Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
1 Digital certificates One concern with the public key approach: must ensure that you are encrypting to the correct person’s public key  Otherwise, you.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
Cryptography, Authentication and Digital Signatures
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
TMK 264: COMPUTER SECURITY CHAPTER TWO: CRYPTOGRAPHY 1.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITMS – 3153 Information Systems Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CHAPTER 2 Elementary Cryptography 1. Objectives 2  Define the concept of encryption  Discuss different type of cryptography algorithms  Explain the.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Basics of Cryptography
Chapter 2 Basic Encryption and Decryption
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography.
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptography II Jagdish S. Gangolly School of Business
Security through Encryption
PART VII Security.
csci5233 computer security & integrity (Chap. 4)
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Chap 2: Elementary Cryptography

 Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and the DES and AES algorithms  Asymmetric (public key) encryption and the RSA algorithm  Key exchange protocols and certificates  Digital signatures  Cryptographic hash functions SE571 Security in Computing Dr. Ogara 2

 Cryptography - practice and study of hiding information/using encryption to conceal text  Cryptoanalysis - to find some weakness or insecurity in a cryptographic scheme  Cryptology - research into and study of encryption and decryption; it includes both cryptography and cryptanalysis SE571 Security in Computing Dr. Ogara 3

 Decryption – the method of turning cipher text back into plaintext  Encryption algorithm – set of rules or procedures that dictates how to encrypt and decrypt data, also called an encryption cipher  Encryption – method of transforming data (plaintext) into an unreadable format  Plaintext – the format(usually readable) of data before encrypted SE571 Security in Computing Dr. Ogara 4

 Ciphertext – the scrambled format of data after being encrypted  Key – a value used in the encryption process to encrypt and decrypt/ also called cryptovariable SE571 Security in Computing Dr. Ogara 5

6

7  Uses one key for both encryption and decryption  Receiver and sender share same key (private key) to lock and unlock  Also called private key encryption  Must securely distribute keys to other parties

SE571 Security in Computing Dr. Ogara 8  Anyone with key can either encrypt or decrypt (similar to password)  Very fast to encrypt or decrypt  Provides authentication as long as key remains secret  Problem How do A and B obtain their shared secret key? Key distribution is e.g. n users communicating in pairs need n*(n-1)/2 keys

SE571 Security in Computing Dr. Ogara 9  Receiver and sender have two keys – public and private  Public key can be sent in an message or posted in a public directory  Public key used to encrypt and private key to decrypt or vise-versa  Requires a lot of resources

SE571 Security in Computing Dr. Ogara 10 Secret Key (Symmetric) Public Key (Asymmetric) No. of keys12 Protection of keys Must be kept secretOne key must be kept secret; the other can be freely exposed Best usesCryptographic workhorse; secrecy and integrity of data—single characters to blocks of data, messages, files Key exchange, authentication Key distribution Must be out-of-bandPublic key can be used to distribute other keys SpeedFastSlow

SE571 Security in Computing Dr. Ogara 11

 break a single message  recognize patterns in encrypted messages, to be able to break subsequent ones by applying a straightforward decryption algorithm  infer some meaning without even breaking the encryption, such as noticing an unusual frequency of communication or determining something by whether the communication was short or long SE571 Security in Computing Dr. Ogara 12

 deduce the key, to break subsequent messages easily  find weaknesses in the implementation or environment of use of encryption  find general weaknesses in an encryption algorithm, without necessarily having intercepted any messages SE571 Security in Computing Dr. Ogara 13

 Confusion (substitution) One letter is exchanged for another Basis of many cryptographic algorithms used for diplomatic communication through the first half of the twentieth century Basis for some widely used commercial-grade encryption algorithms Examples:  Ceasar cipher  One-Time Pad  The Vernam cipher SE571 Security in Computing Dr. Ogara 14

 Diffusion (Transposition) Order of the letters is rearranged Basis for some widely used commercial-grade encryption algorithms Goal - widely spread the information from the message or the key across the ciphertext (diffusion) Also known as permutation (rearrangement of symbols of a message) SE571 Security in Computing Dr. Ogara 15

