Section 3.6: An Introduction to Cryptography

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Math for Liberal Studies.  When we studied ID numbers, we found that many of these systems use remainders to compute the check digits  Remainders have.
Chapter 4 Systems of Linear Equations; Matrices
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Lecture 1 Overview.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Cryptography Week-6.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MAT 1000 Mathematics in Today's World Winter 2015.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Encryption: A Brief History Author: Margery Waldron.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
Categories of Ciphers Substitution ciphers - replace letters in the plaintext with other letters or symbols, keeping the order in which the symbols fall.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Governor’s School for the Sciences Mathematics Day 5.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
BY J.STEPHY GRAFF IIMSC(C.S). 1.Inroduction 2.What is a columnar transposition? 3. Methods of Transposition 4.Colunmar transposition ciphers 5.Double.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Learning Objectives for Section 4.5 Inverse of a Square Matrix
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Substitution Ciphers.
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
CS4780 Cryptography and Information Security
Cryptography.
Topic 3: Data Encryption.
Encryption and Decryption
Simple Encryption- Lesson 5
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Section 3.6: An Introduction to Cryptography Math for Liberal Studies Section 3.6: An Introduction to Cryptography

Adding Security to Messages How do we protect the security of the messages we send? This is a very important issue in the information age Consider the number of times you send information you hope is secure: text messaging e-mail online shopping etc.

Prevention: Not an Option It is largely impossible to prevent messages from being intercepted Since we can’t keep people from reading our messages, we should try to disguise them so that the messages only make sense to the intended recipient This process is called “encryption”

Encryption: Systems are Key Whenever we encrypt a message, it is vital that we do it systematically Both you and the person you want to send the message to agree on a secret system Many systems are based on a keyword or phrase that is only known to a select few

Ciphers and Cryptography Cryptography is the study of processes by which information is disguised so that unintended recipients cannot understand it A cipher is a reversible rule for disguising a message There are many different ciphers, and we will learn about a few in this section

Encryption and Decryption Encryption is the process of disguising the message Decryption is the reverse process We want ciphers that are simple enough to use regularly, but complex enough so that the messages cannot be easily decrypted by someone who does not know the rule

Reversibility It is vital that the cipher be a reversible rule, otherwise the message cannot be undisguised There is no point in encrypting a message if no one can ever recover the original message

The Caesar Cipher One of the simplest ciphers is called the Caesar cipher This method is named after Julius Caesar (100 – 44 BCE) who used it to communicate with his generals

The Caesar Cipher Take the letters of your message and change them according to this rule: Each letter is replaced by the letter that is three places later in the alphabet

The Caesar Cipher What happens when we get to the end of the alphabet?

The Caesar Cipher What happens when we get to the end of the alphabet? We simply wrap around back to the beginning

An Example Let’s encode the message “Attack at daybreak”

An Example We will typically omit spaces and other punctuation when we encode messages Knowing the lengths of the words in our message could give the enemy a clue to the contents of our message

An Example However, to make the message more readable, we will often split the message into “blocks” of equal length This time we’ll use blocks of length 4 Our encoded message becomes “DWWD FNDW GDBE UHDN”

An Example Our encoded message becomes “DWWD FNDW GDBE UHDN” To decode the message, we simply go backwards 3 steps in the alphabet We may have to wrap around back to the end of the alphabet

Another Example This message was encoded using the Caesar cipher: “DOOZR UNDQG QRSOD BPDNH VMDFN DGXOO ERB”

Substitution Ciphers The Caesar cipher is an example of a substitution cipher Each letter of the message is replaced by another letter according to a consistent rule The cryptoquote puzzle in the newspaper is another example of a substitution cipher

Shift Ciphers The Caesar cipher is also an example of a shift cipher The rule for substituting letters involving shifting forward or backward in the alphabet Another example of a shift cipher is the ROT13 cipher: the rule for this cipher is to shift 13 places forward in the alphabet

Breaking Substitution Ciphers Substitution ciphers have a big weakness The rule for substituting letters is always the same throughout the entire message This makes encoding messages relatively easy, but messages can be deciphered if they are long enough

Breaking Substitution Ciphers One method that can be used to break these ciphers is frequency analysis The most common letters in English are E, A, and T Using trial and error it is possible to decode messages by replacing the most common letters with E, A, or T

A New Method: Bifid Cipher The main problem with substitution ciphers is that the order of the letters does not change More advanced ciphers can involve rearranging letters to try to avoid this problem

A New Method: Bifid Cipher The bifid cipher uses a device called a Polybius square We will fill the alphabet into this grid Notice there are only 25 spaces; we will replace all the J’s in our message with I

A New Method: Bifid Cipher We could fill in the alphabet in order…

A New Method: Bifid Cipher …or we can create a square based on a keyword We start by filling in the letters of the keyword across the rows, leaving out duplicates Let’s use the keyword “CONFIDENTIAL”

A New Method: Bifid Cipher Fill in the letters of the keyword “CONFIDENTIAL”

A New Method: Bifid Cipher Fill in the letters of the keyword “CONFIDENTIAL” Then fill in the rest of the alphabet, again going across the rows and never duplicating a letter

A New Method: Bifid Cipher Now let’s use this square to encode a short message: “RETREAT” As we will see, the bifid cipher requires messages to have an even number of letters Since “RETREAT” has 7 letters, we will add a dummy character to the end

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row Column

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 Column 3

A New Method: Bifid Cipher Now we “look up” each letter of our message in the table Letter R E T A X Row 4 2 5 Column 3

A New Method: Bifid Cipher Next, we group the numbers in pairs reading across from left to right Letter R E T A X Row 4 2 5 Column 3

A New Method: Bifid Cipher Next, we group the numbers in pairs reading across from left to right 4 2 5 3

A New Method: Bifid Cipher Next, we group the numbers in pairs reading across from left to right 4 2 5 3

A New Method: Bifid Cipher Next, we group the numbers in pairs reading across from left to right 4 2 5 3

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E W

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E W G

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E W G H

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E W G H

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square 4 2 5 3 Q A E W G H

A New Method: Bifid Cipher Now we look up these new pairs of numbers in our Polybius square So our encoded message is “QAEWGHAH” 4 2 5 3 Q A E W G H

A New Method: Bifid Cipher To decode a message, simply reverse this process Look up each letter in the Polybius square, writing down the row, then the column (but write the numbers from left to right) Then split the message in half and put the second half below the first half Finally, decode the message by lookup up each letter in the Polybius square

Decoding Bifid The message “SAWA BTBK KSTV LAAA” was encoded with the bifid cipher using a Polybius square based on the keyword “Schwarzenegger” Decode the message

Decoding Bifid Message: SAWA BTBK KSTV LAAA Keyword: Schwarzenegger First we check to make sure that the message has an even number of letters, which it does (16) Then we create our Polybius square

Decoding Bifid S A W B T K V L 11 15 14 31 51 35 53 41

Decoding Bifid S A W B T K V L 11 15 14 31 51 35 53 41

Decoding Bifid 11 15 14 31 51 35 53 41

Decoding Bifid 11 15 14 31 51 35 53 41

Decoding Bifid 1 5 4 3

Decoding Bifid 1 5 4 3 H A S T L V I B Y