眼科属于什么科| 社保卡是什么样的图片| 脾大吃什么可以缩脾| 喝牛奶就拉肚子是什么原因| 舌头两侧溃疡吃什么药| 康熙雍正乾隆是什么关系| 情绪波动大是什么原因| npv是什么病毒| 七月什么星座| 早上醒来嘴苦是什么原因| 向日葵什么时候播种| 女性漏尿吃什么药最好| 脑萎缩是什么原因| 胃火重吃什么药| 额头长痘是什么原因引起的| 尿里有泡沫是什么原因| 小猫来家里有什么预兆| 梦见坟墓是什么意思| 任什么任什么| 豆角和什么一起炒好吃| 沉沦是什么意思| 做梦梦见鬼是什么意思| 学姐是什么意思| 灰配什么颜色好看| 慢性支气管炎吃什么药| 连云港有什么好吃的| 皮肤发红发烫是什么原因| 张国立老婆叫什么名字| 蚊子爱咬什么样的人| 二月初二是什么星座| 肺结节吃什么药散结节最快| 膝盖发软无力是什么原因| tvt是什么意思| 浮想联翩什么意思| 肚脐左边是什么器官| 途字五行属什么| 万圣节是什么时候| 心肌受损会出现什么症状| 什么是预科生| 马赛克什么意思| 减肥早上吃什么比较好| 华盖星是什么意思| 前门大街有什么好玩的| au585是什么金| 夏季吃什么水果好| 牛和什么生肖相冲| 囟门是什么| 女性雄激素过高是什么原因引起的| 唐筛21三体临界风险是什么意思| rolex是什么牌子的手表| 什么的问题| 三月是什么季节| e代表什么| 景象什么意思| 脑萎缩是什么原因引起的| 女人梦见虫子什么预兆| 肺大泡是什么原因造成的| 喝什么茶对身体好| 为什么低血压| 4a是什么意思| 乌龟喜欢吃什么| 三十六计的第一计是什么| 金字旁的有什么字| 心脏t波改变吃什么药| 克罗心是什么牌子| 狗皮膏药什么意思| 破伤风针什么时候打| 头响脑鸣是什么原因引起的| 葡挞跟蛋挞有什么区别| 后背长痘痘是什么原因引起的| 大便变黑是什么原因| 临床药学在医院干什么| 25分贝相当于什么声音| 诸君是什么意思| 想成为什么样的人| 尿酸高要注意什么| 伤风感冒吃什么药| 骨折恢复吃什么好| 眩晕症有什么症状| 白鸭是什么鸭| 83年猪是什么命| h2ra 是什么药物| 泌尿感染是什么症状| 风湿病是什么原因造成的| 完美落幕是什么意思| 心电图逆钟向转位什么意思| 悲催是什么意思| 梦见吃李子是什么意思| 什么叫幽门螺旋杆菌| 狸猫换太子是什么意思| 王不见王是什么意思| 天秤座的幸运色是什么| 换药挂什么科| 副处级干部是什么级别| 1什么意思| 层峦叠翠的意思是什么| 东北和山东有什么区别| 子宫疼是什么原因| 女人太瘦吃什么增肥| 呕吐拉肚子吃什么药| tim是什么| 做b超需要挂什么科| 肌瘤和囊肿有什么区别| 老年人心跳过快是什么原因| 立场是什么意思| 脾胃不好吃什么药效果好| 牙龈肿是什么原因| 面瘫是什么引起的| 风雨雷电代表什么生肖| 梦见着火了是什么意思| 艾滋病脖子有什么症状| 五粮液是什么香型的酒| 你有毒是什么意思| 心电监护pr是什么意思| 木加石读什么| 老是头疼是什么原因| 放生是什么意思| 神经官能症是什么病| 正方体体积公式是什么| 女性性冷淡是什么原因| 青定读什么| 男人容易出汗是什么原因造成的| 早上口苦是什么原因| 医保卡是什么样子的| 为什么家里会有蚂蚁| 红红的太阳像什么| 球蛋白偏低是什么原因| 护理部主任是什么级别| 头顶不舒服是什么原因| 肾小球滤过率偏高说明什么| 胆汁酸高是什么意思| 