1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Principles of Information Security, 2nd edition1 Cryptography.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Introduction (Pendahuluan)  Information Security  Criptography.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Computer and Data Security 4th Class
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Chapter 3:Cryptography (16M)
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م

References : 1- Theory and problems of Discrete mathematics, by Seymour Lipschutz & Marc Lars Lipson, Schaum’s Outline Series, third edition 2007 2- DISCRETE STRUCTURES, AMIN WITNO, Revision Notes and Problems 2006, www.witno.com 3- Discrete mathematics for New technology, Rowan Garnier & John Taylor (Second Edition 2002) 4- Discrete mathematical structures for computer science by Bernard Kolman & Robert C. Busby 5- http://www.math.uvic.ca/faculty/gmacgill/guide 6- http://rutherglen.ics.mq.edu.au/wchen/lndmfolder/lndm.html - 7- http://en.wikibooks.org/wiki/Discrete_mathematics/Set_theory

Syllabus 1- Fundamental of Computer Security • Computer Security Definition • Objective of Computer Security • Kinds of Security Breaches 2- Cryptography • Cryptographic Terminology • Substitution Cipher - Monoalphabetic - Homophonic - Polyalphabetic - Polygram • Transposition Cipher - Fixed Period - Columnar

Syllabus 3-Cryptanalysis • Symmetric Cryptography ( classical cipher system ) • Asymmetric Cryptography 4- Information Hiding 5- User Authentication 6- Malicious Code - Virus - Trojan Hours - Worm 7- Network Security

COMPUTER AND NETWORK SECURITY INTRODUCTION: Cryptograph: Is the science and study of secret writing. Cipher: Is a secret method of writing. Where by plaintext (or clear text) is transformed in to ciphertext (cryptogram). Encipherment (encryption): The process of transforming plaintext in to ciphertext. Decipherment(Decryption): Is the reverse process of encipherment,of transforming ciphertext into plaintext. Cryptanalysis: The art and science of breaking ciphertext.

Types of Key-based algorithems : 1- Symmetric algorithms (privet key):- are algorithms where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same. Symmetric algorithms can be divided in to two categories: Stream cipher: which operator on the plaintext a single bit at a time. Block cipher: which operator on the plaintext in a group of bits called blocks at a time. 2- Asymmetric algorithms (public key):- Are designed so that the key used for encryption is different from the key used from decryption and cant'nt easily calculated from each others.

Encryption and Decryption symmetric Process Encipher plaintext Key ciphertext Decipher Figure -1 Encryption and Decryption symmetric Process K1 Encipher plaintext ciphertext Decipher K2 Figure -2 Encryption and Decryption Asymmetric Process

Cryptography classification Cryptology Figure-3 Cryptography classification Cryptography Cryptanalysis Asymmetric Symmetric Block cipher Stream cipher Block cipher Cipher system Modern Conventional Figure-4 Cipher system classification Asymmetric Symmetric Block cipher Stream cipher Block cipher

CLASSICAL CIPHER SYSTEMS Classical ciphers have been used since ancient Egypt to exchange classified messages between authorized persons. Since then, different methods and techniques are used in order to increase security level of such information. Most of theses methods and techniques are based on the idea that each natural language has its own distribution characteristics. The encryption process aims to uniformly flatten the statistical characteristics of language and obscure any correlation and dependencies between plaintext and ciphertext by diffusion and confusion. Cryptographic systems have been classified into two systems: Symmetric (one-key) cryptosystems: In symmetric or one-key systems, the enciphering and deciphering key are the same. Asymmetric ( two-key) cryptosystem: In asymmetric or two-key systems, enciphering and deciphering keys are different in such away that at least one key is computationally infeasible to determine from the other.

1- TRNSPOSITION CIPHERS: Transposition ciphers rearrange characters according to some scheme. This is done classically by some geometric figure, the figure is 2-dimentional array, and often called "permutation". Example: Encrypt the word “RENAISSANCE" using 3x4 figure, using [2 4 1 3] scheme. 1 2 3 4 Ciphertext: ESCAARINNSE. Many transposition ciphers permute characters of the plaintext with fixed period d. let Zd be the integers 1….d, and f : Zd → Zd be a permutation over Zd, then successive blocks of d characters are encrypted by permuting the characters according to f. M = m1 …md,md+1,…...m2d,…..is encrypted as Ek(M) = mf(1)….mf(d), md+f(1) … md+f(d) R E N A I S C

1- TRNSPOSITION CIPHERS: Example: suppose d = 4 and fE =[ 2 4 1 3] and FD = [ 3 1 4 2] ,thus: I 1 2 3 4 F(i) M = RENA ISSA NCE Ex(M) = EARN SAIS CNE Dx(C) = RENA ISSA NCE

SIMPLE SUBSTITUTION CIPHERS: In simple substitution (or mono alphabetic) ciphers, each character of the plaintext replaced with a corresponding character of ciphertext. A single one-to-one mapping function (f) from plaintext to ciphertext character is used to encrypt the entire message using the same key (k); such that: Ek(M) = F(m1) F(m2) … ..F(mN) =C Where: N : is the length of the message. M : is plaintext message given by M = ( m1, m2, … ..,mN). C : is ciphertext message given by C = (c1,c2,… .., cN). There are many types of simple substitution ciphers according to its equations used to encryption, they: Shifted alphabet (Caesar cipher): F(a) = (a + k) mod n Where k : is the number of positions to be shifted. a : is a single character of the alphabet> n : is the size of the alphabet.

SIMPLE SUBSTITUTION CIPHERS: Example: If k =3 then we can encrypt the following message as: M = R E N A I S S A N C E Ek(M) = U H Q D L V V D Q F H