Exploring the Future Potential of AI-Enabled Smartphone Processors
Classical ciphers
1. Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course --------------------------------------------- Fall 2013
Dept. of Computer Science – FITA – HUA
5. Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
FMNTOTOPSHRERLIITNEEDSSCXCESEEAORHN.
11. Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
AORHN.XCESEEEEDSSCRLIITNOPSHREFMNTOT
12. Information Security ------------- Fall 2013
Van Hoang Nguyen
PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails
CipherText: WECRLTEERDSOEEFEAOCAIVDEN
23. Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by http://www.dailymail.co.uk/news/article-2316536/40-000-piece-world-record-jigsaw-
collapses-floor-Weymouth-creator-turns-back.html
34. Information Security ------------- Fall 2013
Van Hoang Nguyen
= = A*
is a set of all permutations
E (Encryption): E(k, m) = m[k(1)]m[k(2)]….m[k(n)]
D (Decryption): D(k, c) = c[k-1(1)] c[k-1(2)]… c[k-1(n)]
35 letters ==> 50*1030 permutations
35. Information Security ------------- Fall 2013
Van Hoang Nguyen
= A* and = B*
= { k | k is a bijection from A to B}
E (Encryption): E(k, m) = k(m[1])k(m[2]) …. k(m[n])
D (Decryption): D(k, c) = k-1(c[1]) k-1(c[2]) … k-1(c[n])
26 letters ==> 5*1026 alphabetic ciphers
37. Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu 'Abd al-Rahman al-Khalil ibn
Ahmad ibn 'Amr ibn Tammam al
Farahidi al-Zadi al Yahmadi
39. Information Security ------------- Fall 2013
Van Hoang Nguyen
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
E T A O I N S R H D L U C M F Y W G P B V K X Q J Z
45. a b c d e f g h i j k l m n o p q r s t u
09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08
12 81 41 03 16 31 25 39 70 37 27 58 05 95 35 19 20 61
33 62 45 24 50 73 51 59 07 40 36 30 63
47 79 44 56 83 84 66 54 42 76 43
53 46 65 88 71 72 77 86 49
67 55 68 93 91 90 80 96 69
78 57 99 75
92 64 85
74 97
82
87
98
Homophonic cipher
46. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
47. Information Security ------------- Fall 2013
Van Hoang Nguyen
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
48. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFYHFWE
NKTWFSDSFREBMFYKTWTWIEWTWIEL
WEEQEYREXHWEBYMEEZUFUELQEYR
EQTTXEYMDYTSLZEBNYMBNSEHFQQE
XYYMTZYMFYYMNSLFQELBMNHMNXY
MNSSEXYYMNSETWRNSEYMTZXMFQY
STYGEXFAEIGDBTWPXYMTZMFXYGEE
SFXNSSEWYTTWZNSEIYWZSPXTSBNY
MEWEIKTWPXERUYDXHFWEHWTBXNF
SIDTZKNQQYMEHZUFSIKNQQYMEHFS
MFAEFWTZXEGEKTWEYMERTWSEAE
WDRTRESYINEXFRFSEAEWDRTRESYT
SENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E ?
49. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNTTMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFTHFWE
NKTWFSDSFREBMFTKTWTWIEWTWIEL
WEEQETREXHWEBTMEEZUFUELQETR
EQTTXETMDTTSLZEBNTMBNSEHFQQE
XTTMTZTMFTTMNSLFQELBMNHMNXT
MNSSEXTTMNSETWRNSETMTZXMFQT
STTGEXFAEIGDBTWPXTMTZMFXTGEE
SFXNSSEWTTTWZNSEITWZSPXTSBNT
MEWEIKTWPXERUTDXHFWEHWTBXNF
SIDTZKNQQTMEHZUFSIKNQQTMEHFS
MFAEFWTZXEGEKTWETMERTWSEAEW
DRTRESTINEXFRFSEAEWDRTRESTTS
ENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
50. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
51. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T ?
52. Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
THEEITBSFSIHFAESTXHFREHHEEPGD
OTBQFSIPSEEGDPSEEBHFTHFWENKT
WFSDSFREBHFTKTWTWIEWTWIELWEE
QETREXHWEBTHEEZUFUELQETREQTT
XETHDTTSLZEBNTHBNSEHFQQEXTTH
TZTHFTTHNSLFQELBHNHHNXTHNSSE
XTTHNSETWRNSETHTZXHFQTSTTGEX
FAEIGDBTWPXTHTZHFXTGEESFXNSSE
WTTTWZNSEITWZSPXTSBNTHEWEIKT
WPXERUTDXHFWEHWTBXNFSIDTZKN
QQTHEHZUFSIKNQQTHEHFSHFAEFWT
ZXEGEKTWETHERTWSEAEWDRTRESTI
NEXFRFSEAEWDRTRESTTSENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
53. Information Security ------------- Fall 2013
Van Hoang Nguyen
SITTHEEDOWNANDHAVENOSHAMECH
EEKBYJOWLANDKNEEBYKNEEWHATC
AREIFORANYNAMEWHATFORORDERO
RDEGREELETMESCREWTHEEUPAPEG
LETMELOOSETHYTONGUEWITHWINEC
ALLESTTHOUTHATTHINGALEGWHICHI
STHINNESTTHINEORMINETHOUSHALT
NOTBESAVEDBYWORKSTHOUHASTBE
ENASINNERTOORUINEDTRUNKSONWI
THEREDFORKSEMPTYSCARECROWSI
ANDYOUFILLTHECUPANDFILLTHECANH
AVEAROUSEBEFORETHEMORNEVERY
MOMENTDIESAMANEVERYMOMENTON
EISBORN
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
54. Information Security ------------- Fall 2013
Van Hoang Nguyen
Sit thee down, and have no shame,
Cheek by jowl, and knee by knee:
What care I for any name?
What for order or degree?
Let me screw thee up a peg:
Let me loose thy tongue with wine:
Callest thou that thing a leg?
Which is thinnest? thine or mine?
Thou shalt not be saved by works:
Thou hast been a sinner too:
Ruined trunks on withered forks,
Empty scarecrows, I and you!
Fill the cup, and fill the can:
Have a rouse before the morn:
Every moment dies a man,
Every moment one is born.
Alfred Tennyson (1809-1892)
55. Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQQMVMVJLEYMHFEFNZPSDLPPSD
LPEVQMWCXYMDAVQEEFIQCAYTQOW
CXYMWMSEMEFCFWYEYQETRLIQYCG
MTWCWFBSMYFPLRXTQYEEXMRULUK
SGWFPTLRQAERLUVPMVYQYCXTWFQ
LMTELSFJPQEHMOZCIWCIWFPZSLMA
EZIQVLQMZVPPXAWCSMZMORVGVVQ
SZETRLQZPBJAZVQIYXEWWOICCGDW
HQMMVOWSGNTJPFPPAYBIYBJUTWRL
QKLLLMDPYVACDCFQNZPIFPPKSDVPT
IDGXMQQVEBMQALKEZMGCVKUZKIZB
ZLIUAMMVZ
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
M 35 9.537
Q 27 7.357
P 23 6.267
E 21 5.722
L 21 5.722
V 21 5.722
W 19 5.177
Z 18 4.905
F 17 4.632
Y 17 4.632
I 16 4.360
C 16 4.360
T 13 3.542
R 11 2.997
S 11 2.997
U 10 2.725
A 10 2.725
X 9 2.452
B 8 2.180
O 8 2.180
G 8 2.180
D 8 2.180
K 7 1.907
J 5 1.362
H 4 1.090
N 4 1.090
56. Information Security ------------- Fall 2013
Van Hoang Nguyen
0
2
4
6
8
10
12
M Q P E L V W Z F Y I C T R S U A X B O G D K J H N
0
2
4
6
8
10
12
14
16
J Y S T M F W X N R Q I B Z H D G P K A L U O
75. Information Security ------------- Fall 2013
Van Hoang Nguyen
N Q C B E O T H E X G
A P O C A L Y P T I C
APOCALYPTIC, CRYPT, EGYPT
C I T H E
C R Y P T
A T T H E
E G Y P T