 Romans used a shift cipher called Ceasar cipher  Shift ciphers simply shift characters in an alphabet  Advantages Easy to memorize and implement  Disadvantage Pattern is obvious SE571 Security in Computing Dr. Ogara 16

 Large, non-repeating set of keys is written on sheets of paper, glued together into a pad  Requires a prearranged chart called Vigenere table (contains 26 letters in each column in some scrambled order)  Receiver needs a pad similar to the sender SE571 Security in Computing Dr. Ogara 17

 Example: Message has 300 characters in length Keys are 20 characters long Sender needs 15 pages of keys Sender writes keys one at a time above the letters of plain text Sender encipher plain text with Vigenere chart Receiver uses appropriate number of keys to decipher message SE571 Security in Computing Dr. Ogara 18

 Problems Requires absolute synchronization between sender and receiver Difficult to store and account for the keys SE571 Security in Computing Dr. Ogara 19

 Developed by Gilbert Vernam for AT&T  Is immune to most cryptanalytic attacks  Uses long non-repeating sequence of numbers that are combined with the plaintext  Used long punched paper tape that fed into a teletype machine  Tape contained random numbers that were combined with characters typed into the teletype  sequence of random numbers had no repeats, and each tape was used only once SE571 Security in Computing Dr. Ogara 20

SE571 Security in Computing Dr. Ogara 21

SE571 Security in Computing Dr. Ogara 22  Plain text - VERNAM CIPHER  Ciphertext - tahrsp itxmab

 Plaintext characters are rearranged into columns  Example: Plain text - THIS IS A MESSAGE TO SHOW HOW A COLUMNAR TRANSPOSITION WORKS Ciphertext - tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasns SE571 Security in Computing Dr. Ogara 23

SE571 Security in Computing Dr. Ogara 24

 The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption  The set of keys and the enciphering algorithm should be free from complexity SE571 Security in Computing Dr. Ogara 25

 The implementation of the process should be as simple as possible  Errors in ciphering should not propagate and cause corruption of further information in the message  The size of the enciphered text should be no larger than the text of the original message SE571 Security in Computing Dr. Ogara 26

 It is based on sound mathematics  It has been analyzed by competent experts and found to be sound  It has stood the test of time SE571 Security in Computing Dr. Ogara 27

 Stream ciphers - encrypt one bit or character or symbol of plaintext into bit or symbol of Ciphertext at a time e.g. diffusion  Block ciphers encrypt a group of plaintext symbols as one block e.g. columnar transposition  Block ciphers can effectively act as a stream cipher SE571 Security in Computing Dr. Ogara 28

SE571 Security in Computing Dr. Ogara 29 Stream ciphers Block ciphers

SE571 Security in Computing Dr. Ogara 30  Speed of transformation - the time to encrypt a symbol depends only on the encryption algorithm itself, not on the time it takes to receive more plaintext  Low error propagation - error in the encryption process affects only a character

SE571 Security in Computing Dr. Ogara 31  Low diffusion - Each symbol is separately enciphered. Therefore, all the information of that symbol is contained in one symbol of the ciphertext.  Susceptibility to malicious insertions and modifications - Because each symbol is separately enciphered, an active interceptor who has broken the code can splice together pieces of previous messages and transmit a spurious new message that may look authentic.

