| ---[ Phrack Magazine Volume 7, Issue 51 September 01, 1997, article 13 of 17 | |
| -------------------------[ Monoalphabetic Cryptanalysis (Cyphers, Part One) | |
| --------[ Jeff Thompson aka 'Mythrandir' <jwthomp@cu-online.com> | |
| Written for Phrack and completed on Sunday, August 31st, 1997. | |
| --------- | |
| First a quick hello to all of those I met at DefCon this year. It was | |
| incredible fun to finally put faces to many of the people I have been talking | |
| with for some time. It was truly was a treat to meet so many others who are | |
| alive with the spirit of discovery. | |
| ---------- | |
| This is the first in a series of articles on Cryptology that I am writing. | |
| The goals of these articles will be to attempt to convey some of the excitement | |
| and fun of cyphers. A topic of much discussion in regards to cryptography | |
| currently, is about computer based cyphers such as DES, RSA, and the PGP | |
| implementation. I will not be discussing these. Rather, these articles will | |
| cover what I will term classical cryptology. Or cryptology as it existed | |
| before fast number crunching machines came into existance. These are the sorts | |
| of cyphers which interested cryptographers throughout time and continue to be | |
| found even to this very day. Even today, companies are producing software | |
| whose encryption methods are attackable. You will find these commonly among | |
| password protection schemes for software programs. Through the course of these | |
| articles I will explain in practical terms several common cypher types and | |
| various implementations of them as well as cryptanalytic techniques for | |
| breaking these cyphers. | |
| Creating cyphers is fun and all, but the real excitement and often times tedium | |
| is found in Cryptanalysis. Many of the ideas presented in these articles will | |
| based on three sources. The following two books: The Codebreakers by David | |
| Kahn (ISBN: 0-684-83130-9) and Decrypted Secrets by F.L. Bauer | |
| (ISBN: 3-540-60418-9). Both authors have put together wonderful books which | |
| both cover the history and methods of Cryptology. Do yourself and the authors | |
| a favor and purchase these books. You will be very pleased with the lot. | |
| Finally, a miniscule amount of these articles will be written based on my own | |
| personal experience. | |
| The fun is in the journey and I welcome you on what is certain to be an | |
| interesting trip. Please feel free to raise questions, engage me in | |
| discussions, correct me, or simply offer suggestions at jwthomp@cu-online.com. | |
| Please be patient with me as I am traveling extensively currently, and may be | |
| away from the computer at length occasionally. | |
| Out the door and into the wild... | |
| --Monoalphabetic Cyphers | |
| Monoalphabetic cyphers are often currently found in simple cryptograms in books | |
| and magazines. These are just simple substitution cyphers. This does not | |
| mean that they are always simple for the beginning amateur to solve. | |
| Three common monoalphabetic cyphers which are used are substitution, cyclical, | |
| and keyed cyphers. | |
| -Substitution Cyphers | |
| By taking an alphabet and replacing each letter with another letter in a | |
| unique fashion you create a simple monoalphabetic cypher. | |
| Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |
| Cypher Alphabet Z I K M O Q S U W Y A C E B D F H J L N P R T V X G | |
| Plaintext Message | |
| The blue cow will rise during the second moon from the west field. | |
| Cyphertext Message | |
| nuo icpo kdt twcc jwlo mpjwbs nuo lokdbm eddb qjde nuo toln qwocm. | |
| -Cyclical Cyphers | |
| By taking an alphabet and aligning it with a rotated alphabet you get a | |
| cyclical cypher. For example: | |
| Plaintext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |
| Cypher Alphabet N O P Q R S T U V W X Y Z A B C D E F G H I J K L M | |
| Indeed, you may recognize this cypher as a ROT13 which is commonly used on | |
