Caesar Cipher a b c d e f g h I j k l m n o p q r s t u v w x y z b c d e f g h I j k l m n o p q r s t u v w x y z a shift of 1 c d e f g h I j k l m.

Slides:



Advertisements
Similar presentations
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
What is Elliptic Curve Cryptography?
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Great Theoretical Ideas in Computer Science.
Attacks on Digital Signature Algorithm: RSA
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS110: Computers and the Internet Encryption and Certificates.
Great Theoretical Ideas in Computer Science.
Encryption Coursepak little bit in chap 10 of reed.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Symmetric-Key Cryptography
Software Security Seminar - 1 Chapter 5. Advanced Protocols 조미성 Applied Cryptography.
Encryption.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Traditional Symmetric-Key Ciphers
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Overview of Cryptography & Its Applications
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
ENCRYPTION TAKE 2: PRACTICAL DETAILS David Kauchak CS52 – Spring 2015.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
CS 150 – Computing: From Ada to the Web Cryptography.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Lesson 2-18 AP Computer Science Principles
Chapter 8: Network Security
Cryptography & Security
Chapter 8: Network Security
Cryptography Survey.
Network Security Basics
Cryptography Survey.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Consensus Algorithms.
Chapter 8: Network Security
Chapter 8: Network Security
Presentation transcript:

Caesar Cipher a b c d e f g h I j k l m n o p q r s t u v w x y z b c d e f g h I j k l m n o p q r s t u v w x y z a shift of 1 c d e f g h I j k l m n o p q r s t u v w x y z a b shift of 2 … z a b c d e f g h I j k l m n o p q r s t u v w x y shift of 25 “attack at dawn” => “buubdl bu ebxo” with shift of 1 How can we crack this? 1.Letter frequency analysis 2.Word constraints 3.Brute force search

Vigenere (vee gen air) – circa a b c d e f g h I j k l m n o p q r s t u v w x y z 2.b c d e f g h I j k l m n o p q r s t u v w x y z a 3.c d e f g h I j k l m n o p q r s t u v w x y z a b … 26.z a b c d e f g h I j k l m n o p q r s t u v w x y Now choose catch phrase (key), e.g., “candy”. Turn that into sequence of numbers: 3,1,14,4, a t t a c k a t d a w n“attackatdawn” y t g z e k n w b d w a“ytgzeknwbdwa” How can it be cracked? 1.Look for recurring patterns – in large text, common words often repeat because they align with the key. 2.Try to crack key. First guess length. Then use freq analysis.

One Time Pad Cipher Use Vigenere table as base. But instead of choosing a key and sticking with it, generate k random keys. Both parties have a copy of these random keys on a “pad”, e.g., piece of paper. When Alice sends Bob a message, she uses the first random key to encrypt, and Bob uses the first random key to decrypt. So far the same as before. But now, both scratch off the first key, and use the 2 nd key for next message. They can send k messages before needing a new pad (new list). How can it be cracked? 1.Steal/see/copy the pad. 2.Otherwise, unbreakable if never repeat keys.

NSA Steps in National Security Agency is now involved. The problem is that you don’t want to keep generating pads – risk of getting in wrong hands. So instead of “scratching out” a random key, reuse it later. If k is way large, then little danger of a cracker seeing the repeat. NSA wants two things: 1.Commercial sector to use One Pad Ciphers successfully to protect themselves and their customers, e.g., VISA numbers, etc. 2.NSA wants ability to crack any message it wants using its super computers. Sooooo, NSA decided that it could crack a message if the pad length k<10**18, i.e., less than 10**18 random keys on pad. This is called DES56. The 56 comes from 56 bits, which can hold roughly 10**18 as a number. No one in US is supposed to use a pad greater than 10**18.

What problems does shared-key crypto have? There still remains the problem of distributing shared keys. If we try to distribute them on the internet, others can sniff packets and see what we are doing. Is there a way to stop the sniffers? Let’s use physical example first: box where we can put locks and chains. We will put shared key inside the box. 1.Alice puts key K inside the box, then locks it with her special key, and sends to Bob. 2.Eve intercepts the box, but can’t open it – she does not have Alice’s key. 3.Bob gets it, but is now stuck: he does not have a copy of Alice’s key. Hmmmm. That did not work 

Very Clever Idea Let’s try that again with a slight twist. 1.Alice puts key K inside the box, then locks it with her special key, and sends to Bob. 2.Eve intercepts the box, but can’t open it – she does not have Alice’s key. 3.Bob gets it, and now puts his own lock on it and sends it back to Alice. 4.Eve intercepts the box, but can’t open it – she has neither key. 5.Alice gets it and removes her lock and sends it back to Bob. 6.Eve intercepts but still can’t do anything. 7.Bob gets it, and removes his lock. He now can open and get key K. The old double-lock trick!

Big, Big Step We need to replace locks with some electronic mechanism. We want to use the similar idea on the internet. Diffie-Helman algorithm does the trick. It will generate a shared key for both parties, all in front of Eve’s eyes. Alice Bob Step 0. Both agree on two prime numbers, Y and P. This is done in public! Y=7 and P=11. Step 1. Alice chooses a Bob chooses a secret secret number A (say, 3). number B (say 6) Step 2. Alice computes a Bob computes a new new number alpha=Y**A%P number beta=Y**B%P = 7**3%11 = 2 = 7**6%11 = 4 Step 3. Alice sends Bob alpha (public) Bob sends Alice beta (public) Step 4. Alice computes beta**A%P=9 Bob computes alpha**B%P=9 Step 5. Alice knows the shared key = 9 Bob knows the shared key = 9.

How does this work? Theorem: (Y**B%P)**A%P = (Y**A%P)**B%P That means that A and B are good private keys. If Alice holds the key A, she does not have to pass it to Bob. She only has to pass him (Y**A%P), which we are calling alpha. She then knows that Bob can use that to plug into alpha**B%P. The theorem says that when they both do this, they will get the same result. This is the shared key

What does Eve know? Y=7 and P=11 alpha=2 and beta=4 7**A%11=2 and 7**B%11=4 4**A%11 = 2**B%11 Alice Bob Step 0. Both agree on two prime numbers, Y and P. This is done in public! Y=7 and P=11. Step 1. Alice chooses a Bob chooses a secret secret number A (say, 3). number B (say 6) Step 2. Alice computes a Bob computes a new new number alpha=Y**A%P number beta=Y**B%P = 7**3%11 = 2 = 7**6%11 = 4 Step 3. Alice sends Bob alpha (public) Bob sends Alice beta (public) Step 4. Alice computes beta**A%P=9 Bob computes alpha**B%P=9 Step 5. Alice knows the shared key = 9 Bob knows the shared key = 9.

How can Eve crack it? Y=7 and P=11 alpha=2 and beta=4 7**A%11=2 and 7**B%11=4 4**A%11 = 2**B%11 Rough algorithm: 1. loop through all A’s such that 7**A%11=2 1. loop through all B’s such that 7**B%11=4 1. if 4**A%11=2**B%11 then winner!