Chapter 6.6 - Cryptography Basics

Time Estimate: 90 minutes

6.6.1. Introduction and Goals

In the preceding lesson, you built a Caesar Cipher app and learned that cryptography means secret writing. It is the art and science of sending secret messages and it has been used by generals and governments and everyday people practically since the invention of written language.

As we will see in this lesson, modern cryptographic techniques are essential to guaranteeing the security of our transactions on the Internet. Cryptography plays a role whenever you make an online purchase at Amazon or provide your password to Google. If we couldn't rely on those transactions being secure -- i.e., being encrypted using some cryptographic algorithm -- we wouldn't have the Internet as we know it today.

This lesson focuses on some of the classical ciphers that followed the Caesar Cipher, which Julius Caesar used in 34 B.C. Like the Caesar cipher, the other ciphers we will study in this lesson will use symmetric encryption, which means that the same key is used both for encrypting and decrypting messages. As we will also see, all ciphers consist of two parts, the key and their algorithm. And it is the key, not the algorithm, that allows the cipher to create secret messages. In fact, in modern cryptography the algorithms are all based on open standards that are created by teams of experts, discussed openly and adopted and maintained by standards organizations.

Learning Objectives: I will learn to

  • perform frequency analyses to identify substitution and transposition ciphers

  • encrypt and decrypt messages using Vigenere Cipher

  • describe the key exchange problem

Language Objectives: I will be able to

  • explain how substitution ciphers can be broken

  • use target vocabulary, such as frequency analysis, polyalphabetic substitution, one time pad, and key exchange problem while describing symmetric encryption ciphers, with the support of concept definitions and vocabulary notesarrow-up-right from this lesson

6.6.2. Learning Activities

Let's take a look at some of the classical ciphers and some of the basic principles of cryptography. There are several hands-on activities in this lesson, where you'll have a chance to practice encrypting and decrypting messages and analyzing ciphers.

Part 1: Simple Substitution Cipher

Activity: 6.6.2.1 YouTube (86sjWJXhixU)arrow-up-right

Activity: Simple Substitution Cipher

(Open widget in separate windowarrow-up-right)

  1. By Hand. Use a simple substitution cipher to encrypt your name. Choose your own keyword to create a cipher alphabet. Then use the widget above to check your result.

  2. Decrypt. The following word, SIRTQSMTCKJ, was encrypted with the keyword simple. Can you decrypt it?

  3. Brute force attack. How many keys (arrangements of the alphabet) would you have to try to perform a brute force attack?

Part 2: Frequency Analysis

Activity: 6.6.2.2 YouTube (kgFwFZQECFM)arrow-up-right

Activity: Frequency Analysis

(Open widget in separate windowarrow-up-right)

Frequency analysis. One of the following messages was encrypted using a substitution cipher and the other with a transposition cipher. Can you identify which is which? Paste the messages into the frequency analyzer tool (above) and observe their frequency histograms.

Text 1.

nybfx ymjgj xytky nrjxn ybfxy mjbtw xytky nrjx nybfx ymjfl jtkbn xitrn ybfxy mjflj

tkktt qnxms jxxn ybfxy mjjut hmtkg jqnjk nybfx ymjju thmtk nshwj izqny dnyb fxymj

xjfxt stkqn lmyny bfxym jxjfx tstki fwpsj xxny bfxym jxuwn sltkm tujny bfxym jbnsy

jwtki jxufn wbjm fijaj wdymn slgjk twjzx bjmfi stymn slgjk twjzx bjbj wjfqq ltnsl inwjh

yytmj fajsb jbjwj fqqlt nslin wjhy ymjty mjwbf dnsxm twyym jujwn tibfx xtkfw qnpjy

mjuwj xjsy ujwnt iymfy xtrjt knyxs tnxnj xyfzy mtwny njxns xnxyj itsny xgjn slwjh jnaji

ktwlt titwk twjan qnsym jxzuj wqfyn ajijl wjjt khtru fwnxt stsqd

Text 2.

ttbti swhot istta osmwh gflhs tsecf liaho ondia henit ahena nwtpnf ewtie fpree rhbou

hnhbo uerli deovw rlode oeasr hrdsa itrei ttein ittie ntote gceoo rrits etegc psoya hsfmt

sesfm iahew dtseo oiewh pheet tecir uytss sohts ssoks isero oisen oeawa vtnee watne

ewagn rtenw egnit htwih tpiao reeet eoaoo sieuo tiiei ieidg dfvih pliee omrol setet wtese

iotao siaoo fwphe lwtof wtofs tsipt wtsid egfed gfweo gtaea grehn oeofl psrdm fssri

sdbnv foone avefi nweoi arowg fiaef nsteb isefc tieag ieare ahgha hrdhy irsoi rseli ceeli

ctryt ewskh nphst oahss nsrer oelur droan

Part 3: Vigenere Cipher

Activity: 6.6.2.3 YouTube (cPiHgaLB8yY)arrow-up-right

Activity: Vigenere Cipher

(Open widget in separate windowarrow-up-right)

