CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer (and Network) Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Basic Cryptography Some examples taken from “Coding Theory and Cryptography, the essentials” Second Edition Hankerson, et.al. 2000, Marcel Dekker, Inc.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Public Key Cryptography
Chapter 8: Network Security
Chapter 2 Basic Encryption and Decryption
Introduction CS 303 Algorithmic Number Theory and Cryptography
Asad Gondal Ali Haider Mansoor
Columnar Transposition
Prof. N.N.GAIKWAD M.P.A.S.C COLLEGE PANVEL DIST-RAIGAD
Information and Computer Security CPIS 312 Lab 2
Group theory exercise.
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks Encryption.
Cryptography Lecture 2.
Chapter 8: Network Security
Chap 6: Security and Protection
Cryptography Lecture 12.
CMSC 414 Computer and Network Security Lecture 3
Block cipher and modes of encryptions
NET 311D Information Security
Classical Polyalphabetic Ciphers
Kasiski Method Reference
Cryptography Lecture 2.
Introduction to Cryptography I
Computer Security Chapter Two
Chapter 8: Network Security
Symmetric Encryption or conventional / private-key / single-key
Stream Cipher Structure
Chapter 8: Network Security
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz

Confidentiality

In more detail…  Alice and Bob share a key K –Must be shared securely –Must be completely random –Must be kept completely secret from attacker –We don’t discuss (for now) how they do this  Plaintext - encryption - ciphertext - decryption  Decryption must recover the message!

Notes…  Can also be used to encrypt files (i.e., secure storage)  We have not said anything yet about security…

Some examples  (Shift cipher)  (Substitution cipher)  (Vigenere cipher)

Attacks?  Shift cipher –Key space is too small! –Insecure against ciphertext-only attack Frequency analysis Index of coincidence –If an attacker can recover they key, a scheme is clearly insecure What about the converse? –Multiple other attacks and problems

Attacks?  Substitution cipher –Much larger key space –Still not secure against ciphertext-only attack (frequency analysis, digrams, trial and error) –Having a large key space is necessary, but not sufficient, to guarantee security… (Note that adversary can still recover the key)

Attacks?  Vigenere cipher –Index of coincidence Random text has index:  (26) -2 = English text has index:  (p i ) 2 = –Can distinguish substitution and Vigenere ciphers; if the latter, can determine key length –Can further use this to determine key

Moral of the story?  Don’t use “simple” schemes  Thoroughly analyze schemes before using –Better yet, use schemes that other, smarter people have already analyzed…