Cryptology I.Definitions II.Substitution Ciphers III.Transpositions Ciphers IV.The DES Algorithm V.Public-Key Cryptology.

Slides:



Advertisements
Similar presentations
(ENCODING AND DECODING TECHNIQUES)
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Public Key Encryption Algorithm
1 Codes, Ciphers, and Cryptography-Ch 2.1 Michael A. Karls Ball State University.
Classical Cryptography
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Encryption Theory CSC380 – Flint Joasaint, Marcial White.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Network Security Chapter
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CS110: Computers and the Internet Encryption and Certificates.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
a connection between language and mathematics
Encryption Coursepak little bit in chap 10 of reed.
Information Systems Security
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Midterm Review Cryptography & Network Security
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Symmetric-Key Cryptography
Polyalphabetic CIPHERS Linguistics 484. Summary The idea How to recognize: index of coincidence How many alphabets: Kasiski.
1 Public-Key Cryptography and Message Authentication.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptography and the Web Lincoln Stein Whitehead Institute/MIT Center for Genome Research.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Mohammad Alauthman 6/12/2016© 2004 Dr. Khalid Kaabneh.2 CRYPTOLOGY Definition: Cryptology : from the Greek Crypto meaning secret.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Taehyung Kim HPC Lab. POSTECH
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Chapter 3:Cryptography (16M)
PART VII Security.
Presentation transcript:

Cryptology I.Definitions II.Substitution Ciphers III.Transpositions Ciphers IV.The DES Algorithm V.Public-Key Cryptology

Definitions code–thousands of words, phrases or symbols that form codewords that replace plaintext elements. cipher–a method of secret writing cryptography–art of devising ciphers cryptoanalysis–art of breaking ciphers cryptology–art of devising & breaking ciphers

Substitution Ciphers Monoalphabetic (26! possible ciphers) –Caesar cipher –Newspaper’s “Daily Cryptoquote” Polyalphabetic –Vigenere cipher –Playfair cipher

Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ |||||||||||||||||||||||||| DEFGHIJKLMNOPQRSTUVWXYZABC ATTACK AT DAWN would be encoded as DWWDFN DW GDZQ

Ark. Democrat Gazette, Dec. 3, 2001 Newspaper’s Daily Cryptoquote OGR MWRZNVMD YXMP GMC URRD M CQWUBX BY XNURZOQ MDK YZRRKBW.

Ark. Democrat Gazette, Dec. 3, 2001 Newspaper’s Daily Cryptoquote OGR MWRZNVMD YXMP GMC URRD M CQWUBX BY XNURZOQ MDK YZRRKBW. THE AMERICAN FLAG HAS BEEN A SYMBOL OF LIBERTY AND FREEDOM.

Percentages of the English Language Letters__ Diagrams__ Trigrams__ Words___ E13.05TH3.16THE4.72THE6.42 T9.02IN1.54ING1.42OF4.02 O8.21ER1.33AND1.13AND3.15 A7.81RE1.30ION1.00TO2.36 N7.28AN1.08ENT0.98A2.09 I6.77HE1.08FOR0.76IN1.77 R6.64AR1.02TIO0.75THAT1.25 S6.46EN1.02ERE0.69IS1.03 H5.85TI1.02HER0.68I0.94 D4.11TE0.98ATE0.66IT0.93 L3.60AT0.88VER0.63FOR0.77 C2.93ON0.84TER0.62AS0.76 F2.88HA0.84THA0.62WITH0.76 U2.77OU0.72ATI0.59WAS0.72 M2.62IT0.71HAT0.55HIS0.71 P2.15ES0.69ERS0.54HE0.71 Y1.51ST0.68HIS0.52BE0.63 W1.49OR0.68RES0.50NOT0.61 G1.39NT0.67ILL0.47BY0.57 B1.28HI0.66ARE0.46BUT0.56 V1.00EA0.64CON0.45HAVE0.55 K0.42VE0.64NCE0.45YOU0.55 X0.30CO0.59ALL0.44WHICH0.53 J0.23DE0.55EVE0.44ARE0.50 Q0.14RA0.55ITH0.44ON0.47 Z0.09RO0.55TED0.44OR0.45

Polyalphabetic Substitutions Use a different “alphabet” for each letter in the plaintext. Defeats attacks based upon common English frequency charts.