  1. By Hand. Use the Vigenere cipher to encrypt your name. Choose your own keyword.

  2. Decrypt the following message, which was encrypted using Vigenere Cipher, with the keyword zebras. SLJJ IK OSMPADOLBSELHG

  3. Frequency Analysis. Use the Frequency Analyzer tool (above) to count the letter frequencies in the following text, which is the same text that was encrypted in an earlier exercise. In this case it was encrypted using Vigenere Cipher. What differences do you observe from the histograms you used in the previous exercise?

sabjt zdffj tgexj dekhx xrslg ixfrk ssgki edwj kwsrx ivayd sgnik csnzt ozwuy esfip wfgnp

jjhfd wtzt ozwuy ewosd yoxai mzexh xxrsl gifgo ugsgz nuqie llasc jkws rxivs wzwpe

oxhki kilve tkhwr ibjof njbik fdwt ztozw uyeko vjegg elpge asabj tzdaj etwqs gueko ejiw

wgeev vwqcu yifff fwojd ytnez zhoft zhrhs exnvf lsod afies kphfi ffhji eusxp vandr xvwwq

ibcly nmoxd aqidk tzds uyejv ezznk gsskt zdtfi igcab jsgee scicd xivpj dwfet hdvj fdlge

ujoed sgztk msjji wrxbl tznvj kiwrm ojiks iefna swcv iffvf teaui ewojf spuoj essvv akmok

hwryq vrdzx jmevd ksve gegpd psqmt fngmp z

Part 4: Perfect Secrecy and the Key Exchange Problem

Activity: 6.6.2.4 YouTube (UkC233aGc8Y)arrow-up-right

6.6.3. Summary

In this lesson, you learned how to:

Learning Objective CSN-1.B: Explain how the Internet works.

  • The Internet is a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.

Learning Objective IOC-2.B: Explain how computing resources can be protected and can be misused.

  • Encryption is the process of encoding data to prevent unauthorized access. Decryption is the process of decoding the data. Two common encryption approaches are: - Symmetric key encryption involves one key for both encryption and decryption. - Public key encryption pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message. Exclusion Statement (EK IOC-2.B.5): Specific mathematical procedures for encryption and decryption are beyond the scope of this course and the AP Exam.

6.6.4. Still Curious

6.6.5. Self-Check

Here is a table of some of the technical terms discussed in this lesson. Hover over the terms to review the definitions.

cipher

cryptography

encryption

plaintext

ciphertext

decryption

encryption key

encryption algorithm

symmetric encryption

substitution cipher

transposition cipher

brute force attack

frequency analysis

polyalphabetic substitution

one time pad

key exchange problem

Q-5: One technique that can be used to break a Caesar cipher is called _________________________.

A. frequency analysis

B. encryption

C. cryptography analysis

D. decryption

Q-6: Suppose that the following word, EAIWSQI, was encrypted with a Caesar cipher and when you do a frequency analysis you learn that the most frequent letter was 'i'. What is the secret word? Type your answer into the Textbox. (Make sure there are no extra spaces in your answer.

Q-7: Caesar cipher, simple substitution cipher, and Vigener cipher are all examples of __________ ciphers.

A. Transposition

B. Substitution

C. Symmetric

D. Alphabetic

Q-8: A polyalphabetic cipher is one that ______________.

A. Uses the same alphabet over and over again

B. Uses multiple alphabets

C. Rearranges the plaintext alphabet using a keyword

D. Rearranges the letters in the message according to some rule

Q-9: The key exchange problem is ____

A. the challenge of setting up an exchange system where cryptographic keys can be stored securely.

B. the problem swapping Alice's key for Bob's key.

C. the problem of securely sharing an asymmetric key.

D. the problem of securely sharing a symmetric key between Alice and Bob.

6.6.6. Reflection: For Your Portfolio

Answer the following portfolio reflection questions as directed by your instructor. Questions are also available in this Google Docarrow-up-right where you may use File > Make a Copy to make your own editable copy.

Complete the following table, describe the encryption and decryption process for each cipher, and how each can be broken.

Cipher

Encryption process

Decryption process

How it can be broken

Caesar

Simple substitution

Vigenere

Explain why the benefits of symmetric ciphers are negated by the issue of key exchange.

Portfolio Reflection Questions

Make a copy of this document in your Portfolio Assignments folder and answer these questions in the spaces below. Once complete, turn in this assignment according to the steps given by your teacher.

6.6 Cryptography Basics Curriculum Pagearrow-up-right

Answer the following questions:

1. Complete the following table, describe the encryption and decryption process for each cipher, and how each can be broken.

Cipher

Encryption process

Decryption process

How it can be broken

Caesar

Simple substitution

Vigenere

2. Explain why the benefits of symmetric ciphers are negated by the issue of key exchange.

Answer:

Last updated