Zac Blohm & Kenny Holtz. ALGORITHMS ARE THE BASIS FOR CRYPTOGRAPHY  The basic idea of Cryptography in Computer Science is to run a message through an.

Slides:



Advertisements
Similar presentations
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Classical Cryptography
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Cryptography Programming Lab
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, and Andreea Cotoranu
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Classical Techniques: Substitution
Cryptography and Network Security
Computer and Data Security 4th Class
History and Background Part 3: Polyalphabetic Ciphers
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 3:Cryptography (16M)
Double Transpositions
Homophonic Substitution Cipher
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Zac Blohm & Kenny Holtz

ALGORITHMS ARE THE BASIS FOR CRYPTOGRAPHY  The basic idea of Cryptography in Computer Science is to run a message through an algorithm to receive an encrypted text which can safely be sent to be decrypted with another algorithm

 Monoalphabetic  Caesar Cypher  Polyalphabetic  Transpositional  Compositional

 Simple substitutions  One of the earliest used forms of cryptography  Easily cracked by statistical analysis (ex. how many times each character occurs) and trial and error  Most famous example is the Caesar Cypher which simply replaces each character with one “K” places further in the alphabet

 If K=3, then A becomes C, B becomes D etc…  Therefore the plaintext “This is a message”  Is encrypted to say “Vjku ku c oguucig”  Notice that the number of characters and any patterns between them are shared (repeated characters, the standalone vowel etc…)

 Multiple alphabets to disguise patterns  Biggest difference between them is how many alphabets and what determines a change of alphabet

KeyA1A1 A2A2 A3A3 AXCL BYDM CZEN D FO EAGP FBHQ GCIR HDJS …………

PLAINTEXT  This is a message CYPHERTEXT  Pjtobtoblwopoulcg  The key changed alphabets after each character (spaces were incorporated into each alphabet to conceal word length)

 Still direct substitutions  The change of alphabets can be recognized, which then reduces the problem to a series of monoalphabetic problems

 Changes the arrangement of the plaintext to disguise the message  Immune to the frequency analysis that defeats substitution cyphers  Pure transpositional cyphers produce same amount of each letter as present in plaintext  A common example involves reading into a matrix one way, and reading out the other

th is i s a te st m es sa ge

PLAINTEXT  This is a test message  # of t’s: 3  # of h’s: 1  # of i’s: 2  # of s’s: 5  # of spaces: 4  # of a’s: 2  # of e’s: 3  # of m’s: 1  # of g’s: 1 CYPHERTEXT  Ti sats esghsi etmsae  # of t’s: 3  # of h’s: 1  # of i’s: 2  # of s’s: 5  # of spaces: 4  # of a’s: 2  # of e’s: 3  # of m’s: 1  # of g’s: 1

 The matrix example never changes the letter in the first position or the last, and requires the key to contain the size of the matrix needed for decryption  Creates an anagram (meaning some messages are easily decrypted just by rearranging the letters to make the most probable words, longer messages make this harder)

 Combining both makes a much stronger cypher as you can eliminate most of the apparent patterns in your cyphertext  An example would be taking “this is a test message” through the previously used polyalphabetic cypher to get “pjtobtoblwvpovkigcocra” and then reading it through a 2x11 matrix as before

pj to bt ob lw vp ov ki gc oc ra

PLAINTEXT  “This is a test message” CYPHERTEXT  “ptbolvokgorjotbwpvicca”  No direct correlation between the position or frequency of each character