Beruflich Dokumente
Kultur Dokumente
An Examination of Some
Unsolved Ciphers
1
Slide 2
Introduction
2
Slide 3
Who am I, and
why am I here?
3
Slide 4
4
Slide 5
5
Slide 6
Agenda
Introduction
Brief
History of Cryptography
Examples of Solved Ciphers
Unsolved Ciphers
ShmooCipher
Conclusions
Questions & Answers
6
Slide 7
Brief History of
Cryptography
7
Slide 8
Early Examples
καὶ ἵνα μή τις δύνηται ἀγοράσαι ἢ πωλῆσαι εἰ μὴ ὁ ἔχων τὸ
χάραγμα, τὸ ὄνομα τοῦ θηρίου ἢ τὸν ἀριθμὸν τοῦ ὀνόματος
αὐτοῦ. Ὧδε ἡ σοφία ἐστίν· ὁ ἔχων νοῦν ψηφισάτω τὸν
ἀριθμὸν τοῦ θηρίου· ἀριθμὸς γὰρ ἀνθρώπου ἐστί· καὶ ὁ
ἀριθμὸς αὐτοῦ χξϛʹ.
And that no man might buy or sell, save he that had the
mark, or the name of the beast, or the number of his name.
Here is wisdom. Let him that hath understanding count the
number of the beast: for it is the number of a man; and his
number is Six hundred threescore and six.
-- Revelation 13:16-17
8
Slide 9
Hebrew Gematria
Nero Caesar
Neron Kaisar
NRWN QSR
N R W N Q S R
נ ר ו נ ק ס ר
50 200 6 50 100 60 200
Early Examples
10
Slide 11
Atbash Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Z Y X W V U T S R Q P O N M L K J I H G F E D C B A
Sheshakh
Bavel is Hebrew for Babylon
11
Slide 12
Al-Kindi
12
Slide 13
Polyalphabetic Substitution
Leon Battista Alberti developed the
first polyalphabetic substitution
cipher circa 1467
Strengthened ciphers against
frequency analysis attack
Vigenère cipher is the best known
example
Enigma performed a polyalphabetic
substitution (still some unsolved!)
13
Slide 14
The Gold-Bug
Edgar Allen Poe story based around a
simple substitution cipher
Won the grand prize in a writing contest
sponsored by the Philadelphia Dollar
Newspaper ($100!)
Most popular and most-widely read of Poe’s
works during his lifetime
A young William Friedman became
interested in cryptography after reading The
Gold-Bug
14
Slide 15
The Gold-Bug
53‡‡†305))6*;4826)4‡.)4‡);806*;48†8
¶60))85;1‡(;:‡*8†83(88)5*†;46(;88*96
*?;8)*‡(;485);5*†2:*‡(;4956*2(5*—4)8
¶8*;4069285);)6†8)4‡‡;1(‡9;48081;8:8‡
1;48†85;4)485†528806*81(‡9;48;88;4
(‡?34;48)4‡;161;:188;‡?;
A good glass in the bishop's hostel in the
devil's seat
forty-one degrees and thirteen minutes
northeast and by north
main branch seventh limb east side shoot from
the left eye of the death's-head
a bee line from the tree through the shot fifty
feet out. 15
Slide 16
Tap Code
Based upon taps 1 2 3 4 5
Polybius Square 1 A B C/K D E
C is used to 2 F G H I J
represent K 3 L M N O P
Used by prisoners to
communicate (most 4 Q R S T U
famously U.S. 5 V W X Y Z
POWs in Vietnam)
16
Slide 17
17
Slide 18
Smithy Code
Came about as a result of the Da Vinci Code
plagiarism case
Justice Peter Smith encoded a message into
the actual text of the judgment by italicizing
specific letters
s m i t h y c o d e J a e i e x t o s t
g
p s a c g r e a m q w f k a d p m q z v
-
20
Slide 21
Smithy Code
The cipher is a Beaufort Variant of a
Vigenère polyalphabetic substitution cipher.
The key is an alphabetic transposition of a
modified Fibonacci sequence
21
Slide 22
Unsolved Ciphers
22
Slide 23
Partial Solutions
23
Slide 24
Kryptos
Created by artist James Sanborn (1990)
Consulted with Ed Scheidt, former Chairman
of the CIA Cryptographic Center
Three of four sections solved
– James Gilloghy (computer scientist, 1999)
– David Stein (CIA, 1998, not public at the time)
– Ken Miller, Dennis McDaniels and others (NSA,
1992, not public at the time)
KRYPTOS Group coordinates actions of
attempts to solve the fourth section
24
Slide 25
K1 Ciphertext
EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJ
YQTQUXQBQVYUVLLTREVJYQTMKYRDMFD
25
Slide 26
1 2 3 4 5 6 7 8 9 10
E M U F P H Z L R F
B E T W E E N S U B 26
Slide 27
K1 Solution
27
Slide 28
K2 Ciphertext
VFPJUDEEHZWETZYVGWHKKQETGFQJNCE
GGWHKK?DQMCPFQZDQMMIAGPFXHQRLG
TIMVMZJANQLVKQEDAGDVFRPJUNGEUNA
QZGZLECGYUXUEENJTBJLBQCRTBJDFHRR
YIZETKZEMVDUFKSJHKFWHKUWQLSZFTI
HHDDDUVH?DWKBFUFPWNTDFIYCUQZERE
EVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDX
FLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKF
FHQNTGPUAECNUVPDJMQCLQUMUNEDFQ
ELZZVRRGKFFVOEEXBDMVPNFQXEZLGRE
DNQFMPNZGLFLPMRJQYALMGNUVPDXVKP
DQUMEBEDMHDAFMJGZNUPLGEWJLLAETG
28
Slide 29
K2 Solution
It was totally invisible Hows that
possible? They used the Earths magnetic field
X
The information was gathered and transmitted
undergruund to an unknown location X
Does Langley know about this? They should Its
buried out there somewhere X
Who knows the exact location? Only WW This
was his last message X
Thirty eight degrees fifty seven minutes six
point five seconds north
Seventy seven degrees eight minutes forty four
seconds west X
Layer 2
29
Slide 30
K3 Ciphertext
ENDYAHROHNLSRHEOCPTEOIBIDYSHNAIA
CHTNREYULDSLLSLLNOHSNOSMRWXMNE
TPRNGATIHNRARPESLNNELEBLPIIACAE
WMTWNDITEENRAHCTENEUDRETNHAEOE
TFOLSEDTIWENHAEIOYTEYQHEENCTAYCR
EIFTBRSPAMHHEWENATAMATEGYEERLB
TEEFOASFIOTUETUAEOTOARMAEERTNRTI
BSEDDNIAAHTTMSTEWPIEROAGRIEWFEB
AECTDDHILCEIHSITEGOEAOSDDRYDLORIT
RKLMLEHAGTDHARDPNEOHMGFMFEUHE
ECDMRIPFEIMEHNLSSTTRTVDOHW?
