Symmetric Encryption or conventional / private-key / single-key

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Terminology and classical Cryptology
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Computer Security (CS4800)
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Symmetric Cryptography
Chapter 2 Basic Encryption and Decryption
Crypto in information security
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Cryptography.
Introduction Of System Security
Basic Encryption Methods
Information and Computer Security CPIS 312 Lab 2
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
PART VII Security.
ICS 454: Principles of Cryptography
NET 311D Information Security
برگرفته از اسلایدهای © University of Glamorgan
Simple Encryption- Lesson 5
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Double Transpositions
Computer Security Chapter Two
Types of Cryptanalysis attacks
Cryptanalysis Network Security.
Chapter Goals Define cryptography
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Symmetric Encryption or conventional / private-key / single-key ender and recipient share a common key all classical encryption algorithms are private-key was only type prior to invention of public-key in 1970’s

The General Idea of Symmetric-Key Cryptography

Classic ciphers substitution ciphers monoalphabetic ciphers polyalphabetic ciphers transposition (permutation) ciphers product ciphers using both substitution, and transposition

Classical Cryptography Monoalphabetic Ciphers Once a key is chosen, each alphabetic character of a plaintext is mapped onto a unique alphabetic character of a ciphertext. The Shift Cipher (Caesar Cipher) The Substitution Cipher The Affine Cipher

Classical Cryptography Polyalphabetic Ciphers Each alphabetic character of a plaintext can be mapped onto m alphabetic characters of a ciphertext. Usually m is related to the encryption key. The Vigenère Cipher The Hill Cipher The Permutation Cipher

Benefits of Cryptography Offers individual privacy and confidentiality. In some circumstances also authentication and non-repudiation (e.g. legal ‘signatures’) Especially important in explicitly Authorization .

Cryptanalysis Is the science and study of methods of breaking ciphers. A cipher is breakable if it is possible to determine the plaintext or key from the Cipher text or to determine the key from both plaintext and Cipher text

cryptanalysis

Types of Cryptanalysis attacks 1. Ciphertext-only attack:- The cryptanalyst has the cipher text of several messages, all of which have been encrypted using the same encryption algorithm, the cryptanalyst job is to recover the plain text of many message as possible, or better yet to deduce the key (or keys) used to encrypt the message. In order to decrypt other message encrypted with the same keys.

Ciphertext-only attack

Types of Cryptanalysis attacks 2. Known-plaintext attack The cryptanalyst (attacker) has access not only to the cipher text of several message, but also to the plain text of those message. His job is to deduce the key (or keys) used to encrypt the message or an algorithm to decrypt any new message encrypted with the same key, (or keys).

Known-plaintext attack