Specific Examples

[need info]

Techniques

  • Cryptanalysis of the Affine Cipher

    The affine cipher has only 311 possible keys, so it presents few problems to brute force attacks. We use quadgram statistics to rank each key, the final solution will be the key that produces ciphertext that is most similar to english.

  • Cryptanalysis of the Autokey Cipher

    The Autokey cipher is similar the Vigenere cipher in operation, however the key is not treated in the same way. These differences make the Autokey cipher stronger than Vigenere, but still fairly easy to break.

  • Cryptanalysis of the Bifid cipher

    Bifid is a fractionating cipher which uses a key square along with a period as the key.

  • Cryptanalysis of the Caesar Cipher

    The Caesar Cipher is one of the simplest ciphers, as a result cryptanalysis is fairly simple. This page introduces the use of quadgram statistics for text characterisation, which is also used extensively to break more complicated ciphers.

  • Cryptanalysis of the Columnar Transposition Cipher

    The Columnar Transposition Cipher is a very simple cipher which can offer a great deal of security if long key words are used (keys > 20 characters). If short key words are used, however, or if dictionary words are used as keys the cipher becomes much easier to break.

  • Cryptanalysis of the Foursquare Cipher

    This page will describe the breaking of the Foursquare cipher using Simulated Annealing. Foursquare is a digraphic cipher which uses two complete alphabets as the key, both of which we have to find for a decryption.

  • Cryptanalysis of the Hill Cipher

    The Hill Cipher is a linear digraphic substitution cipher. Its key is a matrix of numbers. On the whole, it is not very secure for small matrices. For matrices of around 5 by 5 or larger it becomes fairly secure, but there is a lot of key material for larger matrices.

  • Cryptanalysis of the Playfair cipher

    Playfair is a digraphic substitution cipher, more difficult than the simple substitution cipher to crack. This page will deal with automatic cryptanalysis of playfair ciphers using Simulated Annealing.

  • Cryptanalysis of the Simple Substitution Cipher

    The simple substitution cipher is fairly easy to break, simple enough that it can usually be broken by hand in a few minutes. This page describes an automated technique for breaking substitution ciphers using a hill climbing algorithm.

  • Cryptanalysis of the Straddle Checkerboard

    The straddling checkerboard is a substitution cipher, except that the substitutions are of variable length. It has formed a component of several impotant field ciphers, the most notable being the VIC cipher used by russian spies during the cold war.

  • Cryptanalysis of the Vigenere Cipher

    The Vigenere cipher was though to be completely unbreakable for hundreds of years, and indeed, if very long keys are used the vigenere cipher can be unbreakable. But if short keys are used, or if we have a lot of ciphertext compared to the key length, the vigenere cipher is quite solvable.

  • Cryptanalysis of the Vigenere Cipher, Part 2

    In part 1, we employ techniques that are used more often when trying to crack the Vigenere cipher by hand, including using the Index of Coincidence to identify the key length and the Chi-squared test to determine the key. In this example we will use local search techniques to find good key candidates. This is fast enough that we can simply try it for all possible key lengths.

GQQ RPIGD GSCUWDE RGJO WDO WT IWTO WA CROEO EOJOD SGPEOE: SRGDSO, DGCPTO, SWIBPQEUWD, RGFUC, TOGEWD, BGEEUWD GDY YOEUTO - GTUECWCQO