Lec. 5 : History of Cryptologic Research II

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptography and Network Security Chapter 3
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
Classical Cryptography
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Review What is security: history and definition Security policy, mechanisms and services Security models.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
CSCI 5857: Encoding and Encryption
Introduction to Information Security Chapter II : Classical Ciphers.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Computer and Network Security Rabie A. Ramadan Lecture 3.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
@Yuan Xue Quick Review.
Chapter 2 Basic Encryption and Decryption
CH15 –Security & Crypto.
Confusion and Diffusion
Presentation transcript:

Lec. 5 : History of Cryptologic Research II When and how long it was begun? Why?

Hill Cipher eK(x) : (y1,y2,…,ym) =(x1,x2,…,xm) K where K is m x m matrix and gcd(det K, 26) =1 dK(y) = y K-1 (Ex) K = 11 8 K-1 = 7 18 3 7 23 11 x : july, (j,u)= (9,20), (l,y) = (11,24) (9,20) K = (3,4) = (D,E), (11,24) K = (11,22) = (L,W)

Monoalphabetic Substitution Ciphers Example : 1-1 Substitution rule Example : Encryption Key space : 26! Cryptanalysis: Using English character frequency analysis…

Homophonic Substitution Ciphers Letters which occur frequently may be mapped into more than one letter in the ciphertext to flatten the frequency distribution. Alphabet is mapped into the numbers 0 to 99 For example, E(12.7%)  17, 19, 23, 47, 64 A(8.2%)  8, 20, 25, 49 R(6.0%)  1, 29, 65 T(9.1%)  16, 31, 85, 87

Polyalphabetic Substitution Ciphers Hide the frequency distribution by making multiple substitutions. Apply d different permutations. Vigenere cipher Beauford cipher

Polyalphabetic Substitution Ciphers Vigenère Ciphers Multiple Caesar cipher Beauford ciphers (used in US civil war)

Vigenère Ciphers M S u V E r G A X K I P W B J U L N R Z T C Y e c s t Plaintext Keyword Ciphertext M S u V E r G A X K I P W B J U L N R Z T C Y e c s t o n i m y p h

One-time Pad (Vernam cipher) Use a random key as long as the message size and use the key only once Unbreakable Since ciphertext bears no statistical relationship to the plaintext Since for any plaintext & any ciphertext there exists a key mapping one to other Have the problem of safe distribution of key Ex) Binary alphabet P : o n e t i P’: 01101111 01101110 01100101 01110100 01101001 K : 01011100 01010001 11100000 01101001 01111010 C : 00110011 00111111 10000101 00011101 00010011 Perfect Cipher : p (x|y) = p(x) for all x  P, y  C Impossible COA

3. Transposition Ciphers Scytale cipher Rotor machines

Transposition Ciphers Encryption permutation Decryption permutation Rearrange characters of plaintext to produce ciphertext Frequency distribution of the characters is not changed by encryption Example: Encryption permutation Decryption permutation 1 2 3 4 5 6 1 2 3 4 5 6 i n f o r m a t s e c u y x z b F R I M O N A S T U E C Y B Z X plaintext ciphertext

Transposition Ciphers Cryptanalysis : Period d is guessed by trying possible periods A knowledge of the most frequent pairs and triples in a language is used with anagramming. Use language characteristics Frequent pairs on a relative scale to 10 TH : 10.00, HE : 9.50, IN : 7.17, ER : 6.65, RE : 5.92 Frequent triples on a relative scale to 10 THE : 10.00, AND : 2.81, TIO : 2.24, ATI : 1.67 Exercise: decrypt the following ciphertext LDWEOHETTHSESTRUHTELOBSEDEFEIVNT

4. Product Ciphers Shannon SP Network

Shannon’s Proposal C. Shannon, “Communication Theory for Secrecy Systems”, 1949 Compose different kind of simple and insecure ciphers to create complex and secure cryptosystems  called “product cipher” Incorporate confusion and diffusion Substitution-Permutation Network http://www.bell-labs.com/news/2001/february/26/1.html http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html Claude Shannon

Confusion and Diffusion Confusion (substitution) : The ciphertext statistics should depend on the plaintext statistics in a manner too complicated to be exploited by the enemy cryptanalyst Makes relationship between ciphertext and key as complex as possible Diffusion (permutation) : Each digit of the plaintext should influence many digits of the ciphertext, and/or Each digit of the secret key should influence many digits of the the ciphertext. Dissipates statistical structure of plaintext over bulk of ciphertext

SP Network Substitution-Permutation network Substitution (S-box) : secret key is used Permutation (P-box) : no secret key, fixed topology Provide confusion and diffusion S-P networks are expected to have Avalanche property: a single input bit change should force the complementation of approximately half of the output bits Completeness property: each output bit should be a complex function of every input bits Theoretical basis of modern block ciphers

SP Network

Kerckhoff’s Principle Auguste Kerckhoff, 1883 A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. Eric Raymond extends this principle in support of open source software, saying "Any security software design that doesn't assume the enemy possesses the source code is already untrustworthy; therefore, never trust closed source”. The majority of civilian cryptography makes use of publicly-known algorithms. By contrast, ciphers used to protect classified government or military information are often kept secret