Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 2 – Classical Encryption Techniques
Introduction to Cryptography
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cryptography Week-6.
Cryptanalysis of the Vigenere Cipher Using Signatures and Scrawls To break a Vigenere cipher you need to know the keyword length. – The Kasiski and Friedman.
CIS 5371 Cryptography Introduction.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Symmetric-Key Cryptography
DES Attacks and Triple DES
Classical Encryption techniques
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
MAT 1000 Mathematics in Today's World Winter 2015.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Substitution Ciphers.
Asad Gondal Ali Haider Mansoor
Cryptography Lecture 2.
Cryptography Lecture 3.
Cryptography Survey.
ICS 454: Principles of Cryptography
Cryptography Survey.
Cryptanalysis of Vigenere Cipher
SYMMETRIC ENCRYPTION.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Cryptography Lecture 2.
Presentation transcript:

Cryptography Introduction, continued

Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable to exhaustive-search attacks

The Vigenère cipher The key is now a string, not just a character To encrypt, shift each character in the plaintext by the amount dictated by the next character of the key – Wrap around in the key as needed Decryption just reverses the process tellhimaboutme cafecafecafeca veqpjiredozxoe tellhimaboutme cafecafecafeca veqpjiredozxoe

The Vigenère cipher Size of key space? – If keys are 14-character strings; then key space has size  2 66 – Brute-force search expensive/impossible Is the Vigenère cipher secure? (Believed secure for many years…)

Attacking the Vigenère cipher (Assume a 14-character key) Observation: every 14 th character is “encrypted” using the same shift Looking at every 14 th character is (almost) like looking at ciphertext encrypted with the shift cipher – Though brute-force attack from before doesn’t work… veqpjiredozxoeualpcmsdjqu iqndnossoscdcusoakjqmxpqr hyycjqoqqodhjcciowieii

Using plaintext letter frequencies

Attacking the Vigenère cipher Look at every 14 th character of the ciphertext, starting with the first Let  be the most common character appearing in this portion of the ciphertext Most likely, this character corresponds to the most common plaintext character (‘e’) – Guess the first character of the key is  - ’e’ Repeat for all other positions Better (more complicated) attacks also possible

Back to the drawing board… So far: “ad hoc” constructions; construct, break, repeat, … Can we prove that some encryption scheme is secure? First need to define what we mean by “secure” in the first place…