30
Slide 31
K2 Solution
31
Slide 32
K4 Ciphertext
OBKR
UOXOGHULBSOLIFBBWFLRVQQPRNGKSSO
TWTQSJQSSEKZZWATJKLUDIAWINFBNYP
VTTMZFPKWGDKZXTJCDIGKUHUAUEKCAR
32
Slide 33
Partial Solutions
33
Slide 34
36
Slide 37
37
Slide 38
38
Slide 39
Voynich Manuscript
39
Slide 40
Dorabella Cipher
40
Slide 41
d'Agapeyeff Cipher
75628 28591 62916 48164 91748 58464 74748 28483 81638 18174
74826 26475 83828 49175 74658 37575 75936 36565 81638 17585
75756 46282 92857 46382 75748 38165 81848 56485 64858 56382
72628 36281 81728 16463 75828 16483 63828 58163 63630 47481
91918 46385 84656 48565 62946 26285 91859 17491 72756 46575
71658 36264 74818 28462 82649 18193 65626 48484 91838 57491
81657 27483 83858 28364 62726 26562 83759 27263 82827 27283
82858 47582 81837 28462 82837 58164 75748 58162 92000
41
Slide 42
42
Slide 43
43
Slide 44
1
When 2in 3the 4Course 5of 6human 7events 8it
9
becomes 10necessary for one people to
dissolve the political bands which 20have
connected them with another and to assume
among the 30powers of the earth, the separate
and equal station to 40which the Laws of
Nature and of Nature's God entitle 50them, a
decent respect to the opinions of mankind
requires 60that they should declare the causes
which impel them to 70the separation.
44
Slide 45
Beale Cipher
I 115 HAVE 73 24 807 37 DEPOSITED 52 49 17 31
62 647 22 7 15 IN 140 47 THE 29 107 79 COUNTY
84 56 239 10 26 811 OF 5 196 BEDFORD 308 85 52
160 136 59 211…
I have deposited in the county of Bedford about fo[u]r miles from
Bufords in an e[x]cavation or vault si[x] feet below the surface of
the ground the following articles belonging jointly to the parties
whose names are given in number three herewith. The first deposit
consist[e]d of ten hundred and fourteen pounds of gold and thirty
eight hundred and twelve pounds of silver deposited Nov eighteen
nineteen. The second was made Dec eighteen twenty one and consisted
of nineteen hundred and seven pounds of gold and twelve hundred and
eighty eight of silver, also jewels obtained in St. Louis in
e[x]change to save transportation and valued at thirteen [t]housand
dollars. The above is securely packed i[n] [i]ron pots with iron
cov[e]rs. The vault is roughly lined with stone and th[e] vessels
rest on solid stone and are covered [w]ith others. Paper number one
describes th[e] e[x]act locality of the va[u]lt so that no difficulty
will be had in finding it.
45
Slide 46
46
Slide 47
Beale Ciphers
Parts1 & 3 are as yet unsolved
The modified DOI is the key to Part 2, but
doesn’t help with Parts 1 & 3
There is a considerable body of scholarship
which lends to the belief that the Beale
Ciphers are an elaborate hoax
47
Slide 48
ShmooCipher
48
Slide 49
Stage 1
Stage 1
230 266 239 333 73 20 327 39 173 105 184 185 16 347 131
214 138 48 218 328 101 349 (9) (8) 33 346 28 260 142 167
50
Slide 51
Stage 1
D E S P I T E T H E A P
1 2 3 4 5 6 7 8 9 10 11 12
P L I C A T I O N O F H
13 14 15 16 17 18 19 20 21 22 23 24
And so on…
51
Slide 52
Stage 1 Solution
230 266 239 333 73 20 327 39 173
w w w g e o c i t
Stage 1 Solution
wwwgeocitiescomtheprez98cipher
www.geocities.com/theprez98/cipher
53
Slide 54
Stage 2
54
Slide 55
Conclusions
55
Slide 56
Conclusions
Cryptography weaves through history among
many disciplines, particularly religion and
warfare
You don’t have to be a mathematician or
even very good at math! ;)
Amateurs can make significant contributions
to solving ciphers
You can contribute to distributed computing
efforts
56
Slide 57
References
http://www.mechon-mamre.org
http://www.bokler.com/eapoe.html
http://filebox.vt.edu/users/batman/kryptos.html
http://elonka.com
http://www.zodiackiller.com
57
Slide 58
58