251959084756578934940271832400483985714 292821262040320277771378360436620207075 955562640185258807844069182906412495150 821892985591491761845028084891200728449.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 1 Overview.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Chapter 12 Cryptography (slides edited by Erin Chambers)
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Week-6.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Chapter 2 Basic Encryption and Decryption
Cryptography.
M3: Encryption r By Andrew Stringer.
PART VII Security.
Security.
Simple Encryption- Lesson 5
An electro-mechanical rotor cipher machine created by the German engineer Arthur Scherbius.
Basic of Modern Cryptography
Presentation transcript:

Breaking Cryptography Parallel Decryption Brad Heap May 2009

Encryption 101 Requires Code Breaking Sender Receiver Message Compromised Without Encryption

Types of Algorithms Symmetric Key – Both sender and receiver need the same key to encrypt and decrypt message. – Fast to encode and decode. – Some algorithms allow for multiple encoding passes.

Types of Algorithms Asymmetric Key (Public/Private Key) – Sender and receiver need different keys to encrypt and decrypt messages. – Public Key is a semi-prime calculated from two long prime numbers (the private key) – Sender encodes messages as blocks raised to nth power. – Slow to encode and decode. – Often Symmetric Key is encoded in Asymmetric at start of message and rest of message is Symmetric.

One Way Messages One Way – Primarily used as a check or where the plaintext is irrelevant... e.g.: EFTPOS Card Pin Numbers. Data Integrity... MD5 Checksum. – Vulnerable to collisions. e.g. Pin: 1234, Checksum: = 9 Another pin was 2341, Checksum = 9. In this example a wrong pin number could still give out cash.

Breaking the Key Brute Force – E.g. 1 You know a key is a 16 digit number 10 Possible Numbers Per digit Permutations: 9,999,999,999,999,999 combinations to check. Checking Process is naturally parallel. Assume 256 node cluster at 100 checks per second. Maximum Time: 390,624,999,999 seconds (12,735 years)

Breaking the Key Brute Force – E.g. 2 You know a key is 8 alphanumeric characters. 90 Possible Characters Per character. Permutations: 4,304,672,100,000,000 combinations to check. Checking Process is naturally parallel. Assume 256 node cluster at 100 checks per second. Maximum Time: 168,151,253,906 seconds (131,573 years)

Breaking the Key With modern codes Brute Force is often not a viable solution. However knowledge is power, and the more we know about the design of the key and/or algorithm used for encoding the more that we can learn about its structure... Therefore we can dramatically reduce the number of keys to check.

Dictionary Attack E.g. 1 Assume we have learnt that the 16 digit number is a prime. There are 29,844,570,422, digit primes. Assuming same computing power as before it would now only take a maximum of 1,165,803,532 seconds (912 years) to break.

Dictionary Attack E.g. 2 Assume we have learnt that the 8 characters spell a word. There are around 100,000 words in English. Let us assume it can have a number and order of capital and lowercase letters, leaving us with 2,965,420,000 possible orders. Assuming same computing power as before it would now only take a maximum of 115,836 seconds (32 hours) to break.

Random Numbers A secure key or encryption algorithm routine is one that is relies completely random numbers and cannot be guessed or predicted. However generating true random numbers is very hard. Both humans and computers are vulnerable to creating “random” numbers through patterns or sequences which can be worked out.

Random Number Conjecture If it is possible to build a true random mechanical random number generator, would it be possible to generate a computer simulation of this number generator? If so is the mechanical simulator truly random?

Trapdoor Function Some encryption algorithms have special functions that can be applied to the encrypted data without a key to reveal the encoded messages. These functions are often deliberately encoded into an algorithm so that the government or other source of authority can still check/read the data. Without knowledge of a trapdoor breaching it is a very complex and time consuming task.

Breaking the Text - Pattern Matching Sometimes in it impractical to try and break the key. In this case trying to work out words contained in the encoded text can lead to a break through. E.g: Cipher Text: +83(88 Guessing that the ‘8’ is really a ‘e’: +e3(ee Plain Text: degree

Pattern Matching – Image Example Messages are not always hidden in text format. Data can be hidden in images. Guessing the algorithm or where the data is stored can be tricky. E.g. By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in:

Permutations A curse of the brute force attack is the numbers of permutation of numbers that need to be checked. In permutations of a set alphabet there will be a huge number of permutations that are so similar to the original alphabet that they will never be used in code. For instance a 4 letter alphabet ABCD. There are 24 permutations. However 21 of the Permutations either transpose or reverse onto themselves.

Permutations For instance Permutation: DACB. Cannot be used because C will also transpose to C hence so will never been encoded. For instance Permutation: BADC Cannot be used because if you encode text a second time with the Permutation you will decode it. Only DCBA, CDAB, BADC are permutations that do not transpose onto themselves.

Permutations Having Permutations that transpose onto themselves is a weakness in a code because it can fail to encode some data. However limiting what permutations of a set alphabet that can be used can make the code weaker as there is less permutations to check. “Damned if you do, damned if you don’t.”

Summary Code cracking is a naturally Parallel exercise. Even with the most powerful systems a brute force attack is practically impossible. However, the more you can learn about how a code operates the more easy it becomes to crack.

Further Thoughts Other Ways to Keep a Secret: – CA Authority – Salting – One Time Pad – Quantum Encryption

Quantum Encryption

Further Reading Code Breaking. Rudolf Kippenhahn The Code Book. Simon Singh A good maths text-book. Particularly something on discrete mathematics. How Encryption Works. Jeff Tyson. How Quantum Cryptology Works. Josh Clark. cryptology.htm Cryptanalysis. Wikipedia.