Lab: Symmetric Encryption and Hashing
Fundamentals of symmetric encryption, cryptanalysis, and of hashing
By Drs. Dave Eargle and Anthony Vance
Polyalphabetic substitution and Transposition Ciphers
Using polyalphabetic substitution, with alphabet a–z (no caps), spaces translated to an underscore character (
_), and a period (
., as the last character of the alphabet), use the private key
securityto encrypt the plaintext message:
To help you, use the following formula:
Encryption: ciphertext = (plaintext + key) mod 28 Decryption: plaintext = (ciphertext - key) mod 28
Number your alphabet so that it starts with zero, e.g.,
A = 0, Z=25, _ = 26, . = 27. This means that your alphabet will be
As a general rule for shift ciphers, the modulus is always the size of the alphabet, but you must start your alphabet at 0.
To check your understanding of modular arithmetic, review these examples on wikipedia.
You may use an online vignere cipher calculator to check your work. If you use this calculator, remember to customize the default alphabet to include periods and underscores.Heads up! You should understand this well enough to be able to do it by hand.Question : What is the ciphertext when encrypting “send_money” with the key “security” and alphabet
Consider the transposition method discussed in class. Assume the plaintext is
attack postponed until two am
and the key is
Create the ciphertext using columnar transposition (demonstrated in class). Remove spaces from the plaintext.
You may use an online columnar transposition calculator to check your work.Heads up! You should understand this well enough to be able to do it by hand.Question : What is the ciphertext when encrypting “attack postponed until two am” with the provided key?
Perform frequency analysis on the following ciphertext. You may use an online frequency analysis tool such as this one .
Hvs Qosgof qwdvsf wg boasr othsf Xizwig Qosgof, kvc, oqqcfrwbu hc Gishcbwig, igsr wh kwhv o gvwth ct hvfss hc dfchsqh asggousg ct awzwhofm gwubwtwqobqs. Kvwzs Qosgof'g kog hvs twfgh fsqcfrsr igs ct hvwg gqvsas, chvsf gipghwhihwcb qwdvsfg ofs ybckb hc vojs pssb igsr sofzwsf. Wt vs vor obmhvwbu qcbtwrsbhwoz hc gom, vs kfchs wh wb qwdvsf, hvoh wg, pm gc qvobuwbu hvs cfrsf ct hvs zshhsfg ct hvs ozdvopsh, hvoh bch o kcfr qcizr ps aors cih. Wt obmcbs kwgvsg hc rsqwdvsf hvsgs, obr ush oh hvswf asobwbu, vs aigh gipghwhihs hvs tcifhv zshhsf ct hvs ozdvopsh, boaszm R, tcf O, obr gc kwhv hvs chvsfg. —Gishcbwig, Zwts ct Xizwig Qosgof 56 Vwg bsdvsk, Oiuighig, ozgc igsr hvs qwdvsf, pih kwhv o fwuvh gvwth ct cbs, obr wh rwr bch kfod ofcibr hc hvs psuwbbwbu ct hvs ozdvopsh: Kvsbsjsf vs kfchs wb qwdvsf, vs kfchs P tcf O, Q tcf P, obr hvs fsgh ct hvs zshhsfg cb hvs goas dfwbqwdzs, igwbu OO tcf L. —Gishcbwig, Zwts ct Oiuighig 88 Hvsfs wg sjwrsbqs hvoh Xizwig Qosgof igsr acfs qcadzwqohsr gmghsag og kszz, obr cbs kfwhsf, Oizig Uszzwig, fstsfg hc o (bck zcgh) hfsohwgs cb vwg qwdvsfg: Hvsfs wg sjsb o fohvsf wbusbwcigzm kfwhhsb hfsohwgs pm hvs ufoaaofwob Dfcpig qcbqsfbwbu hvs gsqfsh asobwbu ct zshhsfg wb hvs qcadcgwhwcb ct Qosgof'g sdwghzsg. —Oizig Uszzwig, Ohhwq Bwuvhg Wh wg ibybckb vck sttsqhwjs hvs Qosgof qwdvsf kog oh hvs hwas, pih wh wg zwyszm hc vojs pssb fsogcbopzm gsqifs, bch zsogh psqoigs acgh ct Qosgof'g sbsawsg kcizr vojs pssb wzzwhsfohs obr chvsfg kcizr vojs oggiasr hvoh hvs asggousg ksfs kfwhhsb wb ob ibybckb tcfswub zobuious. Hvsfs wg bc fsqcfr oh hvoh hwas ct obm hsqvbweisg tcf hvs gczihwcb ct gwadzs gipghwhihwcb qwdvsfg. Hvs sofzwsgh gifjwjwbu fsqcfrg rohs hc hvs 9hv qsbhifm kcfyg ct Oz-Ywbrw wb hvs Ofop kcfzr kwhv hvs rwgqcjsfm ct tfseisbqm obozmgwg. Qosgsf_qwdvsf, Kwywdsrwo
What are the four most frequent characters, in descending order? Examine the frequency table chart at http://en.wikipedia.org/wiki/Frequency_analysis. What does this suggest the four letters identified correspond to?Question : What are the four most frequent characters?
Analyze bigrams and trigrams in the ciphertext.
What do the most frequent ciphertext bigrams suggest the three 2-length N-grams identified correspond to in English plaintext?
Also examine N-grams of length 3, and report the likely plaintext identities of the four 3-length N-grams reported. (Use http://en.wikipedia.org/wiki/Trigram).Question : What are the three most frequent trigrams?
