Introduction to Information Security Chapter II : Classical Ciphers.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Classical Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Review What is security: history and definition Security policy, mechanisms and services Security models.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Cis 4930 Introduction to cryptography
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Introduction to Information Security Lecture 2: Quick Overview on Information Security
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecturer in Mogadishu University and University of Somalia
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue Quick Review.
A Summary in Fifteen Minutes mas y menos
Substitution Ciphers.
Communication Security
Cryptography and Network Security
Cryptography CS Principles January 19, 2017.
Computer and Data Security 4th Class
Chapter 3:Cryptography (16M)
Traditional Symmetric-Key Ciphers
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Introduction to Information Security Chapter II : Classical Ciphers

2 1.History of cryptographic research 2.Substitution ciphers Caesar ciphers Affine ciphers Monoalphabetic substitution cipher Homophonic substitution cipher Polyalphabetic substitution cipher Vigenere cipher Hill cipher One-time pad 3.Transposition ciphers Transposition cipher scytale cipher 4.Product ciphers Contents

3 Lec. 4 : History of Cryptologic Research When and how long it was begun? Why?

4 1900BC : Non-standard hieroglyphics 1500BC : Mesopotamian pottery glazes 50BC : Caesar cipher 1518 : Trithemius’ cipher book 1558 : Keys invented 1583 : Vigenere’s book 1790 : Jefferson wheel 1854 : Playfair cipher 1857 : Beaufort’s cipher 1917 : Friedman’s Riverbank Labs 1917 : Vernam one-time pads History of Cryptologic Research

: Hegelin machines 1921 : Hebern machines 1929 : Hill cipher 1973 : Feistel networks 1976 : Public key cryptography 1979 : Secret sharing 1985 : Zero knowledge 1990 : Differential cryptanalysis 1994 : Linear cryptanalysis 1997 : Triple-DES 1998 ~ 2001 : AES History of Cryptologic Research Modern Cryptography

6 History of Cryptologic Research Period Manual Crypto Machine Crypto Modern Crypto Computer Crypto Features Examples ancient ~ ~ 1950 Substitution Transposition Using complex machine Using computer Shannon ’ s theory Scytale, Caesar, Vigenere, Beaufort (USA) Enigma (Germany in 2 nd WW) M-209 (USA in 2 nd WW) DES, SEED, AES RSA, ECC, KCDSA 1950 ~ current

7  Before modern crypto : limited usage –National security, diplomatic, war –Used by limited people –Researched by limited people  Current crypto : widely open, standardized, commerce –Internet, e-commerce –Anybody is using –Research and development by anyone Using Cryptologic Technology

8 Scytale as bc cy dt ea fl ge asas bcbc cycy dtdt eaea flfl gege

9 Enigma(German) vs. Purple

10 Lorenz SZ42 Cipher Machine

11 Classical Encryption Techniques  Basic building blocks of all encryption techniques  Substitution: replacement  Transposition: relocation  Substitution ciphers  Caesar cipher  Monoalphabetic ciphers  Playfair cipher  Hill cipher  Polyalphabetic ciphers: Vigenere cipher  Vernam cipher/One-time pad: perfect cipher  Transposition techniques  Rotor machines: Enigma, Purple

12 2. Substitution Cipher Caesar ciphers Affine ciphers Hill cipher Monoalphabetic substitution cipher Homophonic substitution cipher Polyalphabetic substitution cipher Vigenere cipher One-time pad

13 Caesar Ciphers C = E K (M) = M + K mod 26 K = 3 M = D K (C) = C - K mod 26 K = 3 Mathematically assign numbers to each alphabet Caesar cipher : Julius Caesar, the Roman emperor Also known as shift cipher

14 Caesar Ciphers Define transformation as: Encryption example Weakness Key space is too short – only 26 possible keys Brute force search Example: Break ciphertext “L ORYH LFX"

15 Affine Ciphers Generalization of Caesar cipher Encryption Decryption Example: decrypt the following ciphertext WZDUY ZZYQB OTHTX ZDNZD KWQHI BYQBP WZDUY ZXZDSS How? Using English character frequency analysis…

16 Letter Frequency(%) Letter Frequency(%) Letter Frequency(%) e 12.7 d 4.3 p 1.9 t 9.1 l 4.0 b 1.5 a 8.2 c 2.8 v 1.0 o 7.5 u 2.8 k 0.8 i 7.0 m 2.4 j 0.2 n 6.7 w 2.3 x 0.1 s 6.3 f 2.2 q 0.1 h 6.1 g 2.0 z 0.1 r 6.0 y 2.0 (1) Pr(e)=0.12, (2) Pr(t,a,o,i,n,s,h,r) = 0.06 ~0.09 (3) Pr(d,l)=0.04 (4) Pr(c,u,m,w,f,g,y,p,b)= 0.015~0.023 (5) Pr(v,k,j,x,q,z) <=0.01 English Character Frequencies