Chapter-2 Classical Encryption Techniques.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography and Network Security Chapter 3
Classical Encryption Techniques
Lecture 23 Symmetric Encryption
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Triple DES.
School of Computer Science and Engineering Pusan National University
Columnar Transposition
Communication Security
Data Encryption Standard
Introduction Of System Security
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Chapter 3:Cryptography (16M)
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
ICS 454: Principles of Cryptography
Cryptography and Network Security
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
SYMMETRIC ENCRYPTION.
Unit 2: Cryptography & Cryptographic Algorithm
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Chapter Two
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Advanced Encryption Standard
Presentation transcript:

Chapter-2 Classical Encryption Techniques

Symmetric Cipher Model Basic terminology: Plaintext: original message to be encrypted Cipher text: the encrypted message Enciphering or encryption Algorithm: The process of converting plaintext into cipher text. Deciphering or decryption Algorithm: The process of converting cipher text to plain text. Two inputs: a plaintext and a secret key

Symmetric Cipher Model

Cipher or cryptographic system : a scheme for encryption and decryption Cryptography: science of studying ciphers Cryptanalysis: science of studying attacks against cryptographic systems Cryptology: cryptography + cryptanalysis

Ciphers Symmetric cipher: same key used for encryption and decryption Block cipher: encrypts a block of plaintext at a time (typically 64 or 128 bits) Stream cipher: encrypts data one bit or one byte at a time Asymmetric cipher: different keys used for encryption and decryption

Symmetric Encryption Mathematically: X = plaintext Y = cipher text Y = EK(X) or Y = E(K, X) X = DK(Y) or X = D(K, Y) X = plaintext Y = cipher text K = secret key E = encryption algorithm D = decryption algorithm Both E and D are known to public

Asymmetric Cipher Like Symmetric cipher in Asymmetric cipher technique also we are generating plain text to a cipher but different keys used for encryption and decryption Asymmetric cipher having two types of Encryption techniques

Encryption using Public key of the receiver (Ub) and Decryption using Private key (Rb) of receiver. Encryption: Ek Ub (X) = Y Decryption: Dk Rb (Y) = X 2. Encryption using Private key of the sender (Ra) and Decryption using Public key (Ua) of sender. Encryption : Ek Ra (X) = Y Decryption : Ek Ua (Y) = X Here Public = U Private = R Sender = a Receiver = b

Classical Ciphers Plaintext is viewed as a sequence of elements (e.g., bits or characters) Substitution cipher: replacing each element of the plaintext with another element. Transposition (or permutation) cipher: rearranging the order of the elements of the plaintext. Product cipher: using multiple stages of substitutions and transpositions

Substitution Algorithm Earliest known substitution cipher Invented by Julius Caesar Each letter is replaced by the letter three positions further down the alphabet. Plain: a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Example: Saudi Arabia  VDWGL DUDELD Key= +3

Transposition Algorithm Transposition cipher techniques basically depend on the given text. It is nothing but rearranging the characters in the given form. Simple Example for transposition: Step-1: Plain text: WELCOME TO WORLD Step-2: Remove all space characters WELCOMETOWORLD

Step-3: Arrange them in a row as alternate characters each are in subsequent rows. Step-4: Now write n each row one by one to get cipher text Step-5: Cipher text: WLOEOOLECMTWRD W L O E C M T R D

Transposition with Key Step-1: Plain text: WELCOMETOTHEWORLDOFCRYPTOGRAP HY Step-2: Count number of characters in the plain text. Here it is 28 Step-3: You can arrange them in 4 rows and 7 columns. If there are not exactly use filter characters for unfilled cells.

Step-5: Now write a plain text in matrix form Step-4: Generate the key depends on number of columns, here key length is 7 characters. Example key: 3615472 Step-5: Now write a plain text in matrix form Key 3 6 1 5 4 7 2 W E L C O M T R D F Y P G A H Plain text

Step-6: According to ascending order of key write column wise characters. Here 1 in a key is 3rd column so write 3rd column characters first (LWCR), 2 in a key is 7th column so write 7th column characters next (EDTY) and so on…… Finally the formed cipher text will be as follows LWCREDTYWTOOORYPCORAEOFGMLP H

Product Cipher Combination of two or more cipher techniques is called product cipher. The product cipher definitely increase security aspect. Example: First we apply substitution technique on the plain text. On that cipher text we apply the Transposition technique or wise versa.

AES(Advanced Encryption Standard) AES is  developed by two Joan Daemen and Vincent Rijmen AES is based on a design principle known as a substitution-permutation network, combination of both substitution and permutation, and is fast in both software and hardware.

AES(Advanced Encryption Standard) Rounds SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. AddRoundKey

AES(Advanced Encryption Standard)