Assume that a simple cipher that shifts all characters by a fixed number was used to create the cipertext (a caesar cipher). Given the results of the frequency analysis, what would the shift key have been (the shift to go from plaintext to ciphertext)? Don’t be proud; you can use your fingers to count.Question : What is the key of the ciphertext, counting forwards?
What is the plaintext?
Hint: You can use an online caesar cipher encoder/decoder such as this one to test your key, although you should be able to perform frequency analysis by hand on short texts.Question : What author is quoted in the plaintext?
Decrypt the following ciphertext using the following one-time pads, using an XOR bitwise operation.
You may use an online tool such as cryptii.com. For example, select “bitwise operation”:
And then choose “XOR”, leaving the operation on “encode”:
E0 C5 B5 B0 82 9A 8A DA B8 FD 8A 9E 67 5A 57
One-time pad 1:
A1 B1 C1 D1 E1 F1 AA BB CC DD EE FF 10 34 76Question : What is the plaintext using the one-time pad 1?
One-time pad 2:
B2 A0 C1 C2 E7 FB FE FA D9 89 AA AF 56 6A 67Question : What is the plaintext using the one-time pad 2?
One-time pad 3:
B3 B0 C7 C2 E7 F4 EE BF CA DD EC F1 15 2E 76Question : What is the plaintext using the one-time pad 3?
One-time pad 4:
B4 AD D0 90 E1 FB FE FA D1 8E AA FA 02 3B 33Question : What is the plaintext using the one-time pad 4?
Hash the following plaintext using multiple hashing algorithms.
We intend to begin on the first of February unrestricted submarine warfare. We shall endeavor in spite of this to keep the United States of America neutral. In the event of this not succeeding, we make Mexico a proposal of alliance on the following basis: make war together, make peace together, generous financial support and an understanding on our part that Mexico is to reconquer the lost territory in Texas, New Mexico, and Arizona. The settlement in detail is left to you. You will inform the President of the above most secretly as soon as the outbreak of war with the United States of America is certain, and add the suggestion that he should, on his own initiative, invite Japan to immediate adherence and at the same time mediate between Japan and ourselves. Please call the President's attention to the fact that the ruthless employment of our submarines now offers the prospect of compelling England in a few months to make peace. Signed, ZIMMERMANN
You may use a tool such as cryptii.com. For example, select “Hash function” from towards the bottom of the menu:
And use it as follows:
What is the length of each of the following algorithm hashes in bytes? MD5, SHA-1, SHA-256, SHA-512? How many bits does each hash represent?
(hint: how many bits are in one hex digit – also called a ‘nibble’? How many nibbles in the key? Or, How many bits in a byte, and how many bytes in a two-digit hex number like ‘FA’? Review this if you’re still stuck)Question : How many bits are in an MD5 hash?
Change just a single bit in content that you are hashing. e.g, change an “A” — 1010 to a B — 1011. Examine the hashes of the modified content. Since you only changed a single bit in a file of billions of bits, you might reason that the hashes would be nearly the same. Are they?
In cryptii, you can switch to a hex view thusly in order to make your single-bit-edit easier:
Symmetric encryption with AES
Decrypt the message below using AES and the following parameters: Message (base64):
- Algorithm: AES-256
- Chaining mode: CBC
- IV (hexadecimal):
15 7F 14 FF DF D1 D4 25 D9 CB BD 12 ED 98 49 2F
- Key (hexadecimal):
FA 71 7D 51 3F D7 32 7D D9 C7 13 84 43 47 C2 5B 2F 9C 1E 48 67 C6 81 32 85 5A 13 92 60 A8 79 44
You can do this on cryptii using the “Block Cipher” tool. To do so:
Start by selecting the “Encoding > Base64” tool.
- Set the base64 to “decode” mode.
Paste the above base64-encoded string into the leftmost “text” node. Make sure there are no extra characters after the final
=in the pasted value (not even a return character!).
The output of the base64 tool will be bytes.
Add a “Modern Cryptography > Block Cipher” tool to the flow, so that the bytes flow into it. Set the block cipher tool to use AES-256, and use the algorithm settings noted above.
What is the plaintext of the message?
Use AES or another symmetric block cipher to encrypt/decrypt messages exchanged between you and another class member. You can use a site such as cryptii.com.
You and your classmate should agree on a password for encrypting the message. You can generate a key and an IV from a password using the
openssl tool, available from your Kali instance. For example, if you had agreed on the password
you could run the following to get the corresponding key and IV:
openssl enc -aes-256-cbc -P -pass pass:Password1 -nosalt
Running the above will give the same output every time. It would lead to the following output:
opensslto use its symmetric cipher routines
- the block cipher is
aes cbcwith a block size of 256
- the password from which the key and IV are derived is
- (in real life, please never use a password this weak!)
opensslto not introduce randomness into the process of generating a key and IV from a password (in practice, you should let it use a salt – more on this in a future lab)
-P print out the key and IV used then immediately exit: don't do any encryption or decryption.
You and your classmate should agree on a password, then use that password to share a message using AES.
Question : How did you ensure that your key exchange was safe? How would you exchange keys if you were not in the same location?
Question : Which of the parameters of a block cipher (e.g., algorithm name, mode of operation, IV (if any), key length) are essential to keep secret? Security through obscurity does not count as “essential”.
Submit your answers for this lab by completing the associated lab quiz on your course’s learning management system.