Abstract
Substitution ciphers are codes in which each letter of the alphabet has one fixed substitute, and the word divisions do not change. In this paper the problem of breaking substitution ciphers is represented as a probabilistic labeling problem. Every code letter is assigned probabilities of representing plaintext letters. These probabilities are updated in parallel for all code letters, using joint letter probabilities. Iterating the updating scheme results in improved estimates that finally lead to breaking the cipher. The method is applied successfully to two examples.
- 1 Gaines, H.F. Cryptanalysis. Dover, New York, 1956.Google Scholar
- 2 Kirby, R. A product rule relaxation method. To appear in Comptr. Graphics and Image Processing.Google Scholar
- 3 Peleg, S., and Rosenfeld, A. Determining compatibility coefficients for curve enhancement relaxation processes. IEEE Trans. Systems, Man and Cybernetics SMC-8 (July 1978), 548-554.Google Scholar
- 4 Peleg, S. A new probabilistic relaxation scheme. IEEE Conf. on Pattern Recognition and Image Processing, Chicago, Aug. 1979, pp. 337-343.Google Scholar
- 5 Peleg, S. Ambiguity reduction in handwriting with ambiguous segmentation and uncertain interpretation. Comptr. Graphics and Image Processing 10 (July 1979), 235-245.Google ScholarCross Ref
- 6 Rosenfeld, A., Hummel, R.A., and Zucker, S.W. Scene labelling by relaxation operations. IEEE Trans. Systems, Man and Cybernetics SMC-6 (June 1976), 420-433.Google ScholarCross Ref
- 7 Sinkov, A. Elementary Cryptanalysis: A Mathematical Approach. Random House, New York, 1968.Google Scholar
Recommendations
Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems
GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computationA homophonic substitution cipher maps each plaintext letter of a message to one or more ciphertext symbols [4]. Monoalphabetic homophonic ciphers do not allow ciphertext symbols to map to more than one plaintext letter. Homophonic ciphers conceal ...
Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers
This article presents Christian ciphers counterparts of the well-known Hebrew atbah cipher used in main languages and scripts of the Christan Orient: in Greek, Coptic, and Syriac, in Late Antiquity and the Middle Ages. The article also describes other ...
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
PRESENT and MIBS are two lightweight block ciphers that are suitable for low resource devices such as radio-frequency identification tags. In this paper, we present the first biclique cryptanalysis of MIBS block cipher and a new biclique cryptanalysis ...
Comments