Classical Encryption Techniques

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography and Network Security Chapter 2
Cryptography and Network Security Chapter 2. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts.
CSCE 790G: Computer Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2008CS 334: Computer Security1 Cryptography Well, a gentle intro to cryptography.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Fall 2006CS 395 Computer Security1 Cryptography Well, a gentle intro to cryptography.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Cis 4930 Introduction to cryptography
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security Chapter 2. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
CSCI-100 Introduction to Computing Privacy & Security Part II.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown [Changed by Somesh Jha]
Information Systems Security 3. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves,
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Scytale THIS IS A SCYTALE!!! SPARTA!!! One of the earliest encryption devices was the Spartan Scytale (c 500 B.C.) which consisted of a ribbon wrapped.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Conventional Encryption Message Confidentiality
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Part 2 By Dr. Shadi Masadeh
Communication Security
Cryptography and Network Security
Outline Some Basic Terminology Symmetric Encryption
Computer and Network Security
Conventional Encryption Message Confidentiality
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Information Security IT423
Presentation transcript:

Classical Encryption Techniques Two basic components in classical ciphers: substitution and transposition Substitution ciphers - letters replaced by other letters Transposition ciphers – same letters, but arranged in a different order These ciphers may be: Monoalphabetic - only one substitution / ransposition is used, or Polyalphabetic - where several substitutions / transpositions are used Several such ciphers may be concatenated together to form a product cipher Spring 2002 CS 332

The Caeser Cipher 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher First attested use in military affairs (e.g. Gallic Wars) Concept: replace each letter of the alphabet with another letter that is k letters after original letter Example: replace each letter by 3rd letter after L FDPH L VDZ L FRQTXHUHG I CAME I SAW I CONQUERED Spring 2002 CS 332

The Caeser Cipher Can describe this mapping (or translation alphabet) as: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC Spring 2002 CS 332

General Caesar Cipher Can use any shift from 1 to 25 I.e. replace each letter of message by a letter a fixed distance away Specify key letter as the letter a plaintext A maps to E.g. a key letter of F means A maps to F, B to G, ... Y to D, Z to E, I.e. shift letters by 5 places Hence have 26 (25 useful) ciphers Hence breaking this is easy. Just try all 25 keys one by one. Spring 2002 CS 332

Mathematics If we assign the letters of the alphabet the numbers from 0 to 25, then the Caesar cipher can be expressed mathematically as follows: For a fixed key k, and for each plaintext letter p, substitute the ciphertext letter C given by C = (p + k) mod(26) Decryption is equally simple: p = (C – k) mod (26) Spring 2002 CS 332

Cryptanalysis of the Caesar Cipher Only have 26 possible ciphers A maps to A,B,..Z Could simply try each in turn Called an exhaustive key search Given some ciphertext, just try every shift of letters: Spring 2002 CS 332

Mixed Monoalphabetic Cipher Rather than just shifting the alphabet, could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random ciphertext letter, or even to 26 arbitrary symbols Key is 26 letters long Spring 2002 CS 332

Security of Mixed Monoalphabetic Cipher With a key of length 26, now have a total of 26! ~ 4 x 1026 keys With so many keys, might think this is secure, but you’d be wrong Variations of the monoalphabetic substitution cipher were used in government and military affairs for many centuries into the middle ages The method of breaking it, frequency analysis was discovered by Arabic scientists All monoalphabetic ciphers are susceptible to this type of analysis Spring 2002 CS 332

Language Redundancy and Cryptanalysis Human languages are redundant Letters in a given language occur with different frequencies. Ex. In English, letter e occurs about 12.75% of time, while letter z occurs only 0.25% of time. In English the letters e is by far the most common letter T, r,n,i,o,a,s occur fairly often, the others are relatively rare W,b,v,k,x,q,j,z occur least often So, calculate frequencies of letters occurring in ciphertext and use this as a guide to guess at the letters. This greatly reduces the key space that needs to be searched. Spring 2002 CS 332

Language Redundancy and Cryptanalysis Tables of single, double, and triple letter frequencies are available Spring 2002 CS 332

Other Languages Natural languages all have varying letter frequencies Languages have different numbers of letters (cf. Norwegian) Can take sample text and count letter frequencies Seberry (1st Ed) text, Appendix A has counts for 20 languages. Hits most European & Japanese & Malay Spring 2002 CS 332

Performing Frequency Analysis Calculate letter frequencies for ciphertext being analyzed Compare counts/plots against known values In particular look for common peaks and troughs Peaks at: A-E-I spaced triple, NO pair, RST triple with U shape Troughs at: JK, X-Z Key concept - monoalphabetic substitution does not change relative letter frequencies Spring 2002 CS 332

Table of Common English Single, Double and Triple Letters Spring 2002 CS 332

Example with Caesar Cipher given "JXU WHUQJUIJ TYISELUHO EV COWUDUHQJYED YI JXQJ Q XKCQD UYDW SQD QBJUH XYI BYVU RO QBJUHYDW XYI QJJYJKTUI" A-E-I triple RST triple NO pair Spring 2002 CS 332

Transposition Ciphers Also known as permutation ciphers Core idea: hide the message by rearranging the letter order without altering the actual letters used Can recognize these since have the same frequency distribution as the original text Very Simple Example: Mirror Cipher (write message backwards). Obviously not very secure But what about mirror image in Russian?! Transposition Ciphers form the second basic building block of ciphers. The core idea is to rearrange the order of basic units (letters/bytes/bits) without altering their actual values. Spring 2002 CS 332

Scytale Cipher An early Greek transposition cipher a strip of paper was wound round a staff, then the message was written along staff in rows. When paper removed, were left with a strip of seemingly random letters. Not very secure as key was width of paper & staff Spring 2002 CS 332

Row Transposition Ciphers Group the message and shuffle letters within each group More formally write letters across rows, then reorder the columns before reading off the rows Always have an equivalent pair of keys (Read vs Write) Spring 2002 CS 332

Cracking Transposition Ciphers There are many more transposition ciphers of increasing complexity. Cracking them involves educated guessing at row and column arrangements with much trial and error BUT, there is software that will do a lot of this stuff for you (and it’s out there and freely available) Bottom line, transposition ciphers are no more secure than pure substitution ciphers. (With the exception of the one-time pad, of course). Spring 2002 CS 332

Increasing Cipher Security Ciphers based on just substitutions or transpositions are not secure Have seen how these can be attacked because they do not sufficiently obscure the underlying language structure Hence consider using several ciphers in succession to make cryptanalysis harder, but: two substitutions are really only one more complex substitution two transpositions are really only one more complex transposition BUT a substitution followed by a transposition makes a new much harder cipher Spring 2002 CS 332

Steganography an alternative to encryption hides existence of message using only a subset of letters/words in a longer message marked in some way using invisible ink hiding in LSB in graphic image or sound file has drawbacks high overhead to hide relatively few info bits Spring 2002 CS 332