Applied Cryptography Chapter 1 Foundations Jaewon Lee.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography Introduction Last Updated: Aug 20, 2013.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
1 Foundations The problem of providing secret communication over insecure media is the most traditional and basic problem of cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Lecture 23 Symmetric Encryption
Computer Security CS 426 Lecture 3
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 2 – Classical Encryption Techniques
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Introduction to Public Key Cryptography
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Crypto Bro Rigby. History
Chapter 20 Symmetric Encryption and Message Confidentiality.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Akademska in raziskovalna mreža Slovenije 1 Cryptography Overview Gorazd Božič Academic and Research Network of Slovenia
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue Quick Review.
Cryptography Introduction
PART VII Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Applied Cryptography Chapter 1 Foundations Jaewon Lee

2 Terminology Sender and Receiver Sender and Receiver Messages and Encryption Messages and Encryption Authentication, Integrity, and Nonrepudiation Authentication, Integrity, and Nonrepudiation Algorithms and Keys Algorithms and Keys Symmetric Algorithms Symmetric Algorithms Public-Key Algorithms Public-Key Algorithms Cryptanalysis Cryptanalysis Security of Algorithms Security of Algorithms

3 Encryption and Decryption Encryption E(M) = C Decryption D(C) = M PlaintextCiphertext Original Plaintext MCM D(E(M)) = M

4 Algorithms and Keys Cryptographic algorithm (cipher) Cryptographic algorithm (cipher) –restricted algorithm –public algorithm Key Key –large number of values in keyspace –encryption key and decryption key Encryption E K (M) = C Decryption D K (C) = M PlaintextCiphertext Original Plaintext Key MCM D K (E K (M)) = M

5 Symmetric Algorithms Conventional algorithm, secret-key algorithm, single-key algorithm Conventional algorithm, secret-key algorithm, single-key algorithm –security rests in the key –stream cipher and block cipher –fast vs. key management problem –e.g) DES, 3DES, IDEA, RC2, RC5 / RC4 Encryption E K (M) = C Decryption D K (C) = M PlaintextCiphertext Original Plaintext Key MCM D K (E K (M)) = M K

6 Public-Key Algorithms Asymmetric algorithm Asymmetric algorithm –encryption key and decryption key (public key and private key) –security rests in the difficult math. problem –slow, but efficient –e.g) RSA, ECC, ElGamal, DSA Encryption E K pub (M) = C Decryption D K prv (C) = M PlaintextCiphertext Original Plaintext Public KeyPrivate Key MCM D K prv (E K pub (M)) = M

7 Cryptanalysis Ciphertext-only attack Ciphertext-only attack –Given : C 1 = E k (P 1 ), C 2 =E k (P 2 ), … C i = E k (P i ) –Deduce : Either P 1, P 2, …P i ; k ; or an algorithm to infer P i+1 from C i+1 =E k (P i+1 ) Known-plaintext attack Known-plaintext attack –Given : P 1, C 1 = E k (P 1 ), P 2, C 2 =E k (P 2 ), … P i, C i = E k (P i ) –Deduce : Either k, or an algorithm to infer P i+1 from C i+1 =E k (P i+1 ) Chosen-plaintext attack Chosen-plaintext attack –Given : P 1, C 1 = E k (P 1 ), P 2, C 2 =E k (P 2 ), … P i, C i = E k (P i ), where the cryptanalyst gets to choose P 1, P 2, …, P i –Deduce : Either k, or an algorithm to infer P i+1 from C i+1 =E k (P i+1 ) Adaptive-chosen-plaintext attack Adaptive-chosen-plaintext attack

8 Cryptanalysis (cont’d) Chosen-ciphertext attack Chosen-ciphertext attack –Given : C 1, P 1 = D k (C 1 ), C 2, P 2 =D k (C 2 ), … C i, P i = D k (C i ), –Deduce : k Chosen-key attack Chosen-key attack Rubber-hose cryptanalysis Rubber-hose cryptanalysis

9 Evaluation of Algorithm Security Security –total break –global deduction –instance (or local) deduction –information deduction Complexity Complexity –data complexity –processing complexity –storage requirements

10 Steganography Hide secret messages in other messages, such that the secret’s very existence is concealed. Hide secret messages in other messages, such that the secret’s very existence is concealed. –invisible inks –tiny pin punctures –minute differences between handwritten characters –pencil marks on typewritten characters

11 Substitution Ciphers and Transposition Ciphers Substitution ciphers Substitution ciphers –simple substitution cipher (monoalphabetic) –homophonic substitution cipher –polygram substitution cipher –polyalphabetic substitution cipher Transposition ciphers Transposition ciphers –the order of characters is shuffled around Rotor machines Rotor machines –“ Enigma ” used by the Germans during World War II

12 Simple XOR XOR operations XOR operations –a  a = 0 –a  b = 1 –a  b  b = a Symmetric algorithm Symmetric algorithm –P  K = C –C  K = P

13 One-Time Pads Perfect encryption scheme Perfect encryption scheme –large nonrepeating set of truly random key letters –e.g) message : ONETIMEPAD pad : TBFRGFARFM ciphertext : IPKLPSFHGQ because O + T mod 26 = I N + B mod 26 = P E + F mod 26 = K etc.

14 Computer Algorithms DES (Data Encryption Standard) DES (Data Encryption Standard) –the most popular computer encryption algorithm –U.S. government gurantees RSA (Rivest, Shamir, and Adleman) RSA (Rivest, Shamir, and Adleman) –the most popular public-key algorithm –used for both encryption and digital signature DSA (Digital Signature Algorithm) DSA (Digital Signature Algorithm) –U.S standard digital signature algorithm –only for digital signautre

15 Large Numbers Physical Analogue Number Odds of being killed by lightning (per day) 1 in 9 billion (2 33 ) Odds of winning the top prize in a U.S. state lottery 1 in 4,000,000 (2 22 ) Odds of winning the top prize in a U.S. state lottery and being killed by lightning in the same day 1 in 2 55 Odds of drowning (in the U.S. per year) 1 in 59,000 (2 16 ) Odds of being killed in an automobile accident(in the U.S. in 1993) 1 in 6100 (2 13 ) Odds of being killed in an automobile accident(in the U.S. per lifetime) 1 in 88 (2 7 ) Time until the next ice age 14,000 (2 14 ) years Time until the sun goes nova 10 9 (2 30 ) years Age of the planet 10 9 (2 30 ) years Age of the Universe (2 34 ) years Number of atoms in the planet (2 170 ) Number of atoms in the sun (2 190 ) Number of atoms in the galaxy (2 223 ) Number of atoms in the Universe (dark matter excluded) (2 265 ) Volume of the Universe (2 280 ) cm 3 If the Universe is Closed: Total lifetime of the Universe (2 37 ) years (2 61 ) seconds If the Universe is Open: Time until low-mass stars cool off (2 47 ) years Time until planets detach from stars (2 50 ) years Time until stars detach from galaxies (2 64 ) years Time until orbits decay by gravitational radiation (2 67 ) years Time until black holes decay by the Hawking process (2 213 ) years Time until all matter is liquid at zero temperature (2 216 ) years Time until all matter decays to iron 10 10^26 years Time until all matter collapses to black holes 10 10^76 years