Contact analysis (cryptanalysis)

Contact analysis (cryptanalysis)

In cryptanalysis, contact analysis is the study of the frequency with which certain symbols precede or follow other symbols. The method is used as an aid to breaking classical ciphers.

Contact analysis is based on the fact that, in any sample of any written language, certain symbols appear adjacent to other symbols with varying frequencies. Moreover, these frequencies are roughly the same for almost all samples of that language, even when the distribution of the symbols themselves differs significantly from normal. This is true regardless of whether the symbols being used are words or letters.

In some ciphers, these properties of the natural language plaintext are preserved in the ciphertext, and have the potential to be exploited in a ciphertext-only attack.

Although in a sense contact analysis can be considered a type of frequency analysis, most discussions of frequency analysis concern themselves with the simple probabilities of the symbols in the text: P(Xi = a) or P(X_i=a \cap X_{i+1}=b)

Contact analysis is based on the conditional probability that certain letters will precede or succeed other letters: P(X_i=b \mid X_{i-1}=a), or P(X_i=c \mid X_{i-2}=a \cap X_{i-1}=b), or even P(X_i \sub S \mid X_{i-1}\sub T \cap X_{i+1} \sub T), where S and T are subsets of the alphabet being used.

Where frequency analysis is based on first-order statistics, contact analysis is based on second or third-order statistics.


External links



Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Cryptanalysis of the Enigma — enabled the western Allies in World War II to read substantial amounts of secret Morse coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from… …   Wikipedia

  • Intelligence analysis — This article deals with the intellectual process of analysis itself, as opposed to intelligence analysis management, which, in turn, is a subcomponent of intelligence cycle management. For a complete hierarchical list of articles in this series,… …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • Linguistics — is the scientific study of language, encompassing a number of sub fields. An important topical division is between the study of language structure (grammar) and the study of meaning (semantics). Grammar encompasses morphology (the formation and… …   Wikipedia

  • Winston Smith Project — (in Italian Progetto Winston Smith , or PWS) is the name of an informational and operational project for the defence of human rights on the internet and in the digital era. It was started in 1999 as an anonymous association and it is… …   Wikipedia

  • cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction …   Universalium

  • Al-Kindi — Infobox Philosopher region = Arab scholar era = Islamic Golden Age color = #B0C4DE image caption = Syrian postage stamp depicting al Kindi name = Al Kindi birth = c. 801 death = c. 873 school tradition = Early Islamic philosophy, Mu tazili,… …   Wikipedia

  • Signals intelligence in modern history — This article is a subset article of the article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with signals intelligence in the… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”