Skip to content

Commit 1e3e9f5

Browse files
committed
Perspective for all toy cipher exercises
1 parent 1c5e077 commit 1e3e9f5

File tree

6 files changed

+78
-6
lines changed

6 files changed

+78
-6
lines changed

exercises/affine-cipher/description.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,3 +72,17 @@ Finding MMI for `a = 15`:
7272

7373
[mmi]: https://en.wikipedia.org/wiki/Modular_multiplicative_inverse
7474
[coprime-integers]: https://en.wikipedia.org/wiki/Coprime_integers
75+
76+
## Perspective
77+
78+
While stronger than the atbash cipher, the affine cipher is still weak because the number of possible keys is way too small: 12 possible values for `a` (needs to be coprime to 26), 26 for `b`, so only 312 different keys. Given a ciphertext, you can write a program that prints all 312 possible plaintexts, one per line, and look at the list to quickly identify the line that looks like English. (This could even be automated using a dictionary.)
79+
80+
The affine cipher is an example of a [substitution cipher][sc]; other examples can be found in exercises "simple-cipher", "atbash-cipher", and "rotational-cipher".
81+
82+
You can find examples of ciphers based on an different principle, known as [transposition ciphers][tc], in exercises "crypto-square" and "rail-fence-cipher".
83+
84+
All of these ciphers are considered toy ciphers by current standards. However, substitution and transposition (also called permutation) are two building blocks of modern ciphers like [AES][aes].
85+
86+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
87+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
88+
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

exercises/atbash-cipher/description.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,3 +25,17 @@ All text will be encoded as lowercase letters.
2525
- Encoding `x123 yes` gives `c123b vh`
2626
- Decoding `gvhg` gives `test`
2727
- Decoding `gsvjf rxpyi ldmul cqfnk hlevi gsvoz abwlt` gives `thequickbrownfoxjumpsoverthelazydog`
28+
29+
## Perspective
30+
31+
The atbash cipher is weak because there is no secret key: as soon as you know (or guess) that the text has been encrypted with the atbash cipher, you can immediately decrypt it.
32+
33+
The atbash cipher is an example of a [substitution cipher][sc]; other examples can be found in exercises "rotational-cipher", "simple-cipher" and "affine-cipher".
34+
35+
You can find examples of ciphers based on an different principle, known as [transposition ciphers][tc], in exercises "crypto-square" and "rail-fence-cipher".
36+
37+
All of these ciphers are considered toy ciphers by current standards. However, substitution and transposition (also called permutation) are two building blocks of modern ciphers like [AES][aes].
38+
39+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
40+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
41+
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

exercises/crypto-square/description.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,3 +69,15 @@ Notice that were we to stack these, we could visually decode the ciphertext back
6969
"aohghn "
7070
"sseoau "
7171
```
72+
73+
## Perspective
74+
75+
This cipher is weak because there is no secret key: as soon as you know (or guess) that the text has been encrypted with this cipher, you can immediately decrypt it.
76+
77+
It is an example of a [transposition cipher][tc], like the exercise "rail-fence-cipher". Other exercises, like "rotational-cipher", "simple-cipher", "atbash-cipher" and "affine-cipher", are examples of [substitution ciphers][sc].
78+
79+
Substitution and transposition (also called permutation) are two building blocks of modern ciphers such as [AES][aes].
80+
81+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
82+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
83+
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

exercises/rail-fence-cipher/description.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,3 +55,15 @@ W . . . E . . . C . . . R . . . L . . . T . . . E
5555
```
5656

5757
If you now read along the zig-zag shape you can read the original message.
58+
59+
## Perspective
60+
61+
This cipher is weak because set the of possible values for the secret key (the number of rails) is very small (no more than the length of the message). Given a message encrypted with the rail fence cipher, you can write a program that tries all possible numbers of rails and prints out all possible plaintexts, one per line. It is then easy to look at the output and identify the line that looks like English. (This could even be automated, for example using a dictionary.)
62+
63+
The rail fence cipher is an example of a [transposition cipher][tc], like the exercise "crypto-square". Other exercises, like "rotational-cipher", "simple-cipher", "atbash-cipher" and "affine-cipher", are examples of [substitution ciphers][sc].
64+
65+
All of these ciphers are considered toy ciphers by current standards. However, substitution and transposition (also called permutation) are two building blocks of modern ciphers like [AES][aes].
66+
67+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
68+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
69+
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

