Lecture 2 Overview.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
Block Ciphers and the Data Encryption Standard
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Lec. 5 : History of Cryptologic Research II
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
TMK 264: COMPUTER SECURITY CHAPTER TWO: CRYPTOGRAPHY 1.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Cryptography.
Cryptography II Jagdish S. Gangolly School of Business
Presentation transcript:

Lecture 2 Overview

Cryptography Secret writing Encryption : encoding (encipher) Disguised data cannot be read, modified, or fabricated easily Feasibility of complexity for communicating parties Encryption : encoding (encipher) plaintext  cipher text C = E(c) (E = encryption rule) Decryption : decoding (decipher) Cipher text  plaintext P = D(c) (D = decryption rule) CS 450/650 – Lecture 2 Overview

Encryption Encryption Decryption Encryption Decryption Encryption plaintext Original ciphertext Keyless Encryption Decryption plaintext Original ciphertext Symmetric key Encryption Decryption plaintext Original ciphertext Asymmetric key CS 450/650 – Lecture 2 Overview

Symmetric Encryption System Secret Key Both sender and receiver share one key Encryption and decryptions algorithms are closely related N * (N-1) /2 keys are needed for N users to communicate in pairs Key must be kept secret CS 450/650 – Lecture 2 Overview

Asymmetric Encryption System Public Key One key must be kept secret, the other can be freely exposed – private key and public key Only the corresponding private key can decrypt what has been encrypted using the private key CS 450/650 – Lecture 2 Overview

Cryptanalysis How to break an encryption! Cryptanalyst Deduce the original meaning of the ciphertext Determine the decryption algorithm that matches the encryption one used Breakable Encryption! CS 450/650 – Lecture 2 Overview

Substitution Ciphers Substitute a character or a symbol for each character of the original message Caesar Cipher Ci = pi + 3 Permutation Alphabet is scrambled, each plaintext letter maps to a unique ciphertext letter Key can be used to control the permutation to be used CS 450/650 – Lecture 2 Overview

Cryptanalysis of substitution ciphers Clues Short words, Words with repeated patterns, Common initial and final letters, … Knowledge of language may simplify it English E, T, O, A occur far more than J, Q, X, Z Digrams, Trigrams, and other patterns Context CS 450/650 – Lecture 2 Overview

One-Time Pads One-Time Pad Vernam Cipher Book Ciphers Set of sheets of paper with keys, glued into a pad Pre-arranged charts (Vignere Tableau) Vernam Cipher random numbers Book Ciphers access to identical objects CS 450/650 – Lecture 2 Overview

Transposition Ciphers The order of letters is rearranged Columnar transposition cryptanalysis using digrams CS 450/650 – Lecture 2 Overview

CS 450/650 Fundamentals of Integrated Computer Security Lecture 3 Entropy CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from David Madison

fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc Exercise Decrypt the following encrypted quotation: fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc CS 450/650 – Lecture 3: Entropy

Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions ‘hide’ letters of plaintext Transposition scramble adjacent characters CS 450/650 – Lecture 3: Entropy

Entropy Shannon demonstrated mathematical methods of treating communication channels, bandwidth, and the effects of random noise on signals pi is the probability of a given message (or piece of information) n is the number of possible messages (or pieces of information) CS 450/650 – Lecture 3: Entropy

Example 1 Suppose there is only one possible signal H = -1 x log 1 = 0 i.e., n = 1, and p1 = 1 H = -1 x log 1 = 0 There is only one possible message that has a probability of 1 Since there is no uncertainty, the entropy in this case is zero CS 450/650 – Lecture 3: Entropy

Example 2 There are only two possible, equally probable, messages. H = -(0.5 log (0.5) + 0.5 log(0.5)) = - ( 0.5(-1)+0.5 (-1)) = 1 There are two possible equally probable messages, and the uncertainty (entropy) is 1 one bit can specify two possible conditions, i.e., 0 or 1 CS 450/650 – Lecture 3: Entropy

Example 3 There are 1024 (= 210) possible signals, all of equal probability (pi = 2-10). H = -(210 x 2-10 log(2-10)) = 10 There are 1024 equally probably possible messages, and the uncertainty (entropy) is 10 bits. CS 450/650 – Lecture 3: Entropy

Entropy Entropy gives an indication of the complexity, or randomness, of a message or a data set. Generally, signals or data sets with high entropy, Have a greater chance of a data transmission error Require greater bandwidth to transmit Have smaller capacity for compression Appear to have a greater degree of "disorder” CS 450/650 – Lecture 3: Entropy

Entropy English language (and most other human languages) have a relatively low entropy due to the frequency of certain characters the letters 'e' and 't‘ Information can be compressed using algorithms that "squeeze out" the redundancies in a message making the compressed version much smaller, and much more random Compressing a file twice doesn't reduce the size ! CS 450/650 – Lecture 3: Entropy

Entropy and Cryptography Through cryptography, we increase the uncertainty in the message for those who do not know the key Plaintext has an entropy of zero as there is no uncertainty about it. This class is CS 450 Encryption using one of x equally probable keys increases the entropy to x KBXT LWER ACMF OSJU CS 450/650 – Lecture 3: Entropy

Entropy and Cryptography With a perfect cipher “all keys are essentially equivalent” having an encrypted sample won't help the cryptanalyst do his or her job an encrypted message is similar to a signal that is buried in noise; the higher the noise level, the more difficult it is to extract the message A good cipher will make a message look like noise CS 450/650 – Lecture 3: Entropy

Entropy and Cryptography Encryption should "scramble" the original message to the maximum possible extent Algorithms should take a message through a sequence of substitutions and transpositions Shannon: “Encrypting a message will intentionally increase the message's entropy” CS 450/650 – Lecture 3: Entropy

Shannon Characteristics of ‘Good’ Ciphers “The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption” Hold off the interceptor for required time duration “The set of keys and enciphering algorithm should be free from complexity” There should not be restriction on choice of keys or types of plaintext “The implementation of the process should be as simple as possible” Hand implementation, software bugs CS 450/650 – Lecture 3: Entropy

Shannon Characteristics of ‘Good’ Ciphers “Errors in ciphering should not propagate and cause corruption of further information in the message” An error early in the process should not throw off the entire remaining cipher text “The size of the enciphered text should be no larger than the text of original message” A ciphertext that expands in size cannot possibly carry more information than the plaintext CS 450/650 – Lecture 3: Entropy

Trustworthy Encryption Systems Commercial grade encryption Based on sound mathematics Analyzed by competent experts Test of time DES: Data Encryption Standard RSA: River-Shamir-Adelman AES: Advanced Encryption Standard CS 450/650 – Lecture 3: Entropy

Stream and Block Ciphers Converts one symbol of plaintext into a symbol of ciphertex Block Encrypts a group of plaintext symbols as one block CS 450/650 – Lecture 3: Entropy

Confusion and Diffusion Has complex relation between plaintext, key, and ciphertext The interceptor should not be able to predict what will happen to ciphertext by changing one chatracter in plaintext Example Caesar Cipher One time pad CS 450/650 – Lecture 3: Entropy

Confusion and Diffusion Cipher should spread information from plaintext over entire ciphertext The interceptor should require access to much of ciphertext to infer algorithm Example Caesar Cipher One time pad CS 450/650 – Lecture 3: Entropy