An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext

The classic simple substitution cipher is an elementary cipher for which many automated ciphertext-only attack algorithms have been developed. The reliable performance of these algorithms is, however, conditioned on obtaining an error-free version of the ciphertext. Although cryptosystems are designed according to Kerckhoffs's assumption, i.e., the security of the cipher resides only in the secret key, the existence of practical physical-layer security codes may provide a vehicle to restricting attackers to error-prone ciphertext, and thus enhance cryptographic secrecy by means of natural phenomena in a noisy channel. This additional layer of security, however, must be quantified to understand the possible boons to multilayer security solutions with secrecy coding at the physical layer. This paper provides an experimental analysis of the behavior of an HMM-based substitution cipher attack to quantify the enhancement in security when errors occur as the ciphertext passes through a discrete memoryless symmetric channel. Results indicate that a bound on the performance of the attack can be directly linked to the mutual information between the inputs and outputs of the channel. Rough linear approximations to the high-end performance of the attack are also presented.

[1]  Azriel Rosenfeld,et al.  Breaking substitution ciphers using a relaxation algorithm , 1979, CACM.

[2]  T. Moon,et al.  Mathematical Methods and Algorithms for Signal Processing , 1999 .

[3]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[4]  George W. Hart To decode short cryptograms , 1994, CACM.

[5]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[6]  James George Dunham Bounds on message equivocation for simple substitution ciphers , 1980, IEEE Trans. Inf. Theory.

[7]  Thomas P. Jakobsen,et al.  A Fast Method for the Cryptanalysis of Substitution Ciphers , 1995 .

[8]  Rolf J. Blom Sounds on key equivocation for simple substitution ciphers , 1979, IEEE Trans. Inf. Theory.

[9]  Dar-Shyang Lee,et al.  Substitution Deciphering Based on HMMs with Applications to Compressed Document Processing , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Steven W. McLaughlin,et al.  Equivocations for the simple substitution cipher with erasure-prone ciphertext , 2012, 2012 IEEE Information Theory Workshop.

[11]  Kevin Knight,et al.  Unsupervised Analysis for Decipherment Problems , 2006, ACL.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Andrea Sgarro Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.

[14]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[15]  Edwin Olson,et al.  Robust Dictionary Attack of Short Simple Substitution Ciphers , 2007, Cryptologia.