exercises/rotational-cipher/description.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,17 @@ Ciphertext is written out in the same formatting as the input including spaces a
2727
- ROT26 `Cool` gives `Cool`
2828
- ROT13 `The quick brown fox jumps over the lazy dog.` gives `Gur dhvpx oebja sbk whzcf bire gur ynml qbt.`
2929
- ROT13 `Gur dhvpx oebja sbk whzcf bire gur ynml qbt.` gives `The quick brown fox jumps over the lazy dog.`
30+
31+
## Perspective
32+
33+
The rotational cipher is very weak because the number of possible keys is way too small. Given a message encrypted with this cipher, you can write a program that prints all 26 possible plaintexts and look at the list to quickly identify the one that looks like English. (This could even be automated, for example using a dictionary.)
34+
35+
You can find an improvement over this rotational cipher (also called shift cipher) in the exercise "simple-cipher". Other examples of [substitution ciphers][sc] can be found in exercises "atbash-cipher" and "affine-cipher".
36+
37+
You can find examples of ciphers based on an different principle, known as [transposition ciphers][tc], in exercises "crypto-square" and "rail-fence-cipher".
38+
39+
All of these ciphers are considered toy ciphers by current standards. However, substitution and transposition (also called permutation) are two building blocks of modern ciphers like [AES][aes].
40+
41+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
42+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
43+
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

exercises/simple-cipher/description.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,13 +66,16 @@ Let's make your substitution cipher a little more fault tolerant by providing a
6666

6767
If someone doesn't submit a key at all, generate a truly random key of at least 100 lowercase characters in length.
6868

69-
## Extensions
69+
## Perspective
7070

71-
Shift ciphers work by making the text slightly odd, but are vulnerable to frequency analysis.
72-
Substitution ciphers help that, but are still very vulnerable, especially when the key is short or if spaces are preserved.
73-
Later on you'll see one an improvement in the exercise "crypto-square".
71+
Shift ciphers work by making the text slightly odd, but are very weak because
72+
the number of possible keys is way too small. Given a message encrypted with this cipher, you can write a program that prints all 26 possible plaintexts and look at the list to quickly identify the one that looks like English. This could even be automated, for example using a dictionary, or frequency analysis.
7473

75-
However, all of these ciphers are considered toy ciphers by current standards. Modern alternatives include [AES][aes] and [Chacha][chacha].
74+
Substitution ciphers help that, but are still vulnerable to frequency analysis, especially when the key is short or if spaces are preserved. (Note: the Vigenère Cipher is only one example of a [substitution cipher][sc]; others can be found in exercises "atbash-cipher" and "affine-cipher".)
75+
76+
You can find examples of ciphers based on an different principle, known as [transposition ciphers][tc], in exercises "crypto-square" and "rail-fence-cipher".
77+
78+
All of these ciphers are considered toy ciphers by current standards. However, substitution and transposition (also called permutation) are two building blocks of modern ciphers like [AES][aes].
7679

7780
If you want to go farther in this field, the questions begin to be about how we can exchange keys in a secure way.
7881
Take a look at [Diffie-Hellman on Wikipedia][dh] for one of the first implementations of this scheme.
@@ -82,7 +85,10 @@ For a solid foundation in modern cryptography, you can check out the [Crypto 101
8285
[cc]: https://en.wikipedia.org/wiki/Caesar_cipher
8386
[img-caesar-cipher]: https://upload.wikimedia.org/wikipedia/commons/thumb/4/4a/Caesar_cipher_left_shift_of_3.svg/320px-Caesar_cipher_left_shift_of_3.svg.png
8487
[vc]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher
88+
89+
[sc]: https://en.wikipedia.org/wiki/Substitution_cipher
90+
[tc]: https://en.wikipedia.org/wiki/Transposition_cipher
8591
[aes]: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
86-
[chacha]: https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant
92+
8793
[dh]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
8894
[c101]: https://cryptography101.ca/crypto101-building-blocks/

0 commit comments

Comments
 (0)