一月25号是什么星座| 总胆红素偏高说明什么| 酸奶不能和什么一起吃| 艾附暖宫丸什么时候吃| 1月21是什么星座| 脂肪瘤是什么| 银行卡年费是什么意思| 小手指麻木是什么原因引起的| 黑皮肤适合穿什么颜色的衣服| 化痰止咳吃什么药最好| pms是什么| 公主和郡主有什么区别| 保育是什么意思| 卡其色裙子配什么颜色上衣好看| 子宫痉挛是什么症状| 男命正印代表什么| 漏尿是什么原因引起的| 什么是回避型依恋人格| 一切有为法是什么意思| 农历十月初八是什么星座| 烤箱可以烤些什么东西| 网球肘用什么药| 922是什么星座| 漂亮的什么| 搭桥和支架有什么区别| 女性白带多吃什么药| 小孩子手脱皮是什么原因引起的| 什么东西解酒| 生物工程学什么| 鸡蛋花的花语是什么| 为什么做b超要憋尿| 头发为什么长不长| 什么叫环比什么叫同比| 普洱茶属于什么茶类| 艾滋病阴性是什么意思| 什么叫阴吹| 龟头炎用什么软膏| 爱居兔女装是什么档次| 肚脐眼周围是什么器官| 痛风不能吃什么东西| 心脏跳动过快吃什么药| 1937年是什么年| 霉菌性阴道炎吃什么消炎药| 旗舰机是什么意思| 肚子疼吃什么药最有效| 办幼儿园需要什么证| 左眼皮老跳是什么原因| 血栓弹力图是查什么的| 面起子是什么| 去医院看肛门挂什么科| 检查乳腺做什么检查| 单招是什么学历| 马云父母是做什么的| 眼睛痒是什么原因引起的| 痰多吃什么好| 青春痘用什么药膏擦最好呢| 十一月是什么月| 腹泻可以吃什么| 中东为什么叫中东| 长此以往什么意思| 尿路感染什么症状| 什么是遗憾| 张什么结什么| 9.20号是什么星座| 总胆红素高是什么病| 重返20岁韩国版叫什么| 鲜花又什么又什么| 尿毒症前兆是什么症状表现| 以纯属于什么档次| 尿不尽挂什么科| 七月半是什么节日| 11.22是什么星座| 孕妇什么情况容易早产| 为什么女人阴唇会变大| 什么口什么心| 湿疹什么样| 大姨妈来了喝红糖水有什么功效| 杰克琼斯属于什么档次| 京畿是什么意思| 视力sca分别代表什么| 透骨草治什么病最有效| 甲亢能吃什么| 血压太低有什么危害| 文定之喜是什么意思| 心脏官能症吃什么药| 查hpv挂什么科| 汗臭味很重是什么原因引起的| 左侧卵巢多囊样改变什么意思| 喉咙痒咳嗽用什么药| 能戒烟的男人什么性格| 疝气是什么原因引起的| 水蛭是什么东西| 狗生小狗前有什么征兆| 飞蚊症用什么滴眼液| 做胃镜之前需要做什么准备| 大家闺秀是什么生肖| 精子为什么是黄色的| 美国的国鸟是什么| 买什么| 肝郁吃什么药| 什么的松脂| 34岁属什么的生肖| 满足是什么意思| 荔枝为什么上火| 结节病变是什么意思| amo是什么意思| 晚上睡觉睡不着是什么原因| 张飞穿针歇后语下一句是什么| 膝关节退行性变是什么意思| 婴儿足底采血查什么| 呼和浩特有什么特产| 吃什么能壮阳| 南瓜子有什么功效| 彗星为什么有尾巴| 便秘吃什么中药| 属狗是什么星座| clarks是什么牌子| 粉盒和硒鼓有什么区别| 被孤立的一般是什么人| 亮晶晶的什么| 义务兵是什么意思| 石榴什么时候开花| 宝宝佛适合什么人戴| 多吃蔬菜对身体有什么好处| 结余是什么意思| 掂过碌蔗是什么意思| 皮卡丘站起来变成了什么| 皮肤过敏忌口什么食物| 早泄吃什么药最好| cvd是什么意思| 总胆汁酸高吃什么药| 佐匹克隆是什么药| 拉肚子吃什么药好| 百度

