An automatic cryptanalysis of simple substitution ciphers using compression

Research output: Contribution to journalArticlepeer-review

Standard Standard

An automatic cryptanalysis of simple substitution ciphers using compression. / Alkazaz, Noor R.; Irvine, Sean A.; Teahan, William J.
In: Information Security Journal: A Global Perspective, Vol. 27, No. 1, 2018, p. 57-75.

Research output: Contribution to journalArticlepeer-review

HarvardHarvard

Alkazaz, NR, Irvine, SA & Teahan, WJ 2018, 'An automatic cryptanalysis of simple substitution ciphers using compression', Information Security Journal: A Global Perspective, vol. 27, no. 1, pp. 57-75. https://doi.org/10.1080/19393555.2018.1426799

APA

Alkazaz, N. R., Irvine, S. A., & Teahan, W. J. (2018). An automatic cryptanalysis of simple substitution ciphers using compression. Information Security Journal: A Global Perspective, 27(1), 57-75. https://doi.org/10.1080/19393555.2018.1426799

CBE

Alkazaz NR, Irvine SA, Teahan WJ. 2018. An automatic cryptanalysis of simple substitution ciphers using compression. Information Security Journal: A Global Perspective. 27(1):57-75. https://doi.org/10.1080/19393555.2018.1426799

MLA

Alkazaz, Noor R., Sean A. Irvine, and William J. Teahan. "An automatic cryptanalysis of simple substitution ciphers using compression". Information Security Journal: A Global Perspective. 2018, 27(1). 57-75. https://doi.org/10.1080/19393555.2018.1426799

VancouverVancouver

Alkazaz NR, Irvine SA, Teahan WJ. An automatic cryptanalysis of simple substitution ciphers using compression. Information Security Journal: A Global Perspective. 2018;27(1):57-75. Epub 2018 Jan 25. doi: 10.1080/19393555.2018.1426799

Author

Alkazaz, Noor R. ; Irvine, Sean A. ; Teahan, William J. / An automatic cryptanalysis of simple substitution ciphers using compression. In: Information Security Journal: A Global Perspective. 2018 ; Vol. 27, No. 1. pp. 57-75.

RIS

TY - JOUR

T1 - An automatic cryptanalysis of simple substitution ciphers using compression

AU - Alkazaz, Noor R.

AU - Irvine, Sean A.

AU - Teahan, William J.

PY - 2018

Y1 - 2018

N2 - Automatic recognition of correct solutions as a result of a ciphertext only attack of simple ciphers is not a trivial issue and still remains a taxing problem. A new compression based method for the automatic cryptanalysis of simple substitution ciphers is introduced in this paper. In particular, this paper presents how a Prediction by Partial Matching (PPM) text compression scheme, a method that shows a high level of performance when applied to different natural language processing tasks, can also be used for the automatic decryption of simple substitution ciphers. Experimental results showed that approximately 92% of the cryptograms were decrypted correctly without any errors and 100% with just three errors or less. Extensive investigations are described in this paper, in order to determine which is the most appropriate type of PPM scheme that can be applied to the problem of automatically breaking substitution ciphers. This paper shows how a new character-based PPM variant significantly outperforms other schemes including the standard Gzip and Bzip2 compression schemes. We also apply a word-based variant which when combined with the character-based method leads to further improved results.

AB - Automatic recognition of correct solutions as a result of a ciphertext only attack of simple ciphers is not a trivial issue and still remains a taxing problem. A new compression based method for the automatic cryptanalysis of simple substitution ciphers is introduced in this paper. In particular, this paper presents how a Prediction by Partial Matching (PPM) text compression scheme, a method that shows a high level of performance when applied to different natural language processing tasks, can also be used for the automatic decryption of simple substitution ciphers. Experimental results showed that approximately 92% of the cryptograms were decrypted correctly without any errors and 100% with just three errors or less. Extensive investigations are described in this paper, in order to determine which is the most appropriate type of PPM scheme that can be applied to the problem of automatically breaking substitution ciphers. This paper shows how a new character-based PPM variant significantly outperforms other schemes including the standard Gzip and Bzip2 compression schemes. We also apply a word-based variant which when combined with the character-based method leads to further improved results.

U2 - 10.1080/19393555.2018.1426799

DO - 10.1080/19393555.2018.1426799

M3 - Article

VL - 27

SP - 57

EP - 75

JO - Information Security Journal: A Global Perspective

JF - Information Security Journal: A Global Perspective

SN - 1939-3555

IS - 1

ER -