Presentation is loading. Please wait.

Presentation is loading. Please wait.

BITS Pilani Crypto Make-Up #1 Regular Session #2.

Similar presentations


Presentation on theme: "BITS Pilani Crypto Make-Up #1 Regular Session #2."— Presentation transcript:

1 BITS Pilani Crypto Make-Up #1 Regular Session #2

2 Prereqs Mathematics Back-ground Groups, Rings and Fields Primitive Boolean Operations Discrete Mathematics Probability / Number Theory Almost all of Computer Networks !!

3 History Evolution of Secret Writing For thousands of years, Kings, queens and generals have relied on efficient communication in order to govern their countries and command their armies. At the same time, they have all been aware of the consequences of their messages falling in the wrong hands. Some of the earliest accounts of secret writing date back to Herodotus, ‘the father of history’ according to the Roman philosopher and statesman Cicero. Greece and Persia 5 th Century BC.

4 Other Techniques Shaving the head of a messenger, writing on his scalp and then waiting for the hair to re-grow. Tiny balls of wax, invisible ink ( sap of the thithymalus plant ), organic fluids A mixture of one ounce of alum and a pint of vinegar on a hard-boiled egg. STEGANOGRAPHY Steganos meaning ‘covered’ and graphein meaning ‘to write’

5 The longevity of steganography illustrates that it certainly offers a means of security, but it suffers from a fundamental weakness. ??? If the messenger is searched and the message discovered, the contents of the intended secret communication are revealed at once. Interception of the message immediately compromises all security. A thorough guard might routinely search any person crossing the border, scraping any wax tablets, heating blank sheets of paper, shelling boiled eggs, shaving people’s heads,  and so on, and inevitably there will be occasions where message is uncovered.    That’s where CRYPTOGRAPHY came into picture

6 Cryptography Derived from the Greek word “kryptos” meaning “hidden” and “graphien” meaning “to write”. Idea and advantage ???? Cryptography + Steganography !!! Microdot !!!! The first Microdot to be spotted was in 1941 by the FBI, following a tip-off that the Americans should look for a tiny gleam from the surface of a letter.

7 SECRET WRITING STEGANOGRAPHY CRTPTOGRAPHY Substitution Transposition Cipher Code

8

9 Assassinate = D general = 3 immediately = 08 Blackmail= p king = @ today =73 Capture = j minister = # tonight = 28 Protect = Z prince = !!! Tomorrow=43 Plain message= assassinate the king tonight Encoded message= D-@-28 Technically a code is defined as a substitution at the level of words or phrases, whereas a cipher is the substitution at the level of letters.

10 Goals of cryptography Privacy ( Confidentiality) Integrity Authentication Non-Repudiations !!!

11 Authentication deals with whom you are talking to before revealing sensitive info Integrity Control…..no manipulation in data { message received == message sent } Non Repudiations… no Impersonification ( seeming sender == actual sender, No denial) Privacy has to do with keeping your info out of unauthorized hands

12 Terminology ( sender, receiver, plain text etc)

13 P = Plain text C = Cipher text E = Encryption Algorithm D = Decryption Algorithm C = E(P) P = D(C) P = D ( E ( P ))

14 An Encryption process involves an algorithm and a key C = E k ( P ) P = D k ( C ) P = D k ( E k ( P )) CRYPTANALYSIS The Process of breaking the encryption when key is not known in an attempt to : - Discover the Plain text Discover the Key

15 Terminology Contd … Unconditionally Secure If the cipher text generated does not contain enough information to get the plain text, no matter how much cipher text is available. Computationally Secure If the cost of breaking the Cipher text exceeded the value of encrypted information. The time required to break the cipher exceeds the useful information life-time.. Period !!!

16

17

18

19

20

21

22

23

24

25

26

27

28 Some Other Ciphers Caesar Square Cipher Rail Fence Cipher Ottendorf Cipher AtBash Cipher Play-Fair Cipher Hill Cipher

29 The first recorded description of the Playfair cipher was in a document signed by Wheatstone on 26 March 1854. However, the scheme eventually came to be known by the name of Wheatstone's friend Lord Playfair, who popularized it26 March1854Lord Playfair The Playfair cipher uses a 5 by 5 table containing a keyword or phrase. To generate the key table, one would first fill in the spaces in the table with the letters of the keyword (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (usually omitting "Q" to reduce the alphabet to fit, other versions put both "I" and "J" in the same space).

30 Rules:- Break message into digraphs If both letters are the same (or only one letter is left), add a "X" after the first letter. Encrypt the new pair and continue. If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively If the letters appear on the same column of your table, replace them with the letters immediately below. If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.

31 P L A Y F I R E X M B C D G H J K N O S T U V W Z Hide the Gold in the tree stump HI DE TH EG OL DI NT HE TR EX ES TU MP

32 HI -> BM DE -> ND Th -> ZB EG -> XD OL -> KY DI -> BE NT -> JV HE –> DM TR -> UI EX -> XM ES -> MN TU -> UV MP -> IF

33 Security Revisited !!! What is a Secure Cryptographic Algorithm ???

34

35

36

37 Some other Finer points !!!!

38 ANY QUESTIONS ?????


Download ppt "BITS Pilani Crypto Make-Up #1 Regular Session #2."

Similar presentations


Ads by Google