敏感肌是什么意思

百度 因此除了国内很多网友看重的性能好坏外,相机是不是便携,漂亮,方便使用,反而更为重要。

In cryptanalysis, frequency analysis (also known as counting letters) is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.

A typical distribution of letters in English language text. Weak ciphers do not sufficiently mask the distribution, and this might be exploited by a cryptanalyst to read the message.

Frequency analysis is based on the fact that, in any given stretch of written language, certain letters and combinations of letters occur with varying frequencies. Moreover, there is a characteristic distribution of letters that is roughly the same for almost all samples of that language. For instance, given a section of English language, E, T, A and O are the most common, while Z, Q, X and J are rare. Likewise, TH, ER, ON, and AN are the most common pairs of letters (termed bigrams or digraphs), and SS, EE, TT, and FF are the most common repeats.[1] The nonsense phrase "ETAOIN SHRDLU" represents the 12 most frequent letters in typical English language text.

In some ciphers, such properties of the natural language plaintext are preserved in the ciphertext, and these patterns have the potential to be exploited in a ciphertext-only attack.

Frequency analysis for simple substitution ciphers

edit

In a simple substitution cipher, each letter of the plaintext is replaced with another, and any particular letter in the plaintext will always be transformed into the same letter in the ciphertext. For instance, if all occurrences of the letter e turn into the letter X, a ciphertext message containing numerous instances of the letter X would suggest to a cryptanalyst that X represents e.

The basic use of frequency analysis is to first count the frequency of ciphertext letters and then associate guessed plaintext letters with them. More Xs in the ciphertext than anything else suggests that X corresponds to e in the plaintext, but this is not certain; t and a are also very common in English, so X might be either of them. It is unlikely to be a plaintext z or q, which are less common. Thus the cryptanalyst may need to try several combinations of mappings between ciphertext and plaintext letters.

More complex use of statistics can be conceived, such as considering counts of pairs of letters (bigrams), triplets (trigrams), and so on. This is done to provide more information to the cryptanalyst, for instance, Q and U nearly always occur together in that order in English, even though Q itself is rare.

An example

edit

Suppose Eve has intercepted the cryptogram below, and it is known to be encrypted using a simple substitution cipher:

LIVITCSWPIYVEWHEVSRIQMXLEYVEOIEWHRXEXIPFEMVEWHKVSTYLXZIXLIKIIXPIJVSZEYPERRGERIM
WQLMGLMXQERIWGPSRIHMXQEREKIETXMJTPRGEVEKEITREWHEXXLEXXMZITWAWSQWXSWEXTVEPMRXRSJ
GSTVRIEYVIEXCVMUIMWERGMIWXMJMGCSMWXSJOMIQXLIVIQIVIXQSVSTWHKPEGARCSXRWIEVSWIIBXV
IZMXFSJXLIKEGAEWHEPSWYSWIWIEVXLISXLIVXLIRGEPIRQIVIIBGIIHMWYPFLEVHEWHYPSRRFQMXLE
PPXLIECCIEVEWGISJKTVWMRLIHYSPHXLIQIMYLXSJXLIMWRIGXQEROIVFVIZEVAEKPIEWHXEAMWYEPP
XLMWYRMWXSGSWRMHIVEXMSWMGSTPHLEVHPFKPEZINTCMXIVJSVLMRSCMWMSWVIRCIGXMWYMX

For this example, uppercase letters are used to denote ciphertext, lowercase letters are used to denote plaintext (or guesses at such), and X~t is used to express a guess that ciphertext letter X represents the plaintext letter t.

Eve could use frequency analysis to help solve the message along the following lines: counts of the letters in the cryptogram show that I is the most common single letter,[2] XL most common bigram, and XLI is the most common trigram. e is the most common letter in the English language, th is the most common bigram, and the is the most common trigram. This strongly suggests that X~t, L~h and I~e. The second most common letter in the cryptogram is E; since the first and second most frequent letters in the English language, e and t are accounted for, Eve guesses that E~a, the third most frequent letter. Tentatively making these assumptions, the following partial decrypted message is obtained.

heVeTCSWPeYVaWHaVSReQMthaYVaOeaWHRtatePFaMVaWHKVSTYhtZetheKeetPeJVSZaYPaRRGaReM
WQhMGhMtQaReWGPSReHMtQaRaKeaTtMJTPRGaVaKaeTRaWHatthattMZeTWAWSQWtSWatTVaPMRtRSJ
GSTVReaYVeatCVMUeMWaRGMeWtMJMGCSMWtSJOMeQtheVeQeVetQSVSTWHKPaGARCStRWeaVSWeeBtV
eZMtFSJtheKaGAaWHaPSWYSWeWeaVtheStheVtheRGaPeRQeVeeBGeeHMWYPFhaVHaWHYPSRRFQMtha
PPtheaCCeaVaWGeSJKTVWMRheHYSPHtheQeMYhtSJtheMWReGtQaROeVFVeZaVAaKPeaWHtaAMWYaPP
thMWYRMWtSGSWRMHeVatMSWMGSTPHhaVHPFKPaZeNTCMteVJSVhMRSCMWMSWVeRCeGtMWYMt

