1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Lecture 23 Symmetric Encryption
Review What is security: history and definition Security policy, mechanisms and services Security models.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Cryptography (Traditional Ciphers)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
An Introduction to Cryptology
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Cryptography and Network Security
Outline Some Basic Terminology Symmetric Encryption
Cryptanalysis Network Security.
Presentation transcript:

1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides

2 Conventional Encryption Principles  An encryption scheme has five ingredients:  Plaintext  Encryption algorithm  Secret Key  Ciphertext  Decryption algorithm

3 Conventional Encryption Principles

4 Requirements for Security  Strong encryption algorithm  Even if known, should not be able to decrypt or work out key  Even if a number of cipher texts are available together with plain texts of them  Sender and receiver must obtain secret key securely  Once key is known, all communication using this key is readable

5 Cryptography  Classified along three independent dimensions:  The type of operations used for transforming plaintext to ciphertext  The number of keys used  symmetric (single key)  asymmetric (two-keys, or public-key encryption)  The way in which the plaintext is processed

6 Average time required for exhaustive key search Key Size (bits) Number of Alternative Keys Time required at 10 6 Decryption/µs = 4.3 x milliseconds = 7.2 x hours = 3.4 x x years = 3.7 x x years

7 Classical Encryption Techniques  Substitution Techniques : plaintext are replaced by other letters or by numbers or symbols  Caesar Cipher  Monoalphabetic Cipher  Polyalphabetic Cipher  Transposition Techniques : some sort of permutation on the plaintext letters

8 Caesar Cipher  Replacing each other letter of the alphabet with the letter standing three places further down - plain : meet me after the toga party - cipher : PHHW PH DIWHU WKH WRJD SDUWB  Note that the alphabet is wrapped around, so that the letter following Z is A. - plain : abcdefghijklmnopqrstuvwxyz - cipher : DEFGHIJKLMNOPQRSTUVWXYZABC  If we assign a numerical equivalent to each letter(a=1, b=2 etc) - C = E(p) = (p+3) mod (26) - P = D(c) = (c–3) mod (26)

9 Crypto analysis of the Caesar Cipher  brute-force cryptanalysis  Three important characteristic of this problem: 1. The encryption/decryption algorithm are known 2. There are very few keys to try 3. The language of the plaintext is known and easily recognized

10 Monoalphabetic Cipher  Cipher line can be any permutation of the 26 alphabetic characters  If an enemy agent could check one of these possible keys every second, it would take roughly one billion times the lifetime of the universe to check all of them and find the correct one.This simple brute force approach clearly will not work.  mber/generalsubstitutionWithMenu.html mber/generalsubstitutionWithMenu.html

11 Crypto analysis of the Monoalphabetic Cipher  Attack : regularities of the language

12 Polyalphabetic Cipher  Instead of having one key (table) that is used to encrypt each block of plaintext, we use several different keys.  The Vigenère cipher is the classical example.  ack_Chamber/Swapping_Cipher_Alp habets.html ack_Chamber/Swapping_Cipher_Alp habets.html

Vignere cipher  To produce an unbreakable Vignere cipher, you must:  Choose a key that is as long as the plaintext message(Vernam cipher).  Build the key from random characters.  Never use the key again.  Don't use text decorations (spaces, punctuations, capitalization).  Protect the key 13

Example: Vernam cipher 14 Figure 2-3 Vernam Cipher

Example: Vernam cipher 15

16

17 One time pad  Messages  n-bit strings [b 1,…,b n ]  Keys  Random n-bit strings [k 1,…,k n ]  Encryption/Decryption  c = E(b, k) = b  k = [b 1  k 1, …, b n  k n ]   denotes exclusive or  b = D(b, k) = c  k = b  k  k = b  [1, …, 1] = b

18 One time pad (cont.)  Properties  Provably unbreakable if used properly  Keys must be truly random  Must not be used more than once  Key same size as message

One-time pad  Book ciphers  Use the text of a book, piece of music as key  Key should be known to both parties  Vignere table can be used for encryption 19

20 Transposition ciphers  An alternative to substitution ciphers  Instead of changing the coding of the characters (blocks) in the plaintext, we rearrange the text.  The effect is that the cipher text and the plaintext contains the same symbols.

21 Simple permutation  Algorithm  Divide to plaintext into blocks  Decide on a permutation order  Rearrange the blocks according to this  Example:  Plaintext: We a|re t|he b|est!  Key:  Cipher text: Wae |rte |hbe |e!st

Columnar transposition cipher 22 Figure 2-4 Columnar Transposition

Columnar transposition  Write the message in a rectangle, row by row, and read the message off, column by column  Input : t h e e x a m p l e j u s t g i v e n s u g g e s t s t h a t m u l t  Ciphertext: tpggh hliga eevet ejesm xuntu asssl mtutt 23

24 Transposition ciphers  A more complex transposition cipher is to write the message in a rectangle, row by row, and read the message off, column by column but permute the order of the columns (one-time pad)  K e y : Input : t h e e x a m p l e j u s t g i v e n s u g g e s t s t h a t m u l t  Ciphertext EEVETEJESMHLIGATPGGH XUNTUASSSLMTUTT

Cryptanalysis of a columnar transposition  Is it a transposition or a substitution?  Where the column ends and which are the adjacent columns 25

Digrams and Trigrams 26

27 Figure 2-5 Moving Comparisons

28 Problems with classical ciphers  Neither substitution nor transposition ciphers are secure enough today.  They also often have problems with complex keys that are hard to remember.  Solution?

29 Product ciphers  Combine both methods!  Simple ciphers can be implemented in hardware  S-box = substitution cipher  P-box transposition cipher  Warning: Combining two ciphers does not imply that the resultant is stronger or even as strong as the original two