| news groups to obscure messages. | |
| -Keyed Cypher | |
| Another way to create a monoalphabetic cypher is to choose a keyword or phrase | |
| as the beginning of the cypher alphabet. Usually, only the unique letters from | |
| the phrase are used in order to make sure the plaintext to cyphertext behaves | |
| in a one to one fashion. | |
| For example: | |
| Plaintext Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |
| Cypher Alphabet L E T O S H D G F W A R B C I J K M N P Q U V X Y Z | |
| The passphrase in this cypher is "Let loose the dogs of war" The advantage of | |
| such a system is that the encryption method is easy to remember. Also, a | |
| method of key change can be created without ever having to distribute the keys. | |
| For example, one could use the 4 words at a time of some piece of literature. | |
| Every message could use the next four words. Indeed, this change could occur | |
| more frequently, but that is a subject for another article. | |
| -Bipartite Substitution | |
| Bipartite substition is the use of symbol pairs to represent plaintext. Later | |
| we will see that this sort of substitution lends itself to be easily made more | |
| difficult to analyze. Two examples of this are: | |
| 1 2 3 4 5 A B C D E | |
| 1 A B C D E A A B C D E | |
| 2 F G H I J B F G H I J | |
| 3 K L M N O C K L M N O | |
| 4 P Q R S T or D P Q R S T | |
| 5 U V W X Y E U V W X Y | |
| 6 Z 0 1 2 3 F Z 0 1 2 3 | |
| 7 4 5 6 7 8 G 4 5 6 7 8 | |
| 9 9 . - ? , H 9 . - ? , | |
| Obviously, the letters do not need to be placed in this order as their solutions | |
| would not be that difficult to guess. | |
| --Cryptanalysis | |
| Previously we created a cyphered message: | |
| nuo icpo kdt twcc jwlo mpjwbs nuo lokdbm eddb qjde nuo toln qwocm. | |
| If one were to receive this message, figuring out its contents might seem | |
| fairly daunting. However, there are some very good methods for recovering the | |
| plaintext from the cyphertext. The following discussion will work under the | |
| assumption that we know the cyphers with which we are dealing are | |
| monoalphabetics. | |
| -Frequency Analysis | |
| The first method we will use is frequency analysis. Natural languages have | |
| many qualities which are very useful for the analysis of cyphertext. Languages | |
| have letters which occur more commonly in text, collections of letters which | |
| are more frequent, patterns in words, and other related letter occurances. | |
| Counting up the occurances of letters we find that there are... | |
| letter occurances | |
| b 3 | |
| c 4 | |
| d 5 | |
| e 2 | |
| i 1 | |
| j 3 | |
| k 2 | |
| l 3 | |
| m 3 | |
| n 4 | |
| o 8 | |
| p 2 | |
| q 2 | |
| s 1 | |
| t 3 | |
| u 3 | |
| w 4 | |
| The order of greatest frequency to least is: | |
| 8 5 4 3 2 1 | |
| {o} {d} {c n w} {b j l m t u} {e k p q} {i s} | |
| If this sort of analysis were run on many volumes of english you would find that | |
| a pattern would emerge. It would look like this: | |
| {e} {t} {a o i n} {s r h} {l d} {c u m f} {p g w y b} {v k} {x j q z} | |
| You will notice an immediate correlation between e and o. However, for the | |
| rest of the letters we can not be very certain. In fact, we can not be very | |
| certain about e either. | |
| Since this text is short it is helpful to take a look at some of the other | |
| behaviors of this text. | |
| Counting up the first, second, third, and last letters of the words in this | |
| text we find the following frequencies: | |
| First Letter in word Occurances | |
| e 1 | |
| i 1 | |
| j 1 | |
| k 1 | |
| l 1 | |
| m 1 | |
| n 3 | |
| q 2 | |
| t 2 | |
| Order: | |
| n q t e i j k l m | |
| Second letter in word Occurances | |
| c 1 | |
| d 2 | |
| i 1 | |
| n 1 | |
| o 2 | |
| p 1 | |
| u 3 | |
| w 3 | |
| Order: | |
| u w d o c i n p | |
| Third letter in word Occurances | |
| c 1 | |
| d 2 | |
| i 1 | |
| k 1 | |
| l 2 | |
| o 4 | |
| p 1 | |
| t 1 | |
| u 1 | |
| Order: | |
| o d l c i k p t u | |