Using these initial guesses, Eve can spot patterns that confirm her choices, such as "that". Moreover, other patterns suggest further guesses. "Rtate" might be "state", which would mean R~s. Similarly "atthattMZe" could be guessed as "atthattime", yielding M~i and Z~m. Furthermore, "heVe" might be "here", giving V~r. Filling in these guesses, Eve gets:

hereTCSWPeYraWHarSseQithaYraOeaWHstatePFairaWHKrSTYhtmetheKeetPeJrSmaYPassGasei
WQhiGhitQaseWGPSseHitQasaKeaTtiJTPsGaraKaeTsaWHatthattimeTWAWSQWtSWatTraPistsSJ
GSTrseaYreatCriUeiWasGieWtiJiGCSiWtSJOieQthereQeretQSrSTWHKPaGAsCStsWearSWeeBtr
emitFSJtheKaGAaWHaPSWYSWeWeartheStherthesGaPesQereeBGeeHiWYPFharHaWHYPSssFQitha
PPtheaCCearaWGeSJKTrWisheHYSPHtheQeiYhtSJtheiWseGtQasOerFremarAaKPeaWHtaAiWYaPP
thiWYsiWtSGSWsiHeratiSWiGSTPHharHPFKPameNTCiterJSrhisSCiWiSWresCeGtiWYit

In turn, these guesses suggest still others (for example, "remarA" could be "remark", implying A~k) and so on, and it is relatively straightforward to deduce the rest of the letters, eventually yielding the plaintext.

hereuponlegrandarosewithagraveandstatelyairandbroughtmethebeetlefromaglasscasei
nwhichitwasencloseditwasabeautifulscarabaeusandatthattimeunknowntonaturalistsof
courseagreatprizeinascientificpointofviewthereweretworoundblackspotsnearoneextr
emityofthebackandalongoneneartheotherthescaleswereexceedinglyhardandglossywitha
lltheappearanceofburnishedgoldtheweightoftheinsectwasveryremarkableandtakingall
thingsintoconsiderationicouldhardlyblamejupiterforhisopinionrespectingit

At this point, it would be a good idea for Eve to insert spaces and punctuation:

Hereupon Legrand arose, with a grave and stately air, and brought me the beetle
from a glass case in which it was enclosed. It was a beautiful scarabaeus, and, at
that time, unknown to naturalists—of course a great prize in a scientific point
of view. There were two round black spots near one extremity of the back, and a
long one near the other. The scales were exceedingly hard and glossy, with all the
appearance of burnished gold. The weight of the insect was very remarkable, and,
taking all things into consideration, I could hardly blame Jupiter for his opinion
respecting it.

In this example from "The Gold-Bug", Eve's guesses were all correct. This would not always be the case, however; the variation in statistics for individual plaintexts can mean that initial guesses are incorrect. It may be necessary to backtrack incorrect guesses or to analyze the available statistics in much more depth than the somewhat simplified justifications given in the above example.

It is possible that the plaintext does not exhibit the expected distribution of letter frequencies. Shorter messages are likely to show more variation. It is also possible to construct artificially skewed texts. For example, entire novels have been written that omit the letter e altogether — a form of literature known as a lipogram.

History and usage

edit
 
First page of Al-Kindi's 9th century Manuscript on Deciphering Cryptographic Messages
 
Arabic Letter Frequency distribution

The first known recorded explanation of frequency analysis (indeed, of any kind of cryptanalysis) was given in the 9th century by Al-Kindi, an Arab polymath, in A Manuscript on Deciphering Cryptographic Messages.[3] It has been suggested that a close textual study of the Qur'an first brought to light that Arabic has a characteristic letter frequency.[4] Its use spread, and similar systems were widely used in European states by the time of the Renaissance. By 1474, Cicco Simonetta had written a manual on deciphering encryptions of Latin and Italian text.[5]

Several schemes were invented by cryptographers to defeat this weakness in simple substitution encryptions. These included:

  • Homophonic substitution: Use of homophones — several alternatives to the most common letters in otherwise monoalphabetic substitution ciphers. For example, for English, both X and Y ciphertext might mean plaintext E.
  • Polyalphabetic substitution, that is, the use of several alphabets — chosen in assorted, more or less devious, ways (Leone Alberti seems to have been the first to propose this); and
  • Polygraphic substitution, schemes where pairs or triplets of plaintext letters are treated as units for substitution, rather than single letters, for example, the Playfair cipher invented by Charles Wheatstone in the mid-19th century.

