CIS 5371 Cryptography Introduction.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Computer Security CS 426 Lecture 3
Classical Encryption Techniques
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lectures so far: Today’s lecture: Discrete probability Proving things
Intro to Cryptography Lesson Introduction
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Instructor: Dania Alomar
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Cryptography Lecture 3.
Topic 3: Perfect Secrecy
Cryptography Lecture 3.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CIS 5371 Cryptography Introduction

Prerequisites for this course Basic Mathematics, in particular Number Theory Basic Probability Theory Problem solving skills Programming skills (for projects)

Goals for the Introduction Discuss the effectiveness & practicality of crypto. Discuss the foundations of crypto. Establish a mindset for developing crypto systems for Information Assurance.

Cryptography vs Modern Cryptography Pre 1970: The art of writing or solving codes Post 1980: The science/technology of developing techniques for securing digital information digital transactions and distributed computations Usage: Pre 1970: military, diplomatic services, intelligence. Post 1980: most of us

Modern Cryptography Message Authentication, digital signatures Secret Key exchange/distribution Authentication protocols (for secure access) e-commerce, e-government, e-auctions, e-voting and other e-applications. Digital cash Support system security . . . and more

The setting for Private Key encryption

The syntax of encryption A key generation algorithm Gen: A probabilistic algorithm that outputs a key k according to some distribution. An encryption algorithm Enc Takes as input a key k and a plaintext m and outputs a ciphertext c: c = Enck(m). A decryption algorithm Dec Takes as input a key k and a ciphertext c and outputs a plaintext m’: m’ = Deck(c). Must have m’ = m.

Kerckhoffs’ principle “The cipher method must not be required to be secret, and it must be able to fall into the hands of the enemy without inconvenience.’’ Todays understanding Security should not rely on the secrecy of the algorithms being used---indeed these algorithms should be public. Open crypto design vs “security by obscurity”.

Attack Scenarios Ciphertext-only attack (passive) Known-plaintext attacks (passive) Chosen-plaintext attack (active-adaptive) Chosen-ciphertext attack (active-adaptive) Different applications of encryption may require the encryption scheme to be resilient to different types of attack.

Historical Ciphers and their Cryptanalysis Ceasar’s cipher a shift cipher that rotates letters Mono-alphabetic substitution uses a permutation of the alphabet, many more keys Vigenere’s poly-alphabetic shift cipher Multiple shift ciphers using a word. Cryptanalysis based on statistical pattern of the English language: the frequency of letters, digrams etc.

Basic principles of Modern Cryptography Formulation of exact definitions Importance of design Importance of usage Importance of study

Basic principles of Modern Cryptography Examples for Principal 1 --- Answers An encryption scheme is secure if no adversary can find the secret key when given a ciphertext. An encryption scheme is secure if no adversary can find the plaintext that corresponds to a given ciphertext. An encryption scheme is secure if no adversary can determine any character of the plaintext that corresponds to the ciphertext.

Basic principles of Modern Cryptography Final answer An encryption scheme is secure if no adversary can determine any meaningful information about the plaintext from the ciphertext. What is considered to be a break? What is assumed to be the power of the adversary? A first definition of security: A cryptographic scheme for a given task is secure if no adversary of a specified power (e.g., an “efficient adversary”) can achieve a specific break.

Basic principles of Modern Cryptography Mathematics and the real world --- models If a mathematical definition does not model appropriately the real world problem then the definition may be useless --- e.g., the adversarial power may be to week, or the break may not may not be foreseen. Our arguments Appeal to intuition Proof of equivalence Examples

Basic principles of Modern Cryptography Reliance on precise assumptions Validation of the assumption By there very nature assumptions/statements are not proven but conjectured . . . Comparison of schemes If one scheme makes a weaker assumption than another then the first is to be preferred . . . Facilitation of proofs of security If the security of a scheme cannot be proven unconditionally and must rely on an assumption then a mathematical proof that the construction is secure requires a precise definition of the statement.

Basic principles of Modern Cryptography Rigorous Proofs of security Reductionist approach: “Given assumption X is true, construction Y is secure according to the given definition.”