Homework #1 J. H. Wang Oct. 9, 2012.

Slides:



Advertisements
Similar presentations
Computer Security Set of slides 4 Dr Alexei Vernitski.
Advertisements

Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
7. Asymmetric encryption-
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Public Key Algorithms 4/17/2017 M. Chatterjee.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Diffie-Hellman Key Exchange
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Introduction to Public Key Cryptography
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
Chapter 20 Symmetric Encryption and Message Confidentiality.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Exercises Information Security Course Eric Laermans – Tom Dhaene.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Homework #1 J. H. Wang Oct. 2, 2013.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Homework #2 J. H. Wang Oct. 31, 2012.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Homework #2 J. H. Wang Oct. 19, 2017.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Homework #2 J. H. Wang Oct. 18, 2018.
Key Exchange, Man-in-the-Middle Attack
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Homework #1 J. H. Wang Oct. 9, 2012

Homework #1 Chap.1: Chap.2: Due: two weeks (Oct. 24, 2012) Review question 1.3 Chap.2: Review question 2.1, 2.8 Problems: 2.2, 2.7, 2.11 Due: two weeks (Oct. 24, 2012)

Chap. 1 Review question 1.3: List and briefly define categories of passive and active security attacks. Chap. 2 Review question 2.1: What are the essential ingredients of a symmetric cipher? Review question 2.8: Why is the middle portion of 3DES a decryption rather than an encryption?

Problem 2.2: Consider a very simple symmetric block encryption algorithm in which 32-bit blocks of plaintext are encrypted using a 64-bit key. Encryption is defined as C = (P  K0)  K1 where C= ciphertext, K=secret key, K0 =leftmost 64 bits of K, K1 =rightmost 64 bits of K,  =bitwise exclusive OR, and  is addition mod 264. (…to be continued)

(…continued from the previous slide) Show the decryption equation. That is, show the equation for P as a function of C, K0, and K1. Suppose an adversary has access to two sets of plaintexts and their corresponding ciphertexts and wishes to determine K. We have the two equations: C = (P  K0)  K1; C’ = (P’  K0)  K1 First, derive an equation in one unknown (e.g., K0). Is it possible to proceed further to solve for K0?

Problem 2.7: Suppose you have a true random bit generator where each bit in the generated stream has the same probability of being 0 or 1 as any other bit in the stream and that the bits are not correlated; that is, the bits are generated from identical independent distribution. However, the bit stream is biased. The probability of a 1 is 0.5+ and the probability of a 0 is 0.5-, where 0<<0.5. A simple deskewing algorithm is as follows: Examine the bit stream as a sequence of non-overlapping pairs. Discard all 00 and 11 pairs. Replace each 01 pair with 0 and each 10 pair with 1. (...to be continued)

(…continued from the previous slide) What is the probability of occurrence of each pair in the original sequence? What is the probability of occurrence of 0 and 1 in the modified sequence? What is the expected number of input bits to produce x output bits? Suppose that the algorithm uses overlapping successive bit pairs instead of nonoverlapping successive bit pairs. That is, the first output bit is based on input bits 1 and 2, the second output bit is based on input bits 2 and 3, and so on. What can you say about the output bit stream?

Problem 2.11: Alice and Bob agree to communicate privately via e-mail using a scheme based on RC4, but they want to avoid using a new secret key for each transmission. Alice and Bob privately agree on a 128-bit key k. To encrypt a message m consisting of a string of bits, the following procedure is used: Choose a random 80-bit value v Generate the ciphertext c=RC4(v||k) m Send the bit string (v||c) Suppose Alice uses this procedure to send a message m to Bob. Describe how Bob can recover the message m from (v||c) using k. If an adversary observes several values (v1||c1), (v2 ||c2), … transmitted between Alice and Bob, how can he/she determine when the same key stream has been used to encrypt two messages?

Homework Submission For hand-written exercises, please hand in your homework in class (paper version)

Thanks for Your Attention!