A disadvantage of all these attempts to defeat frequency counting attacks is that it increases complication of both enciphering and deciphering, leading to mistakes. Famously, a British Foreign Secretary is said to have rejected the Playfair cipher because, even if school boys could cope successfully as Wheatstone and Playfair had shown, "our attachés could never learn it!".

The rotor machines of the first half of the 20th century (for example, the Enigma machine) were essentially immune to straightforward frequency analysis. However, other kinds of analysis ("attacks") successfully decoded messages from some of those machines.[6]

 
Letter frequency in Spanish

Frequency analysis requires only a basic understanding of the statistics of the plaintext language and some problem-solving skills, and, if performed by hand, tolerance for extensive letter bookkeeping. During World War II, both the British and the Americans recruited codebreakers by placing crossword puzzles in major newspapers and running contests for who could solve them the fastest. Several of the ciphers used by the Axis powers were breakable using frequency analysis, for example, some of the consular ciphers used by the Japanese. Mechanical methods of letter counting and statistical analysis (generally IBM card type machinery) were first used in World War II, possibly by the US Army's SIS. Today, the work of letter counting and analysis is done by computer software, which can carry out such analysis in seconds. With modern computing power, classical ciphers are unlikely to provide any real protection for confidential data.

Frequency analysis in fiction

edit
 
Part of the cryptogram in The Dancing Men

Frequency analysis has been described in fiction. Edgar Allan Poe's "The Gold-Bug" and Sir Arthur Conan Doyle's Sherlock Holmes tale "The Adventure of the Dancing Men" are examples of stories which describe the use of frequency analysis to attack simple substitution ciphers. The cipher in the Poe story is encrusted with several deception measures, but this is more a literary device than anything significant cryptographically.

See also

edit

Further reading

edit
  • Helen Fouché Gaines, "Cryptanalysis", 1939, Dover. ISBN 0-486-20097-3.
  • Abraham Sinkov, "Elementary Cryptanalysis: A Mathematical Approach", The Mathematical Association of America, 1966. ISBN 0-88385-622-0.

References

edit
  1. ^ Singh, Simon. "The Black Chamber: Hints and Tips". Retrieved 26 October 2010.
  2. ^ "A worked example of the method from bill's "A security site.com"". Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  3. ^ Ibrahim A. Al-Kadi "The origins of cryptology: The Arab contributions", Cryptologia, 16(2) (April 1992) pp. 97–126.
  4. ^ "In Our Time: Cryptography". BBC Radio 4. Retrieved 29 April 2012.
  5. ^ Kahn, David L. (1996). The codebreakers: the story of secret writing. New York: Scribner. ISBN 0-684-83130-9.
  6. ^ Kruh, Louis; Deavours, Cipher (January 2002). "The Commercial Enigma: Beginnings of Machine Cryptography". Cryptologia. 26 (1): 1–16. doi:10.1080/0161-110291890731. ISSN 0161-1194. S2CID 41446859.
edit
脑门痒痒是什么预兆 什么是钾肥 水是由什么组成的 豆浆什么人不能喝 唇周发黑是什么原因
避孕药吃了有什么副作用 检查幽门螺杆菌挂什么科 山楂和什么不能一起吃 颈椎痛吃什么药最好 mr是什么检查项目
铁树开花什么意思 颈椎脑供血不足吃什么药 上下眼皮肿是什么原因 血管瘤有什么危害 结石有什么症状
一身傲骨是什么意思 查幽门螺杆菌挂什么科 憨厚是什么意思 什么减肥好 血管为什么是青色的
南宁有什么好玩的地方hcv7jop9ns1r.cn 通奸是什么意思hcv9jop0ns4r.cn noon是什么意思hcv8jop4ns0r.cn 什么是升华hcv8jop5ns7r.cn 启蒙是什么意思hcv8jop2ns3r.cn
阑尾炎手术后吃什么好wzqsfys.com 什么病可以鉴定病残hcv8jop7ns4r.cn 连续做噩梦是什么原因hcv7jop9ns8r.cn 全身痒但是身上什么都没有wmyky.com 嘴巴边上长痘痘是什么原因hcv9jop3ns0r.cn
山梨酸钾是什么hcv7jop9ns1r.cn 和包是什么hlguo.com 绿豆与什么食物相克huizhijixie.com 五海瘿瘤丸主要治什么病hcv9jop0ns8r.cn 什么药治痒效果最好96micro.com
nm是什么意思inbungee.com 优生四项是检查什么hcv7jop9ns3r.cn 什么的北京城hcv8jop6ns0r.cn 二月开什么花hcv7jop7ns2r.cn 反胃恶心吃什么药hcv8jop2ns2r.cn
百度