This section provides an example illustrating encryption using monoalphabetic substitution. To make it easier to follow the steps that need to be performed with CrypTool, the example is illustrated with a number of screenshots.
We will encrypt a fairly long German document and then, using the automatic analysis function for monoalphabetic substitution, we will work out the key and the plaintext version in a ciphertext-only attack.
The text runs as follows:
DIE DEUTSCHE BANK IST VON INFORMATIONEN ABHAENGIG.
INFORMATIONEN ENTSCHEIDEN UEBER UNSEREN ERFOLG UND
DEN UNSERER KUNDEN. VON GROESSTER WICHTIGKEIT IST
NEBEN DER GENAUIGKEIT UND VERFUEGBARKEIT IN DEN
MEISTEN FAELLEN AUCH DIE VERTRAULICHKEIT VON
INFORMATIONEN. JEDER ANGESTELLTE MUSS SICH DAHER
DER NOTWENDIGKEIT DER INFORMATIONSSICHERHEIT
BEWUSST SEIN UND ENTSPRECHEND HANDELN.
This text is contained in the file probetext-de.txt
. To open this document in CrypTool, select File \ Open.
The document is now encrypted with the key CRYPTOOL
. The dialog box in which the key is entered is accessed via Crypt/Decrypt \ Classical \ Substitution.
Enter CRYPTOOL
into the appropriate data input field and click on the Encrypt button, following which this dialog box will appear.
This box explains how the substitutions have been derived from the key CRYPTOOL
. For encryption, the following substitutions have been made:
|
-> | C |
|
-> | R |
|
-> | Y |
|
-> | P |
|
-> | T |
... | ||
|
-> | B |
|
-> | A |
How the key is generated from the keyword
If monoalphabetic substitution is used with a key, a common way to use it, is that the letters of the key are attached to first letters of the cleartext alphabet. Then the remaining letters of the remaining letters of the target alphabet are attached to the remaining cleartext letters from the back of the alphabet.
Now click on OK, and a new window opens containing the encrypted text.
Let us now forget the key and carry out an analysis of the encrypted text. To do this, we select Analysis \ Manual Analysis \ Substitution, following which this dialog box appears.
Here we specify that we are expecting the plaintext to be in German and that an extended analysis should be performed. Confirmation of this dialog box opens the Manual Postprocessing window containing the analysis results.
The bottom section of the window presents the plaintext identified so far. The upper case letters denote substitutions recognised by the automatic analysis, while the lower case letters are taken directly from the encrypted text.
Manual post-processing is now necessary. We could, for example, make the following suppositions from looking at the plaintext:
DIE
, in which case the encrypted letter P
should be replaced by D
rather than by B
, as suggested.DEUTSCHE
, i.e. replace G
with U.
INFORMATIONSSICHERHEIT
, i.e. O
should be replaced by F
, N
by O
, S
by M
and C
by A
. After making these corrections, the Manual Post-processing window looks like this:
The remaining substitutions are now easy to guess and can be entered into the dialog box: R
is replaced by B
, V
is by K
, F
by V
, L
by G
, U
by L
, E
by W
, W
by J
and M
by P
.
This is the correct solution, giving the original plaintext. To crack the encryption, apart from the encrypted document the only knowledge required was that it was a German text and a small amount of instinctive feeling as to the first substitutions required. When the OK button is clicked, the plaintext is presented in another window.