Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Welcome back! It’s spring…or supposed to be MAT199: Math Alive Cryptography Ian Griffiths Mathematical Institute, University of Oxford, Department of.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
11/21/ Session Plan Overview of Classical encryption techniques: Symmetric cipher model Substitution Transposition Steganography.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography : from substitution cipher to RSA Alex Karassev.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Computer Security Fundamentals
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Columnar Transposition
Encryption
Cryptography.
Lecture 2.2: Private Key Cryptography II
Transposition Ciphers
Double Transpositions
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Cryptography: from substitution cipher to RSA
Presentation transcript:

Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible ink) and hope that the enemy can’t find it: this is known as steganography.

Examples of steganography Herodotus relates that one Histauaeus shaved the head of his messenger, wrote the message on his scalp, and waited for the hair to regrow. On reaching his destination, the messenger shaved his head again and the recipient, Aristogoras, read the message. Invisible ink comes into this category; the recipient develops the message by applying heat or chemicals to it.

A message can be concealed in a much longer, innocent-looking piece of text; the long text is composed so that a subsequence of the letters (chosen by some rule known to the recipient) forms the message. For example, taking every fifth letter of “The prepared letters bring news of amounts” gives the message “Retreat”.

Steganography is interesting and useful, but it’s not what we will study most of time. Instead, we will study cryptography, which is the art of scrambling the message so that the enemy will find it difficult to unscramble it.

Terminology  Plaintext: the message that you want to send (which might be a normal sentence, a sentence without punctuation, a string of 0s and 1s, etc.)  Ciphertext: what is actually transmitted (the encrypted message)  Key: The encryption uses some extra information, known as the key

Examples of encryption method Transposition: The order of the letters in the plaintext is rearranged in some systematic way. The key is the permutation applied to the positions. Substitution: Individual letters are replaced by different letters in a systematic way. Codebook: Complete words in the message are replaced by other words with quite different meanings. The key is the codebook, the list of words and their replacements.

Something to think about You want to send a postcard to your family, which will contain a secret message to your brother. How might you do it?

Examples of encryption systems Transposition: The order of the letters in the plaintext is rearranged in some systematic way. The key is the permutation applied to the positions. For example, say you reverse the order of letters for every 3 letters: Alice is in Wonderland -> ilaiecwnidnolredna

Examples of encryption systems Or the Pig-Latin: Cat->atcay Dog->ogday Simply->implysay Scratch->atchscray Thick->ickthay Apple->appleyay Under->underyay

Examples of encryption systems Substitution cipher: Take a permutation of the alphabet, and apply it to the plaintext For example, A->C, B->D, C-L, … will result in ABBA-> CDDC

Suppose the permutation you are applying is A B C D E F G H I J K L M N O P Q R S T U V W X Y Z T H E Q U I C K B R O W N F X J M P S V L A Z Y D G Then, to decipher you need to apply its inverse A B C D E F G H I J K L M N O P Q R S T U V W X Y Z V I G Y C N Z B F P H U Q M K R D J S A E T L O X W

Examples of encryption systems Codebook, etc.

Weakness Letter frequencies, etc.