Computer and Data Security 4th Class

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CSCI 5857: Encoding and Encryption
Introduction to Information Security Chapter II : Classical Ciphers.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
MAT 1000 Mathematics in Today's World Winter 2015.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Affine Cipher.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
History and Background Part 4: Transposition Ciphers
Cryptography and Network Security
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Chapter 3:Cryptography (16M)
PART VII Security.
Traditional Symmetric-Key Ciphers
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Computer and Data Security 4th Class 2017-2018 lec.2

Symmetric algorithms Symmetric algorithms can be divide into two types Classical Algorithms and Modern Algorithms. Modern algorithms is divide into Block Cipher and Stream Cipher Classical Algorithms is divide into Substitution Cipher and Transposition Ciphers. Different cryptographic algorithms either substituted characters for one another or transposed characters with one another. The better algorithms did both. The primary change is that algorithms work on bits instead of characters. This is actually just a change in the alphabet size:from 26 elements to two elements.

Classical algorithms A substitution cipher is one in which each character in the plaintext is substituted for another character in the ciphertext. The receiver inverts the substitution on the ciphertext to recover the plaintext. There are four types of substitution ciphers: Monoalphabetic Substitution Cipher Polyalphabetic Substitution Cipher PolyGram Substitution Cipher Homophonic Substitution Cipher Monoalphabetic cipher or simple substitution cipher, is one in which each character of the plaintext is replaced with a corresponding character of ciphertext.

The famous of simple substitution ciphers are Additive Cipher Multiplicative Cipher Affine Cipher The famous case of Additive cipher is Caesar Cipher, which can be mathematically stated as ci = pi + k(mod 26) ,and pi = ci-k (mod 26). (note: pi be the ith plaintext letter of a given message, and ci the corresponding ith ciphertext letter). If the key is equal to (3), each plaintext character is replaced by the character three to the right modulo 26 ("A" is replaced by "D," "B" is replaced by "E,"..., "W" is replaced by "Z," "X“ is replaced by "A," "Y" is replaced by "B," and "Z" is replaced by "C") is a simple substitution cipher. Decryption is accomplished by replacing each ciphertext letter with its corresponding left-shift-by-three letter.

In Caesar’s cipher, if the key is “3”, which is not very secure, since there is only one key-anyone who knows that the Caesar’s cipher is being used can immediately decrypt the message. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

Additive cipher One of the most simple ciphers where the letters of the alphabet are assigned a number as depicted in Table

H.W// encrypt the following messages by using additive system. WE WILL GO TO THE ZOO (k= 8) I AM VERY HAPPY (k= 13) I NEED SOME REST TO CONTIUNE WITH YOU (k=19) MEET ME AFTER THE PARTY (k=24)

Multiplicative cipher In the multiplicative system cipher, instead of adding the key to the plaintext letter position, we simply multiply it. which can be mathematically stated as Ci = k * Pi mod 26 Plaintext a b c d e f g h i j k l m position 1 2 3 4 5 6 7 8 9 10 11 12 Multiply by 3 15 18 21 24 27 30 33 36 Mod 26 ciphertext p s v y Plaintext n o p q r s t u v w x y z position 13 14 15 16 17 18 19 20 21 22 23 24 25 Multiply by 3 39 42 45 48 51 54 57 60 63 66 69 72 75 Mod 26 2 5 8 11 ciphertext c f i l

The condition of multiplicative is that ,the GCD (Greatest Common Divisor ) between the key and N is one. GCD (5,10)=5, GCD (20,10)=10 If the key=13,GCD(13,26)=13, E(a)=0*13 mod 26=0=a E(b)=1*13 mod 26=13=n E(c)=2*13 mod 26=0=a , its error. How many numbers of keys in multiplicative system? Answer is 12.

In decryption process in multiplicative system as follow p= (C * inv(k)) mod 26 We will define the inverse of a key k, a number inv(k)such that k . inv(k)= 1 mod 26. 3. inverse(k)=1 mod 269 Find the invers keys of the following keys

Affine system Affine is a word that means “linear transformation.” The affine system is really nothing more than a combination of the multiplicative and additive. In the affine cipher system, we choose a multiplicative number k2 and additive number k1. If p is a plaintext number, then we define the cipher text number C = (ak2 + k1) mod n. where n is length of alphabet which is 26 For instance, suppose we want to encrypt the plaintext message “yes” with an affine cipher system with k2 = 5 and k1 = 20. Here are the steps: Plaintxt Y E S position 24 4 18 5P+20 140 40 110 (5P+20) mod 26 10 14 6 ciphrtext K O G

Why? Because ,GCD ( k2 and N) not equal 1 However, if we wanted to encrypt the plaintext “an” with an affine cipher system with k2= 2 and k1 = 8,here are the steps: Plaintext a n Position 13 2p+8 8 34 (2p+8) mod 26 Ciphertxt i Why? Because ,GCD ( k2 and N) not equal 1 The decyrption algorithm can be computed as , p = inverse (k2) (C –k1) mod 26

H.W WAR LOST NEED ADVICE ON ACTION TO TAKE CARE Encrypt the following message by using multiplicative system and affine system , where k1=4 ، k2=9 . WAR LOST NEED ADVICE ON ACTION TO TAKE CARE CAESAR WAS A GREAT SOLDIER