DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
CSSE463: Image Recognition Matt Boutell F-224 x8534
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Intro to Cryptography Lesson Introduction
CSSE463: Image Recognition Matt Boutell Myers240C x8534
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Lecture 3: Symmetric Key Encryption
ICS 454: Principles of Cryptography
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or not you are in the right classroom…)

CSSE/MA479: Introduction to Cryptography Matt Boutell F-224 x8534

Agenda: Introductions to… The players The topic The course structure The course material And intro to daily quizzes, worth 10% of grade: Q1

Introductions Roll call: Pronunciations and nicknames Pronunciations and nicknames Help me learn your names quickly Help me learn your names quickly You’ll share with classmates on discussion forum You’ll share with classmates on discussion forumMe: Sixth year at Rose Sixth year at Rose Taught CSSE120, 120 Robotics, 220, 221, 230, Image Recognition, Fractals, Cryptography, Mechatronics, Robotics senior design Taught CSSE120, 120 Robotics, 220, 221, 230, Image Recognition, Fractals, Cryptography, Mechatronics, Robotics senior design

What is Cryptography? Trappe and Washington, p. 3 Designing systems to communicate over non-secure channels

Non-secure channels AliceBob Eve EncryptDecrypt Trappe and Washington, p. 3 Encryption Key (+1) Decryption Key (-1) plaintextCIPHERTEXT DSZQUPHSBQIZ cryptographycryptography Objectives: 1. Confidentiality 2. Integrity 3. Authentication 4. Non-repudiation Q2

Agenda The players The topic The course structure The course material

What will we do? Learn theory (lecture, text, written problems) What would happen if you used composite numbers in RSA? Make and break codes (programming) DES Block cipher, classic crypto Research something new (term project) Quantum cryptography, TwoFish, PGP

Admin Syllabus Text: highly recommended by students Text: highly recommended by students Grading, attendance, academic integrity Grading, attendance, academic integrity Angel: Please use the merged course: Angel: Please use the merged course: CSSE/MA479 Spring Cryptography The original csse and ma are empty Schedule Contains links to homeworks (first due Monday) Contains links to homeworks (first due Monday) Easy first week… Easy first week… Bookmark in browser: Bookmark in browser: to cssema479-staff for questions Q3

Agenda The players The topic The course structure The course material

Shift ciphers Attributed to Julius Caesar Letters represented as x  x + k (mod 26) Cryptography  ETARVQITCRJA Weak cryptosystem. We learn it to show that “encryption” isn’t useful if it’s not secure. We learn it to show that “encryption” isn’t useful if it’s not secure. We also use it to study 4 typical attacks to find the decryption key: We also use it to study 4 typical attacks to find the decryption key: Ciphertext only (the discussion forums) Known plaintext Chosen plaintext Chosen ciphertext

1. Ciphertext only Consider dszquphsbqiz dszquphsbqizetarvqitcrjafubswrjudskbgvctxskvetlchwduytlwfumdixevzumxgvnejyfwavnyhwofkzgxbwozixpglahycxpajyqhmbizdyqbkzrincjaezrclasjodkbfasdmbtkpelcgbtenculqfmdhcufodvmrgneidvgpewnshofjewhqfxotipgkfxirgypujqhlgyjshzqvkrimhzktiarwlsjnialujbsxmtkojbmvkctynulpkcnwlduzovmqldoxmevapwnrmepynfwbqxosnfqzogxcryptography How did you attack the cipher? Another trick for long ciphers… Q4

2. Known plaintext Say I know sample of plaintext and corresponding ciphertext. How long does the sample need to be to find the key? Q5

3. Chosen plaintext Say I have access to the encryption machine and can choose a sample of plaintext to encode. How can I deduce the key? Just encode a. That gives the encryption key 4. Chosen ciphertext Say I can choose a sample of ciphertext to decode. Just decode A. How does this give the encryption and decryption keys? Q6-7

Homework due Monday See the schedule page

Affine ciphers Somewhat stronger since scale, then shift: x   x +  (mod 26) Say y = 5x + 3; x = ‘hellothere’; Then y = ‘mxggv…’ (Hint: my table mapping the alphabet to 0-25 is really handy)

Affine ciphers: x   x + b (mod 26) Consider the 4 attacks: 1. How many possibilities must we consider in brute force attack?

Restrictions on  Consider y= 2x, y = 4x, or y = 13x The problem is that gcd( , 26) ~= 1. The function has no inverse.

Finding the decryption key What’s the inverse of y = 5x + 3? In Integer (mod 26) World, of course…

Affine ciphers: x  ax + b (mod 26) Consider the 4 attacks: 1. Ciphertext only: How long is brute force? How long is brute force? 2. Known plaintext How many characters do we need? How many characters do we need? 3. Chosen plaintext Wow, this is easy. Wow, this is easy. 4. Chosen ciphertext Could be even easier! Could be even easier!

Sherlock Holmes, The Adventure of the Dancing Men (1898) In a letter: 2 weeks later: 2 mornings later: 3 days later: 4 days later:

Sherlock Holmes, The Adventure of the Dancing Men (1898) Holmes’ letter:

Comments A simple substitution cipher Used knowledge of linguistics Issue of authentication: Sherlock masqueraded as Elsie. Sherlock masqueraded as Elsie.