EKRJGTU CTG CYGUQOG! Can you break the code?.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Lecture 1 Overview.
Computer Security CS 426 Lecture 3
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CSCI 5857: Encoding and Encryption
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Basic Cryptography Some examples taken from “Coding Theory and Cryptography, the essentials” Second Edition Hankerson, et.al. 2000, Marcel Dekker, Inc.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
An Introduction to Cryptology
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 8: Network Security
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Introduction CS 303 Algorithmic Number Theory and Cryptography
Affine Cipher.
CAP Cryptographic Analysis Program
Security.
Columnar Transposition
Prof. N.N.GAIKWAD M.P.A.S.C COLLEGE PANVEL DIST-RAIGAD
Cryptography and Network Security
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Networks Encryption.
Chapter 8: Network Security
Cryptography and Network Security Sixth Edition by William Stallings.
Permutations and Ciphers
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
PART VII Security.
Encryption and Decryption
Security.
Classical Polyalphabetic Ciphers
Simple Encryption- Lesson 5
Cryptanalysis of Vigenere Cipher
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Cryptography and Cryptanalysis
Traditional Symmetric-Key Ciphers
Encryption Basics Types of ciphers Algorithms Modes Key Length
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Chapter 8: Network Security
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Stream Cipher Structure
Chapter 8: Network Security
Presentation transcript:

EKRJGTU CTG CYGUQOG! Can you break the code?

Ciphers are awesome! Can you break the code?

5 Min Task Convert a 5 letter word into Ciphertext using an any key of shift cipher. Pass on to partner to decipher without telling them the key. Use the shift cipher list to help you https://goo.gl/3Ah3G8

Brute Force Attack For the name ALICE and a key of 3 the encoded word would be DOLFH. Any Ceaser cipher (regardless of length) can be brute forced in 25 versions of this decoding.

Relative Frequency (Standard)

Relative Frequency (Cypher)

Relative Frequency (transition)

Programmatically… A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25

Programmatically… Letter H E L O Number 7 4 11 14 Shift +16 D E F G H I J K L M N 1 2 3 4 5 6 7 8 9 10 11 12 13 O P Q R S T U V W X Y Z 14 15 16 17 18 19 20 21 22 23 24 25 Letter H E L O Number 7 4 11 14 Shift +16 New Position 23 20 27 30 Quotient   27 = 1 ● 26 + 1 30 = 1 ● 26 + 4 Remainder 1 New Letter X U B

Weakness and Improvements Number of possible keys is too small. (25) Same shift is applied to each character making it easy for relative frequency analysis.   Same shift is likely to be used for each message.  Use a key word at the beginning of the shift cipher – BESWAX example. Moving the order of the letters around in a known pattern.

Keyword Shift Example Select a keyword to use with cipher (BEESWAX) G H I J K L M N S W X O P Q R S T U V W X Y Z L M N Select a keyword to use with cipher (BEESWAX) Remove any duplicate characters (BESWAX) Place this at the first in the shift, then fill in unused letters. More possibilities (different words = different order). Letters not shifted by the same number.

Rail Fence Cipher Splits the letters of words into new order, known to both parties (so can be decoded). This_is_scrambled Ti_ssrmldhsi_cabe Can also be done over more than two lines. Other methods (such as a standard shift cipher or keyword cipher can be used). T i _ s r m l d h c a b e

One Time Pad Example Key length is same as plain text length C E Numierical Value 1 11 8 2 4 Key Random* Shift 24 25 Cipher Numerical 5 22 12 26 = 1 ● 26 + 0 29 = 1 ● 26 + 3 Remainder 3 Cipher Text F W M Key length is same as plain text length Shift is random (if not chosen by computer)

One Time Pad Shift does not fall into repetitive pattern. More possibilities for a brute force attack. Shift Cipher 25 total One Time Pad 25^5 = 11,881,376 (where 5 is length of message) Ciphertext destitution is ‘flat’ or even. https://youtu.be/Q-XKOPNIDAg?t=3m16s Sharing the pad can be difficult Can only be used once

Vernam Cipher Plaintext ⊕ Key = Ciphertext Uses similar process as One Time Pad Converts characters to binary values Random key is converted into binary values Uses eXclusive-OR (XOR) to generate cipher text Plaintext ⊕ Key = Ciphertext Ciphertext ⊕ Key = Plaintext

Vernam Cipher

… the method or process used when hiding the meaning of a message. A Cipher is… … the method or process used when hiding the meaning of a message.