Classical Cryptography

Slides:



Advertisements
Similar presentations
CSE331: Introduction to Networks and Security Lecture 16 Fall 2002.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Public Key Encryption Algorithm
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Scott CH Huang COM 5336 Cryptography Lecture 1 Scott CH Huang COM 5336 Cryptography Lecture 1 Introduction.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Classical Encryption Techniques
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.
Classical Encryption Techniques
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number.
Introduction to Information Security Chapter II : Classical Ciphers.
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Classical Encryption Techniques CSE 651: Introduction to Network Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
Midterm Review Cryptography & Network Security
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
1 Public-Key Cryptography and Message Authentication.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
Substitution Ciphers.
Classical Techniques: Substitution
History and Background Part 3: Polyalphabetic Ciphers
Taehyung Kim HPC Lab. POSTECH
PART VII Security.
Rivest, Shamir and Adleman
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Classical Cryptography The Enigma Rotor machine The Jefferson cylinder Scytale Hieroglyphics

Symmetric Cryptography Uses a single key for both encryption and decryption The encryption and decryption algorithms are inverses of each other

Simple Substitution Ciphers (Monoalphabetic Ciphers) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Y M I H B A W C X V D N O J K U Q P R T F E L G Z S

Simple Substitution Ciphers (Monoalphabetic Ciphers) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Y M I H B A W C X V D N O J K U Q P R T F E L G Z S \\COME AT ONCE

Simple Substitution Ciphers (Monoalphabetic Ciphers) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Y M I H B A W C X V D N O J K U Q P R T F E L G Z S \\COME AT ONCE IKOB YT KJIB

Simple Substitution Ciphers (Monoalphabetic Ciphers) A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Y M I H B A W C X V D N O J K U Q P R T F E L G Z S \\COME AT ONCE IKOB YT KJIB GIVE TO INGE HAVE TO ACHE SECT IN EAST

Methods for decrypting a simple substitution cipher: Brute force attack key space of the substitution cipher = 26! ≈ 288 Letter frequency analysis determine the frequency of every ciphertext letter look at pairs , triples, or quadruples of ciphertext symbols

Letter Frequency The most common digrams (in descending order):  th, he, in, en, nt, re, er, an, ti, es, on, at, se, nd, or, ar, al, te, co, de, to, ra The most common trigrams (in descending order):  the, and, tha, ent, ing, ion, tio, for, nde, has, nce, edt, tis, oft, sth, men

Polyalphabetic Ciphers Encrypt multiple characters at a time Relationship from plain to ciphertext is one-to-many Thwart statistical attacks

Polyalphabetic Ciphers Vigenère Autokey Playfair Hill One-time pad Rotor Enigma

Vigenère Cipher Let m be a positive integer (the key length) P = C = K = Z26 x ... x Z26 = (Z26) m For k = (k1, ..., km): ek(x1, ..., xm) = (x1 + k1 (mod 26), ..., xm + km (mod m)) dk(y1, ..., ym) = (y1 - k1 (mod 26), ..., ym - km (mod m))

Modern Cryptography AES RSA Rivest, Shamir, and Adleman The Future of Cryptography and Quantum Computing

Average Time Required for Exhaustive Key Search