SE571 Security in Computing Dr. Ogara 32  High diffusion - Information from the plaintext is diffused into several ciphertext symbols. One ciphertext block may depend on several plaintext letters  Immunity to insertion of symbols - Because blocks of symbols are enciphered, it is impossible to insert a single symbol into one block. The length of the block would then be incorrect, and the decipherment would quickly reveal the insertion

SE571 Security in Computing Dr. Ogara 33  Slowness of encryption - The person or machine using a block cipher must wait until an entire block of plaintext symbols has been received before starting the encryption process  Error propagation - An error will affect the transformation of all other characters in the same block

 DES – Data Encryption Standards  AES – Advanced Encryption Standards  RSA – Rives-Shamir-Adelman Encryption SE571 Security in Computing Dr. Ogara 34

 Developed by U.S government for general public (adopted in 1976)  Based on data encryption algorithm developed by IBM  Combines two fundamental building blocks of encryption – substitution and transposition  Uses only standard arithmetic and logical operations on numbers up to 64 bits long SE571 Security in Computing Dr. Ogara 35

 Lack of trust with DES 56-bit key length  Development of double encryption for greater secrecy  Two keys perform two encryptions thus making it hard to unlock [C=E(k 2, E(k 1,m))]  Unfortunately the assumption is false  Three keys adds significant strength [C = E(k 3, E(k 2, E(k 1,m)))] SE571 Security in Computing Dr. Ogara 36

 1997 researchers using over 3,500 machines in parallel were able to infer a DES key in four months’ work  1998 for approximately $100,000, researchers built a special “DES cracker” machine that could find a DES key in approximately four days  Hence need for better and stronger algorithm SE571 Security in Computing Dr. Ogara 37

 Algorithm is called Rijndael – named after the two creators (Vincent Rijmen and Joan Daemen)  Adopted in 2001  Uses substitution; transposition; and the shift, exclusive OR, and addition operations  Keys based on 128, 192 and 256 bits SE571 Security in Computing Dr. Ogara 38

 Does it have flaws?  How long will it remain sound?  Cryptanalysts have not found any flaws yet SE571 Security in Computing Dr. Ogara 39

 Public key system introduced in 1978  Named after three inventors  Uses two keys for encryption and dceryption SE571 Security in Computing Dr. Ogara 40

 Hash functions  Key exchange  Digital signatures  Certificates SE571 Security in Computing Dr. Ogara 41

 Important for integrity  Put a shield or seal around a file by computing a cryptographic function called hash or checksum or message digest of a file  Examples: MD4, MD5 (Message Digest) – produce 128 bit SHA/SHS (Secure Algorithm or Standards) – produce 160-bit digest SE571 Security in Computing Dr. Ogara 42

 Example: Web browser connecting to shopping website  Encrypted session must be established  S = sender of protected information  R = receiver of protected information  Establish assurance that information came from S  Public key cryptography can help here SE571 Security in Computing Dr. Ogara 43

 Use lockboxes and keys  S puts protected information into lockbox that can be opened by S public key  S puts lockbox into another one that can be opened by ONLY by R’s private key  R uses private key to open outer box and S public key to open inner box (proof it came from S) SE571 Security in Computing Dr. Ogara 44

 Does not require preshared public keys  S and R uses simple arithmetic to exchange a secret  They agree on field number n and starting number g  Each thinks of a secret number, say, s and r.  S sends to R g s and R sends to S g r.  Then S computes (g r ) s and R computes (g s ) r, which are the same, so g rs = g sr becomes their shared secret. SE571 Security in Computing Dr. Ogara 45

 Provide reliable means to ensure the origin of data  Cryptographic hash codes are used to support digital signatures  Cryptographic hash codes offer a fast, fairly reliable way of determining whether a piece of data has been modified between sender and receiver SE571 Security in Computing Dr. Ogara 46

 It must be unforgeable  It must be authentic  It is not alterable  It is not reusable SE571 Security in Computing Dr. Ogara 47

 Ideally suited to digital signatures  If S wishes to send M to R, S uses the authenticity transformation to produce D(M, K S ). S then sends D(M, K S ) to R. R decodes the message with the public key transformation of S SE571 Security in Computing Dr. Ogara 48

 Binds a public key and users’ identity  Signed by Certificate of Authority (CA)  Example – Two people  Edward posts his public key in public but retains private key  Diana creates public key and includes it into message with her identity  Edward signs (affirms Diana’s public key and identity) by creating has value and then encrypting message and hash value with private key SE571 Security in Computing Dr. Ogara 49