EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Cryptography and Network Security
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
EEC 688/788 Secure and Dependable Computing
Cryptography II Jagdish S. Gangolly School of Business
Presentation transcript:

EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University

2 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Outline Introduction to cryptography –Terminology –Basic encryption methods –Characteristics of "Good" Ciphers

3 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptography Terminology Encryption is the process of encoding a message so that its meaning is not obvious –Equivalent terms: encode, encipher Decryption is the reverse process, transforming an encrypted message back into its normal, original form –Equivalent terms: decode, decipher Plaintext: message to be encrypted Ciphertext: encrypted message

4 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptography Terminology The cryptosystem involves a set of rules for how to encrypt the plaintext and how to decrypt the ciphertext Why encryption? –It addresses the need for confidentiality of data, also helps to ensure integrity –It forms the basis of protocols that enable us to provide security while accomplishing system or network tasks

5 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptography Terminology The encryption and decryption rules are called encryption and decryption algorithms Encryption/decryptions algorithms often use a device called a key, denoted by K, so that the resulting ciphertext depends on the original plaintext message, the algorithm, and the key value An encryption scheme that does not require the use of a key is called a keyless cipher

6 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Symmetric Encryption The encryption and decryption keys are the same, so P = D(K, E(K,P)) D and E are closely related. They are mirror- image processes The symmetric systems provide a two-way channel to their users The symmetry of this situation is a major advantage of this type of encryption, but it also leads to a problem: key distribution

7 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Symmetric Encryption D K (E K (P)) = P

8 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Asymmetric Encryption Encryption and decryption keys come in pairs. The decryption key, K D, inverts the encryption of key K E, so that P = D(K D, E(K E,P)) Asymmetric encryption systems excel at key management

9 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptology Cryptology is the research into and study of encryption and decryption; it includes both cryptography and cryptanalysis Cryptography – art of devising ciphers –Comes from Greek words for “secret writing”. It refers to the practice of using encryption to conceal text Cryptanalysis – art of breaking ciphers –Study of encryption and encrypted messages, hoping to find the hidden meanings

10 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptanalysis Attempt to break a single message Attempt to recognize patterns in encrypted messages, to be able to break subsequent ones Attempt to deduce the key, in order to break subsequent messages easily Attempt to find weaknesses in the implementation or environment of use of encryption Attempt to find general weaknesses in an encryption algorithm

11 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptanalysis Traffic analysis: attempt to infer some meaning without even breaking the encryption, e.g., –Noticing an unusual frequency of communication –Determining something by whether the communication was short or long

12 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Basic Encryption Methods Substitution ciphers: one letter is exchanged for another Transposition ciphers: order of letters is rearranged

13 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Substitution Ciphers Idea: each letter or group of letters is replaced by another letter or group of letters Caesar cipher – circularly shift by 3 letters –a -> D, b -> E, … z -> C –More generally, shift by k letters, k is the key Monoalphabetic cipher – map each letter to some other letter –A b c d e f … w x y z –Q W E R T Y … V B N M <= the key

14 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Cryptanalysis of Substitution Ciphers Brute force cryptanalysis would have to try 26! permutations of a particular ciphertext message Smarter way: use frequencies of letters, pairs of letter etc., or by guessing a probable word or phrase. Most frequently occurred –Letters: e, t, o, a, n, … –Digrams: th, in, er, re, an, … –Trigrams: the, ing, and, ion, ent –Words: the, of, and, to, a, in, that, … When messages are long enough, the frequency distribution analysis quickly betrays many of the letters of the plaintext

15 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Transposition Ciphers Substitution cipher – preserves order of plaintext symbols but disguises them Transposition cipher – reorders (rearrange) symbols but does not disguise them. It is also called permutation With transposition, the cryptography aims for –Widely spreading the information from the message or the key across the ciphertext –Transpositions try to break established patterns

16 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Columnar Transposition Plaintext written in rows, number of columns = key length Key is used to number the columns Ciphertext read out by columns, starting with column whose key letter is lowest

17 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Columnar Transposition A transposition cipher example

18 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao One-Time Pads One-time pad: construct an unbreakable cipher –Choose a random bit string as the key –Convert the plaintext into a bit string –Compute the XOR of these two strings, bit by bit –The resulting ciphertext cannot be broken, because in a sufficiently large sample of ciphertext, each letter will occur equally often, as will every digram, every trigram, and so on => There is simply no information in the message because all possible plaintexts of the given length are equally likely

19 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher The Vernam Cipher is a type of one-time pad devised by Gilbert Vernam for AT&T

20 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher The encryption involves an arbitrarily long nonrepeating sequence of numbers that are combined with the plaintext Assume that the alphabetic letters correspond to their counterparts in arithmetic notation mod 26 –That is, the letters are represented with numbers 0 through 25 To use the Vernam cipher, we sum this numerical representation with a stream of random two-digit numbers

21 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher - Example Plaintext VERNAMCIPHER Numeric Equivalent Random Number = Sum = mod Ciphertext tahrspitxmzb

22 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher - Observations The repeated letter t comes from different plaintext letters Duplicate ciphertext letters are generally unrelated when this encryption algorithm is used => there is no information in the message to be exploited

23 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher - Decryption To decrypt: (C i – K i ) mod 26 –Note on rules of mod on negative number: “The mod function is defined as the amount by which a number exceeds the largest integer multiple of the divisor that is not greater than that number” ( –Modula op always return non-negative number –E.g., (19-76) mod 26 = (-57) mod 26 = (-78+21) mod 26 = 21

24 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao The Vernam Cipher - Decryption Ciphertext tahrspitxmzb Numeric equivalent One-time pad = Difference = mod Plaintext VERNAMCIPHER

25 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao One-Time Pads Disadvantages –The key cannot be memorized, both sender and receiver must carry a written copy with them –Total amount of data can be transmitted is limited by the amount of key available –Sensitive to lost or inserted characters

26 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Characteristics of "Good" Ciphers -- Claude Shannon (1949) The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption The set of keys and the enciphering algorithm should be free from complexity The implementation of the process should be as simple as possible Errors in ciphering should not propagate and cause corruption of further information in the message The size of the enciphered text should be no larger than the text of the original message

27 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Shannon's Characteristics of "Good" Ciphers The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption –Even a simple cipher may be strong enough to deter the casual interceptor or to hold off any interceptor for a short time

28 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Shannon's Characteristics of "Good" Ciphers The set of keys and the enciphering algorithm should be free from complexity –We should restrict neither the choice of keys nor the types of plaintext on which the algorithm can work –For example, an algorithm that works only on plaintext having an equal number of As and Es is useless

29 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Shannon's Characteristics of "Good" Ciphers Errors in ciphering should not propagate and cause corruption of further information in the message –One error early in the process should not throw off the entire remaining ciphertext

30 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Shannon's Characteristics of "Good" Ciphers The size of the enciphered text should be no larger than the text of the original message –A ciphertext that expands dramatically in size cannot possibly carry more information than the plaintext, yet it gives the cryptanalyst more data from which to infer a pattern –A longer ciphertext implies more space for storage and more time to communicate

31 Spring 2009EEC688: Secure & Dependable ComputingWenbing Zhao Properties of "Trustworthy" Encryption Systems It is based on sound mathematics It has been analyzed by competent experts and found to be sound It has stood the "test of time"