On Github WilliamMayor / present.scytale.xyz
I'm Billy...
I work for BAFTA and Diversity and Ability
I studied Computer Science and Security Science at UCL
I did A-levels in Maths, Further Maths, and Drama
How can we protect messages from prying eyes?
How can we read encrypted messages?
How can we break into encrypted messages?
What are secure communications used for?
(Pronounced like Italy)
Used by the Ancient Greeks and the Spartans as early as 7th century BC
Wrap a long strip of paper around a stick and write a message along the stick Rotate the stick when you reach the end and write another line Unwrap the paper to reveal your ciphertext15:00
What's good?
Quick, simple, robust
What's bad?
Easy to hack, clumsy for long messages
How could you hack this?
Have lots of scytales, use a computer
Why use it?
Message authentication
e.g. Ceasar Ciphers
Replace letters in your plaintext with random letters to produce your ciphertext
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z W X Y Z A B C D E F G H I J K L M N O P Q R S T U Ve.g. Scytale
Shuffle the letters in your plaintext to produce your ciphertext
Changing a letter into a number and back again
A=43
08=(
a % n = b or a = b mod n
6 % 5 = 1
(9 * 2) % 5 = 3
34 = 4 mod 6
Today I'm going to split you up into groups of 4 and pit you against each other in a cat and mouse game of encryption, decryption and hacking.
Here's the goal: to use encryption methods in a way that will keep your group's messages secure. You're also tasked with hacking into the encryption created by your opponents.
You have a day to learn about encryption, decryption and hacking. You then have to apply that knowledge and best the other groups.
Every group can hack them
They're hacking every group
Come up with a group name
Learn your ciphers
Decide on your secret keys
Encrypt your first messages
Try every possible key
Works on substitution ciphers
How common are letters in the English language?
How common are letters in the ciphertext?
Works on transposition ciphers
If you know how one message was shuffled, you know how they all are
Encrypt and hack
Prepare a presentation
The bigger threat
We've seen how hard it is to hack some ciphers. Each of the ciphers you've been using are no longer used seriously, they were all written before computers were built. Applying a brute force, or known plaintext attack to any of your ciphers using a computer is easy. For this reason modern day ciphers (like the one the teachers were using) are vastly more complex and difficult to hack, even for a supercomputer. Hopefully, what you've seen now though is that the biggest threat to a cipher, the easiest way to hack a key or easily obtain the plaintext, is to ask. If you appear to be in a postition of authority and you ask someone for their secrets, they will most likely tell you. That's what the teachers did, and they won. You knew they were competing against you. Some of you were trying to hack their codes and were swapping your encrpyted messages for theirs. Yet when they said "hello, what's your secret key?" you told them.