Cryptography encryption authentication digital signatures

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
RSA.
1 Cryptosystems When defining a cryptosystem, details must be given of: The alphabets M and C the keyspace K and how keys are to be chosen The encryption.
1 Pretty Good Privacy (PGP) Security for Electronic .
Public Key Cryptosystem
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
25 seconds left…...
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
390 Codes, Ciphers, and Cryptography
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CIT 380: Securing Computer Systems
Chapter 2 Basic Encryption and Decryption
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography.
Basic of Modern Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography encryption authentication digital signatures one-way functions hash algorithms key generation, exchange and management

Encryption Transforming a message - the plaintext, into an unrecognisable (encrypted) form, called the ciphertext. To the layman this is known as coding and decoding messages. The proper terms are encrypting and decrypting.

The intention is that if an encrypted message is intercepted, then the interceptor will not be able to interpret the ciphertext. Messages have been encrypted for many years using letter substitution for example. These days mathematical algorithms are used to encrypt and decrypt messages using computers.

Caesar’s Cipher To encrypt a message written using the English alphabet A..Z Each letter in the plaintext message is replaced by the letter k places along in the alphabet (where k is between 0 and 25 inclusive) wrapping around to the beginning of the alphabet if necessary. To decrypt the message, each letter is replaced by the letter 26-k places along.

Caesar’s cipher with k=5

Substitution cipher

Substitution cipher 2 (using Brighton Rock)

The Key One of the reasons for enciphering this text is to show the reader how easily this type of cipher can be broken…...

Definitions The sender A (Alice) wants to send a message m (the plaintext) to a receiver B (Bob). Alice encrypts the message using an encryption key e and an encryption algorithm f to produce a ciphertext c=f(m,e) To decrypt the ciphertext c, Bob uses his decryption key d and a decryption algorithm g to obtain the original message m=g(c,d)

A property of the encryption process must be that Bob retrieves the original message. Thus for a particular pair of keys e,d, it must be true that for every m in M, if m encrypts to c, then c decrypts to m. Hence for every m in M: if c=f(m,e) then m=g(c,d) or g(f(m,e),d)=m

Alice keeps the encryption key e secret and Bob keeps the decryption key d secret. Alice and Bob may know each others keys (this is true for symmetric key algorithms) or they might not (in public key cryptosystems). If the message is very long it might be broken up into shorter blocks. Each block is then encrypted and decrypted separately.

The characters of the message come from a message alphabet M and the ciphertext will be characters of the ciphertext alphabet C The two alphabets M and C may be the same but they could be different. A cryptosystem refers to all the aspects of a particular encryption system, so includes the information about the message and ciphertext alphabets, the encryption and decryption algorithms, the method of blocking and the allowable keys.

The keyspace K is the set of all possible encryption keys The keyspace K is the set of all possible encryption keys. We usually include the trivial keys in the key space even though they will not be used. The enemy in the cryptosystem is the person who intercepts the message and tries to gain unauthorised information. Such a person is called a cryptanalyst and is usually given the name Charles. A cryptographer is someone who studies all aspects of cryptosystems.

What Charles might try to do: Determine the message without determining either key Determine the decryption key so that he can decrypt the message (and other messages encrypted using the same encryption key) Determine the encryption key so that he can determine the decryption key Determine the encryption key so that he can masquerade as Alice

When considering the security of an encryption algorithm, it is best to assume that Charles, the enemy, has knowledge of the encryption and decryption algorithms, the key space and the methods of blocking. In fact assume that Charles knows everything except the keys used. Also assume that Charles has adequate computing power, finance and expertise on his side.

Attacks on a cryptosystem We always assume that Charles has all the information on a particular cryptosystem except for the keys used. What sort of attack he can launch depends on what other information he has. Types of attack are called:

Types of attack: ciphertext only known message probable known message chosen message chosen ciphertext chosen message and ciphertext

Methods of Attack The cryptanalyst has various strategies that he can use. Following are brief explanations of three of them:

1. Try all possible decryption keys The success of this will depend on the size of the keyspace the redundancy in the message How long it takes to recover the key depends on the number of keys how long it takes to investigate each key

2. Analyse the ciphertext statistically For example, if the cryptosystem uses a substitution cipher on an English text message, a frequency count on the letters of the ciphertext will give an indication of the substitutions used for the most commonly used letters. Redundancy in the English language will give away the rest of the key.

Blocking the message into groups of say 8 characters makes this kind of attack much harder. For example, the ciphertext G QT Q TQZ can be decrypted quite easily However, a similar message (encrypted with a different key and blocked together) is SRYSRSP which isn’t quite so easy to decrypt.

3. Differential Cryptanalysis This method requires Charles to generate a large number of messages which only differ by a small amount, persuading Alice to encrypt them, and then analysing the corresponding ciphertexts.

Properties of a good cryptosystem A large alphabet M to make it hard to do statistical analysis A large keyspace to make it hard to do exhaustive keyspace search Speed of execution (for high message throughput) The same algorithm for encryption and decryption (to reduce costs)