Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Kriptoanaliza homofone substitucijske šifre ; Cryptanalysis of homophonic substitution cipher

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • Contributors:
      Žitnik, Arjana
    • الموضوع:
      2019
    • Collection:
      University of Ljubljana: Repository (RUJ) / Repozitorij Univerze v Ljubljani
    • نبذة مختصرة :
      Substitucijsko šifro so znali s pomočjo frekvenčne analize razbiti že v 9. stoletju. Z razširitvijo abecede šifriranega sporočila šifro izboljšamo, saj s tem zabrišemo jezikovne vzorce in tako otežimo razbijanje. Izboljšani šifri rečemo homofona substitucijska šifra. Njeno razbijanje le z uporabo papirja in svinčnika tako ni mogoče. V diplomskem delu problem razbijanja homofone substitucijske šifre predstavimo kot optimizacijski problem, ki ga nato uspešno rešimo s kombinacijo dveh hevrističnih algoritmov. Med seboj primerjamo uporabo simuliranega ohlajanja in iskalnega algoritma Tabu ter vpliv uporabe bigramov in trigramov na možnost uspešnega razbitja šifre. Na uspešnost razbijanja je vplivala predvsem dolžina kriptograma in kompleksnost ključa šifre. Razvit algoritem je razbil kar 57% najtežjih testnih primerov in 98% najlažjih. ; Substitution cipher was broken using frequency analysis already in the 9th century. By using more ciphertext symbols the frequency distribution is flattened which makes cracking more difficult. This cipher is named homophonic substitution cipher. It is not possible to break it using only pencil and paper. In this thesis, the problem of breaking the homophonic substitution cipher is presented as an optimization problem, which is then successfully solved by a combination of two heuristic algorithms. We compare simulated annealing and Tabu search with each other and inspect the impact of the use of bigrams and trigrams on cracking. Performance is mainly influenced by the length of the ciphertext and the complexity of the cipher key. Our implementation broke as many as 57% of the most difficult test cases and 98% of the easiest ones.
    • File Description:
      application/pdf
    • Relation:
      https://repozitorij.uni-lj.si/IzpisGradiva.php?id=110534; https://repozitorij.uni-lj.si/Dokument.php?id=122204&dn=; https://plus.si.cobiss.net/opac7/bib/1538362819?lang=sl
    • Rights:
      info:eu-repo/semantics/openAccess
    • الرقم المعرف:
      edsbas.E3C0087B