Vigenere Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ BCDEFGHIJKLMNOPQRSTUVWXYZA CDEFGHIJKLMNOPQRSTUVWXYZAB Key: COOKIEMONSTERCOOKIEMONSTER DEFGHIJKLMNOPQRSTUVWXYZABC Plaintext: ATTACKATDAWNPLEASE EFGHIJKLMNOPQRSTUVWXYZABCD FGHIJKLMNOPQRSTUVWXYZABCDE GHIJKLMNOPQRSTUVWXYZABCDEF 1. Use key letter to select row HIJKLMNOPQRSTUVWXYZABCDEFG 2. Use plaintext letter to select column IJKLMNOPQRSTUVWXYZABCDEFGH 3. Ciphertext letter is found at selected row & column JKLMNOPQRSTUVWXYZABCDEFGHI KLMNOPQRSTUVWXYZABCDEFGHIJ Ciphertext: CHHKKOMHQSPRGNSOCM LMNOPQRSTUVWXYZABCDEFGHIJK MNOPQRSTUVWXYZABCDEFGHIJKL NOPQRSTUVWXYZABCDEFGHIJKLM OPQRSTUVWXYZABCDEFGHIJKLMN PQRSTUVWXYZABCDEFGHIJKLMNO QRSTUVWXYZABCDEFGHIJKLMNOP RSTUVWXYZABCDEFGHIJKLMNOPQ STUVWXYZABCDEFGHIJKLMNOPQR TUVWXYZABCDEFGHIJKLMNOPQRS UVWXYZABCDEFGHIJKLMNOPQRST VWXYZABCDEFGHIJKLMNOPQRSTU WXYZABCDEFGHIJKLMNOPQRSTUV XYZABCDEFGHIJKLMNOPQRSTUVW YZABCDEFGHIJKLMNOPQRSTUVWX ZABCDEFGHIJKLMNOPQRSTUVWXY

Playfair Cipher 1)Group plaintext into pairs of letters. The letters ‘I’ and ‘J’ are considered to be the same letter. If any pair contains identical M B Q Z A letters insert a ‘Q’. If odd number of letters, add an ‘X’. D R G F S 2)If the 2 letters are in same row, take the pair of letters N H U E K to the right of the plaintext letters V T L W I 3)If the 2 letters are in the same column, take the pair of O X C P Y of letters below the plaintext letters. 4)If the 2 letters form the corners of a rectangle, Take the 2 letters at the opposite corners of the rectangle. The letter in the same row as the first plaintext letter is taken as the first cipher letter. Plaintext: Now is the time for all good men Grouped: NO WI ST HE TI ME FO RA LQ LG OQ OD ME NX Cipher: VM IV RI UK LV ZN DP SB CG CU CM MN ZN HO

Transposition Ciphers Railfence Transpositions Columnar Transpositions Double Transpositions

Railfence Transpositions Plaintext: IS THIS A GOOD CIPHER I I O I R Railfence: S H S G O C P E T A D H Ciphertext: IIOIRSHSGOCPETADH

Columnar Transpositions MEGABUCK PLEASETR Key determines number of columns. ANSFERON EMILLION Ciphertext is written using columns in DOLLARST alphabetical order of letters in key. OMYSWISS BANKACCO Ciphertext: AFLL SKSO SELA WAIA UNTSIXTWTOOS SCTCLNMO MANT ESIL YNTW OTWOABCDRNNT SOWDPAED OBUO ERIR ICXB

Double Transpositions POLITICSMONEY COMETOTHTTEDR Columns of first matrix are EAIDOFTHOFYMI entered into the second matrix. EPARTYAOAPC Columns of second matrix yield EEHHT the ciphertext. OT Plaintext: COME TO THE AID OF THE PARTY Ciphertext: DMPH TOAEO EYAH TFOET RICT

