CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Cryptography encryption authentication digital signatures
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Classical Encryption Techniques
Cryptography Programming Lab
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Introduction to Information Security Chapter II : Classical Ciphers.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Encryption: A Brief History Author: Margery Waldron.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Terminology and classical Cryptology
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
AssessmentAssessmentAssessmentAssessment Class participation—15% Project on classical ciphers—20% Group work on cryptanalysis—10% Written test—25% RSA—10%
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Secure communication Informatics for economists II Jan Přichystal
Encryption with Keys and Passwords
Substitution Ciphers.
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
Cryptography Survey.
Chapter 3:Cryptography (16M)
PART VII Security.
Cryptography Survey.
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar

Topics Covered Introduction Short History Transposition Substitution Frequency Analysis Vigenere Cipher Enigma Machine Conclusion

INTRODUCTION Motivation – Threat of enemy interception – Nations have operated code-making departments Ongoing Battle – Code Makers - Make stronger Codes – Code Breakers - Invented more powerful methods for attacking them – In this war, both side have used diverse range of disciplines and technologies From mathematics to linguistics, From information theory to quantum theory. – In return, code makers and code breakers have enriched these subjects, and their work has accelerated technological development, most notably in the case of the modern computer.

SHORT HISTORY AD – Arab Scholars were enjoying vigorous period of Intellectual Achievement – Europe was at nascent stage struggling with cryptography. – Only European Monasteries were ahead where monks studied bible in search of hidden messages. – Medieval monks were intrigued by the fact that Old Testaments used Hebrew Cipher where letter replacement happened as follows. – a=>z b=>y and so on AD 1300 – First known European book - Included 7 methods to keep messages secret written by English Franciscan Monk and Polymath Roger Bacon.

Contin… AD 1400 – Use of Cryptography became extremely wide spread with alchemists and scientists using it to keep their discoveries secret. – Famous works include Geffrey Chaucer. He replaced plaintext with symbols e.g b with delta sign. But level of security is the same as letter for letter substitution. AD – European Cryptography was burgeoning industry – Science of cryptanalysis was beginning in the west. The First great cryptanalyst was SORO appointed as Venetion cipher secretary. – Towards the end of sixteenth century French consolidated their code breaking prowess with the arrival of Francois Viete. – Spain was much more naive compared to their rivals elsewhere in Europe. Their cryptgraphers were stunned to know that their messages were transparent to French. – Period of transition where crytanalysts had started using frequency analysis whereas Cryptogaphers relied on monoalphabetic substitution ignorant of the extent to which cryptnalysts like SORO and VIETE were able to read their messages.

Transposition – In transposition the letters of the message are simply re-arranged effectively giving an anagram. Transposition offers high security for the large sentences but if the sender and the receiver do not agree upon a protocol it is going to be difficult even for the receiver to unscramble the message. – Example 1 - Rail-Fence Algorithm Plaintext THY SECRET IS THY PRISONER; IF THOU LET IT GO, THOU ART A PRISONER TO IT Rail-fence Algorithm T Y E R T S H P I O E I T O L T T O H U R A R S N R O T H S C E I T Y R S N R F H U E I G T O A T P I O E T I Ciphertext T Y E R T S H P I O E I T O L T T O H U R A R S N R O T H S C E I T Y R S N R F H U E I G T O A T P I O E T I The receiver can recover the message by simply reversing the process.

Substitution The next form of cipher is the substitution cipher in which we pair letters of the alphabets at random and than substitute each letter in the originals with it partner. Example 1 - Randomly assigned partners – Letters : A D H I K M R S U W Y Z – Partners : V X B G J C Q L N E F P T – Text : MEET AT MIDNIGHT – Cipher : CUUZ VZ CGXSGYBZ

Caesar Cipher Example 2 - Caesar’s Cipher – Caesar used a shift by 3 cipher in which every plain text letter is shifted by 3 letters deep in the alphabet sequence after it. It is possible to substitute by any places in the alphabet sequence. – Plaintext : veni vidi vici – Cipher text : yhql ylgl ylfl

Cryptographic Process The above figure has three components : Plaintext : Normal readable message Key : Used to convert Plaintext to cipher text and vice versa Cipher text : Message obtained after applying the key to Plaintext

Frequency Analysis So what is Frequency analysis and how it works? Here the variation in the frequencies of letters were exploited to break ciphers. Study text to establish the frequency of each letter in the alphabets. Next we examine the cipher text and workout the frequency of each letter. In English e is the most common letter followed by t than a, and so on given in the table. If the most common letter in the cipher text is J than it is likely that the substitute for this is e and so on

VIGENERE CIPHER Example: – Key :K I N G K I N G K I N G K I N G K I N G K I N G – Plain text : T H E S U N A N D T H E M A N I N T H E M O O N – Cipher text : Z P D X V P A Z H S L Z B H L W Z B K M Z N M T Vigenere Square

Breaking Vigenere Charles Babbage, the person who came up with a blue print of computer was able to come up with a method to crack the Vigenere cipher. His Observation – Key :K I N G K I N G K I N G K I N G K I N G K I N G – Plain text : T H E S U N A N D T H E M A N I N T H E M O O N – Cipher text : B P R Y E V N T N B U K W I A O X B U K W W B T

ENIGMA Most fearsome encryption machine Components – Input Keyboard – Scrambler – Output Lamp board – Reflector – Plug board

Enigma Encryption

Contin…

Cracking the ENIGMA 1 st 2 nd 3 rd 4 th 5 th 6 th 1 st MessageL O K R G M 2 nd MessageM V T X Z E 3 rd MessageJ K T M P E 4 th MessageD V Y P Z X 1 st LETTERA B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 TH LETTER P M R X 1 st LETTERA B C D E F G H I J K L M N O P Q R S T U V W X Y Z 4 TH LETTER F Q H P L W O G B M V R X U Y C Z I T N J E A S D K

Contin… A => F => W => A3 Links B => Q => Z => K => V => E => L => R => I => B9 Links C => H => G => O => Y => D => P => C7 Links J => M => X => S => T => N => U => J7 Links

Conclusion Throughout history there has been rivalry between code makers and code breakers. Whenever code makers come up with a new form of encryption the code breakers come up with the methods to crack it. The emergence of RSA has shifted the tide on the favor of Cryptographers. Whether Cryptanalysts will be able to break this code remain to be seen.

Bibliograpgy Simon Singh : The Code Book wikipedia.org cpsc420.clemson.edu

Thank You