| Last letter in word Occurances | |
| b 1 | |
| c 1 | |
| e 1 | |
| m 1 | |
| n 1 | |
| o 5 | |
| s 1 | |
| t 1 | |
| English frequency for first letter: | |
| t a o m h w | |
| Second letter: | |
| h o e i a u | |
| Third letter: | |
| e s a r n i | |
| Last letter: | |
| e t s d n r | |
| Noticing the higher frequency count for 'o' in the third and last letters of | |
| words in addition to its absence as a first letter in any words gives us strong | |
| reason to believe that 'o' substitutes for 'e'. This is the first wedge into | |
| solving this cypher. | |
| However, do not be fooled by the apparent strengths of frequency analysis. | |
| Entire books have been written without the use of some letters in the English | |
| alphabet. For instance The Great Gatsby was written without using the letter | |
| 'e' in one word of the book. | |
| Other items to analyze in cyphertext documents is the appearance of letters in | |
| groups. These are called bigrams and trigrams. For example, 'th' is a very | |
| common letter pairing in the english language. Also, as no surprise 'the' is | |
| a very common trigram. Analysis of english documents will find these results | |
| for you. | |
| So now that that we have developed a simple way of starting to attack cyphers | |
| lets examine a few ways to make them more difficult to break. | |
| --Strengthening Cyphers | |
| -Removing word and sentence boundaries | |
| A simple way to complicate decypherment of a cyphertext is to remove all | |
| spacing and punctuation. This makes it more difficult to perform a frequency | |
| analysis on letter positions. However, it is possible to make reasonable | |
| guesses as to word positions once yoy begin to study the document. Another | |
| method is to break the cyphertext into fixed blocks. For example after every | |
| four letters a space is placed. | |
| The previous cypher text would appear as this: | |
| nuoicpokdttwccjwlompjwbsnuolokdbmeddbqjdenuotolnqwocm. | |
| or this: | |
| nuoi cpok dttw ccjw lomp jwbs nuol okdb medd bqjd enuo toln qwoc m | |
| You will notice that the above line ends with a single character. This gives | |
| away the end of the text and would be better served by the placement of nulls, | |
| or garbage characters. The above line becomes: | |
| nuoi cpok dttw ccjw lomp jwbs nuol okdb medd bqjd enuo toln qwoc mhew | |
| 'hew' will decypher to 'qmi' which will clearly appear to be nulls to the | |
| intended recipient. | |
| -Nulls | |
| Nulls are characters used in messages which have no meanings. A message could | |
| be sent which uses numbers as nulls. This makes decypherment more difficult as | |
| part of the message has no meaning. Until the decypherer realizes this, he | |
| may have a hard time of solving the message. | |
| -Polyphony | |
| Another method that can be applied is the use of polyphones. Polyphones are | |
| simply using a piece of cyphertext to represent more than one piece of | |
| plaintext. For example a cyphertext 'e' may represent an 'a' and a 'r'. This | |
| does complicate decypherment and may result in multiple messages. This is | |
| dangerous as these messages are prone to errors and may even decypher into | |
| multiple texts. | |
| A new cyphertext alphabet would be | |
| Cyphertext alphabet A B C D E F G H I J L N P | |
| Plaintext alphabet Z X U S Q O M K H N R V W | |
| B D F G I A C E L P J T Y | |
| Our old plaintext message becomes | |
| nih aich gfp peii ledh bclejd nih dhgfjb gffj clfg nih phdn cehib | |
| This decypherment becomes very tricky for someone to accomplish. Having some | |
| knowledge of the text would be a great help. | |
| If it appears that very few letters are being used in a document then you may | |
| wish to suspect the use of polyphones within a document. | |
| -Homophones | |
| Homophones are similar to polyphones except that there is more than one | |
| cyphertext letter for every plaintext letter. They are useful to use in that | |
| they can reduce the frequencies of letters in a message so that an analysis | |
