Venonaproject))

AftertheCubancrisis,theMoscow-Washingtonhotlinebegantouseone-timepasswordstoencryptmessages.

Moderni vaihtoehtoinen salaus

Theabove-mentionedalternativepasswords,especiallythosemanualencryptionpasswordsthatonlyusepencilandpaper,arenolongerusedfrequently.However,eventoday,theconceptofreplacementencryptionisstilladvancing.Fromanovelperspective,modernbit-orientedblockciphers(suchasdataencryptionstandardsandhigh-levelencryptionstandards)canstillberegardedasalternativeencryptionusingalargenumberofbinaryletters.Inaddition,blockciphersusuallycontainasmallerreplacementtablenamedS-box(English:S-box),whichalsocontainsalogicalexclusiveORalgorithm.SeeSubstitution-permutation_network(English:Substitution-permutation_network).

Jaksottainen salasanojen vaihto

ROT5,ROT13,ROT18,ROT47encodingisasimplecodeelementpositionsequencereplacementpassword.Thistypeofcodeisreversibleandcanbeself-decrypted.Itismainlyusedtorespondtofastbrowsingormachinereadingwithoutallowingittounderstanditsmeaning.

ROT5istheabbreviationofrotateby5places,whichmeanstorotate5places,allothersarethesame.Let'stalkabouttheirencodingmethodsrespectively:ROT5:Onlyencodethenumber,replacethecurrentnumberwiththefifthnumberfromthepreviousnumber,forexample,thecurrentnumberis0,anditbecomes5afterencoding.Thecurrentvalueis1,anditbecomes6afterencoding,andsoon.ROT13:Onlyencodetheletters,replacethecurrentletterwiththe13thletterfromthecurrentletter,forexample,thecurrentletterisA,afterencoding,itbecomesN,thecurrentisB,andafterencoding,itbecomesO,Andsoon.ROT18:Thisisaheterogeneous,originallythereisno,itisacombinationofROT5andROT13,forthesakeofgoodtitle,nameditROT18.ROT47:Encodenumbers,letters,andcommonlyusedsymbols,andperformpositionreplacementaccordingtotheirASCIIvalue,andreplacethecurrentcharacterwiththecorrespondingcharacterofthe47thdigitfromthepreviousASCIIvalueofthecurrentcharacter,forexample,thecurrentcharacterislowercaseTheletterzbecomesacapitalletterKafterencoding,thecurrentnumberis0,anditbecomesthesymbol_afterencoding.TheASCIIvaluerangeofcharactersusedforROT47encodingis33-126.Fordetails,pleaserefertoASCIIencoding.

Related Articles
TOP