The DES Algorithm Data Encryption Standard was adopted by National Bureau of Standards in 1977 Plaintext is 1 st grouped into blocks of 64 bits 56-bit key 19 distinct stages –Initial key independent transposition –16 substitution steps using 56-bit key –Final 2 stages involve more transpositions Decryption uses same key with stages in reverse order

The DES Algorithm 56 bit key Initial Transposition Iteration 1 Iteration 2 Iteration bit swap Final Transposition 64 bit plaintext 64 bit ciphertext 32 bits L i-1 + f(R i-1,K i ) L i-1 R i-1 Detail of one iteration

The DES Algorithm IBM’s original design used 128 bits U.S. National Security Agency requested reduction to 56 bits Reason for change has not been made public Reasons for particular choices for iteration functions has remained secret as well Requires key distribution

The DES Algorithm DES has been replaced with Triple DES This newer version uses a 112-bit key. AES (Advanced Encryption Standard) According to the U.S. Commerce Department all federal departments must use AES by May 29, This should influence commercial use as well. AES was developed by Belgian researchers and is based upon a 128-bit key.

Public-Key Cryptography (The RSA algorithm * is most famous example.) Relationship between the plaintext and the ciphertext * Named for developers Rivest, Shamir, and Adleman.

Public-Key Cryptography Selecting a public key: 1) Select 2 distinct primes, p & q (preferably extremely large). 2) Form the product, n = p * q. 3) Compute  = (p-1) * (q-1). 4) Select any integer e, with the property that GCD(e,  ) = 1. The pair of integers, e and n, comprise the public key. Example: If p = 3 and q = 11, then n = 33 and  = 20. We could choose e = 7, since GCD(7,20) = 1. Thus, our public key would be the pair: e = 7 and n=33.

Public-Key Cryptography Selecting a private key: Using the value for e and  found earlier, find d such that (e*d) mod  = 1. The pair of integers, d and n, comprise the private key. Continuing previous example: Since e = 7 and  = 20, d must be 3 (7*3 mod 20 = 1). Thus, our private key would be the pair: d = 3 and n = 33.

Public-Key Cryptography Ciphertext is generated using: c = p e mod n. TextNumericp 7 c = p 7 mod 33 S19893,871,73913 U211,801,088,54121 N14105,413,50420 D416,38416 A111 Y256,103,515,62531 Ciphertext:

Public-Key Cryptography Plaintext is recovered using: p = c d mod n. Numericc 3 c = p 3 mod 33Text 132,19719S 219,26121U 208,00014N 164,0964D 111A 3129,79125Y Plaintext: SUNDAY

Public-Key Cryptography The security is dependent upon the difficulty of finding the prime factors of a very large integer. No efficient algorithm has yet been found. Factoring 200 digit integers requires 4.3*10 6 years. Factoring 300 digit integers requires 5.5*10 12 years. Factoring 500 digit integers requires 4.7*10 22 years. (Assumes a computer that uses 1 nanosecond per instruction.)

Public-Key Cryptography signatures –A encodes his personal ID using his private key –If B can decode the personal ID using A’s public key, then B knows that A sent message. C = E(ID,private_key A ) P = D(C, public_key A )

Public-Key Cryptography Encrypted signatures. (1)A encodes personal ID using A’s private key. (2)A encodes result using B’s public key. (3)Upon receipt, B decodes by first using B’s private key. (4)B then verifies signature by decoding using A’s public key. A’s steps: C = E( E(ID,private A ), public B ) ; Transmit C B’s steps: Receive C ; P = D( D(C,private B ), public A ) If P equals A’s ID then B is confident that message came from A; furthermore A is protected because only B can decode the message.

Public-Key Cryptography PGP (Pretty Good Privacy) –Uses Public-Key cryptography –Used by many to encrypt their and implement signatures –Inexpensive (free version available for personal use)

References The Codebreakers, by David Kahn, Excellent account of the history of cryptology with special emphasis during World War II Cryptanalysis for Microcomputers, by Caxton C. Foster, Codes, Ciphers, and Computers, by Bruce Bosworth, Computer Networks, Andrew Tanenbaum, Cryptology, NSF Chautauqua Program taught by Robert E. Lewand at Christian Brothers University in Memphis, TN on June 28-30, 1998.