| yields little information. This is very easy to do with bipartite | |
| substitution cyphers. For example: | |
| a b c d e | |
| a a b c d e | |
| b f g h i j | |
| c k l m n o | |
| d p q r s t | |
| e u v w x y | |
| f z * * * * | |
| *(fb, fc, fd, fe are NULLS) | |
| We can add homophones to the message like this: | |
| a b c d e | |
| i h g a a b c d e | |
| k j b f g h i j | |
| n l c k l m n o | |
| o m d p q r s t | |
| p e u v w x y | |
| f z * * * * | |
| The optimal way to set up these homophones is to calculate the frequency of | |
| appearance in the natural language you are using of each row of letters. | |
| Homophones should be added so that the cyphertext appearance of each homophone | |
| is reduced to a level where frequency analysis would yield little information. | |
| -Code Words | |
| One final method which can be used is that of code words. Simply replace | |
| important words in the plaintext with code words which represent another word. | |
| For example the nonsense plaintext that has been chosen for this document could | |
| actually mean: | |
| The blue cow will rise during the second moon from the west field. | |
| The king is angry and will attack in two weeks with the 1st calvary by way of | |
| the foothills. | |
| blue is angry | |
| cow is king | |
| rise is attack | |
| second is two weeks | |
| moon is 1st calvary | |
| west field stands for some foothills on the west side of the kingdom. | |
| Throughout this document I have mentioned frequency analysis of english | |
| documents. This is a fairly tedious task to do by hand, and so I am | |
| developing software to aid in frequency analysis of documents. I will be | |
| making it available via my website at http://www.cu-online.com/~jwthomp/ on | |
| Monday, September 8th. Please watch for it in the Cryptography section. | |
| Ok, now to try your hand at a few cyphertexts.. | |
| This one has to do with war. | |
| 1) | |
| kau noelb'd oerf xmtt okkopw ok qoxb euoqf kau kurhtoe wbmcakds, obq dkemwu amd | |
| podktu xamtu xu altq amr | |
| This one is an excerpt from a technical document. | |
| 2) | |
| etdsalwqs kpjsjljdq gwur orrh frurdjkrf sj qtkkjps npjtk ljeethalwsajhq | |
| sgrqr kpjsjljdq tqr w jhr sj ewhy kwpwfane ijp spwhqeaqqajh sykalwddy tqahn | |
| ldwqq f ahsrphrs kpjsjljd wffprqqrq sj qkrlaiy qkrlaial etdsalwqs npjtkq | |
| Mail me your answers and I'll put the first person who solves each cypher in | |
| the next Phrack. | |
| In fact, I would enjoy seeing some participation in this for the next Phrack. | |
| After reading this, I welcome the submission of any "Monoalphabetic" cypher | |
| based on the discussions of this article. Please do not yet submit any | |
| polyalphabetic cyphers (Next article). When submitting to me, please send me | |
| two letters. The first mail should include only the encyphered text. Make | |
| sure it is enough so that a reasonable examination can be made of the cypher. | |
| This first mail should have a subject "Cyphertext submission". If you are | |
| using a method of encypherment not found in this article, please enclose a | |
| brief description of the type of method you used. Follow this mail up with | |
| another entitled "Cyphertext Solution" along with a description of the | |
| encyphering method as well as the key or table used. | |
| I will select a number of these texts to be printed in the next Phrack, where | |
| readers may have a chance at solving the cyphers. The reason I ask for two | |
| seperate mailing is that I will want to take a crack at these myself. Finally, | |
| the names of individuals will be placed in the following phrack of the first | |
| to solve each cypher, and whomever solves the most cyphers prior to the next | |
| Phrack release (real name or pseudonym is fine). | |
| Please mail all submissions to jwthomp@cu-online.com | |
| I welcome any comments, suggestions, questions, or whatever at | |
| jwthomp@cu-online.com | |
| ----[ EOF | |