Fubswrjudskb Frxuvh qxpehu:4003-482 / 4005-705 Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Cryptography and Network Security Chapter 4 Fourth Edition by William Stallings.
Chapter 4 – Finite Fields. Introduction will now introduce finite fields of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
22C:19 Discrete Structures Integers and Modular Arithmetic
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
Session 4 Asymmetric ciphers.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CS110: Computers and the Internet Encryption and Certificates.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Midterm Review Cryptography & Network Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
CRYPTOGRAPHY AND THE MATH MAJOR Dr. Mihai Caragiu Mathematics Department Ohio Northern University.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
INCS 741: Cryptography Overview and Basic Concepts.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Introduction to Cryptography
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Traditional Symmetric-Key Ciphers
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb 4. Vrph Fodvvlfdo Fubswrvbvwhpv

Cryptography Course number: / Instructor:Ivona Bezáková Today’s topics: 1.Logistics: -Class list -Syllabus 2. The Math 3. What is Cryptography 4. Some Classical Cryptosystems

The Math We will go beyond descriptions of cryptographic algorithms and ways how to break them. We will use a lot of math and CS theory in this course, including: - some abstract algebra (number theory, groups, rings, fields) - some linear algebra - some probability and information theory - some complexity theory It is important to be comfortable with math!

What is Cryptography - the study of secure communication over insecure channels. Typical scenario: AliceBob Eve

What is Cryptography AliceBob Eve Private-key cryptosystems: Chapter 2 (& 4) - Alice and Bob agree on a key beforehand Alice: plaintext -> encryption (via the key) -> ciphertext -> send to Bob Bob:decrypt the ciphertext (using the key) to reconstruct the plaintext

What is Cryptography Eve: - she does not know the key, she cannot decrypt… ??? - she tries to read the current message, she can also try to figure out the key - in our book she sometimes acts as a malicious active attacker (usually called Mallory): corrupting Alice’s message, or masquerading as Alice Symmetric-key cryptosystems: - private-key cryptosystems use (essentially) the same key for encryption and decryption

Some Cryptanalysis Terminology Cryptanalysis - the process of attempting to compute the key - the most common attack models: - ciphertext only attack - known plaintext attack - chosen plaintext attack - chosen ciphertext attack What’s the weakest type of attack?

Cryptographic Applications 1. Confidentiality 2. Data integrity 3. Authentication 4. Non-repudiation

Classical Cryptosystems (Starting Chapter 2, sneaking in some math from Chapter 3.) Conventions: -plaintext : lowercase -CIPHERTEXT : uppercase -Spaces and punctuations will be usually omitted. -Letter of the alphabet will be often identifies with numbers 0,1,…,25.

Monoalphabetic Ciphers -Each letter is mapped to a unique letter. -Examples: shift cipher, substitution cipher, affine cipher -We will need modular arithmetic (and we’ll introduce more than we need in this chapter – it will all be useful later).

Modular Arithmetic Let a, b be integers, m be a positive integer. We write: a ´ b (mod m)if m divides (a-b) (Read it as: “a is congruent to b mod m”.) Examples: (true/false) 7 ´ 5 (mod 3)4 ´ 1 (mod 3) 7 ´ 1 (mod 3)-4 ´ -1 (mod 3) 66 ´ 0 (mod 3)-8 ´ 7 (mod 3)

Modular Arithmetic Let a be an integer, m be a positive integer. We use: a mod m to denote the remainder when a is divided by m. The remainder is always a number from {0,1,2,…,m-1}. Examples: 8 mod 3 =1 mod 1 =0 mod 2 = 63 mod 7 =-8 mod 3 = 3 mod 6 =-63 mod 7 = Is % in Java/C/C++ the same as mod ?

Modular Arithmetic Z m denotes the set {0,1,2,…,m-1}, with two operations: - addition (modulo m) - multiplication (modulo m) Z m is a commutative ring, i.e.: - addition and multiplication (mod m) are closed, commutative, associative, and multiplication is distributive over addition - 0 is the additive identity - each element has an additive inverse Note: For m>1, Z m is a commutative ring with identity.

Modular Arithmetic Z m denotes the set {0,1,2,…,m-1}, with two operations: - addition (modulo m) - multiplication (modulo m) Z m is a commutative ring, i.e.: - addition and multiplication (mod m) are closed, commutative, associative, and multiplication is distributive over addition - 0 is the additive identity - each element has an additive inverse Note: For m>1, Z m is a commutative ring with identity.

Shift Cipher The key k is an element of Z 26. We encrypt a letter x 2 Z 26 as follows: x  (x+k) mod 26 How to decrypt ? x  Remarks: - For k=3 this is known as the Caesar cipher, attributed to Julius Caesar. - Shift cipher works over any Z m.

Shift Cipher How good is it ? - the good: efficient encryption/decryption computation - the bad: easy to attack (not very secure) - how ? Kerckhoff’s Principle: - Eve knows the cipher but does not know the key. - Always assumed in cryptanalysis.

Substitution Cipher - Monoalphabetic cipher defined by a permutation of the alphabet. - Example: abcdefghijklmnopqrstuvwxyz ONETWHRFUISXVGABCDJKLMPQYZ What is the key in this example ? - Exercise: decode: EDYBKARDOBFY

Substitution Cipher How good is it ? - the good: efficient encryption/decryption - the bad(?): is it secure ? - approach 1: try all possible keys - is this feasible ? Hint: frequency tables, e.g., for English see Table 2.1, page 17

Affine Ciphers The key is a pair ( ®, ¯ ) 2 Z 26 £ Z 26 such that gcd( ®,26)=1. Then, encryption is done via an affine function: x  ( ® x + ¯ ) mod 26 How to decrypt ? x  Remark: The affine cipher can be defined over any Z m.

Affine Ciphers Questions: - How does it relate to the shift and the substitution ciphers ? - How many possible keys are there ? - Why do we have the condition gcd( ®,26)=1 ? - What is ® -1 ?

Affine Ciphers Questions: - Efficiently computable encryption and decryption ? - Is it secure ? How to cryptanalyze ?