Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography and Network Security Chapter 3
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 23 Symmetric Encryption
Review What is security: history and definition Security policy, mechanisms and services Security models.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Cryptography Cryptography is the technique of secret writing.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
An Introduction to Cryptology
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
Conventional Encryption Message Confidentiality
Cryptography and Network Security
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Part 1 By Dr. Shadi Masadeh
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Conventional Encryption Message Confidentiality
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
The Caesar cipher Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Cipher key: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 4 Plain:
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Network Security Lecture 11 Presented by: Dr. Munam Ali Shah

Part 2 (b) Cryptography as a Network Security Tool

Summary of the previous lecture We had overviewed what cryptography is and how can we use this tool to incorporate security We discussed different terminologies such as Alice, Bob, Eve, Key, cryptanalysis, steganography etc. We also reviewed how encryption and decryption using keys work. 4 types of cryptanalysis

Summary of the previous lecture

Outlines of today’s lecture We will talk about : 3-Dimesions of Cryptography Cryptanalysis and Brute Force Attacks Classical Ciphers  Substitution Cipher  Transposition Cipher

Objectives You would be able to understand and explain basic cryptography techniques Understand and practice the basics phenomenon to perform cryptanalysis

Cryptography Cryptographic systems are characterized along three independent dimensions:  The type of operations used for transforming plaintext to ciphertext.  The number of keys used.  The way in which the plaintext is processed.

3- Dimensions of cryptography 1- The type of operations used for transforming plaintext to ciphertext. All encryption algorithms are based on two general principles: substitution, in which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element, and transposition, in which elements in the plaintext are rearranged. The fundamental requirement is that no information be lost (i.e., that all operations are reversible). Most systems, referred to as product systems, involve multiple stages of substitutions and transpositions.

3- Dimensions of cryptography 2- The number of keys used. If both sender and receiver use the same key, the system is referred to as symmetric, single-key, secret-key, or conventional encryption. If the sender and receiver use different keys, the system is referred to as asymmetric, two- key, or public-key encryption.

3- Dimensions of cryptography 3- The way in which the plaintext is processed. A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along.

Unconditional Security Vs Computational Security Unconditional Security The cipher cannot be broken no matter how much computer power or time is available The only example is OTP (one time passwords) Computational Security The cipher cannot be broken given limited computing resources The examples are DES, AES, RC4, etc.

Kerckhoff’s Principle Adversary always knows the method In modern cryptography, the assumptions are Algorithm is public (known to Eve) Key is secret

Secret Vs Public Algorithm Benefits of having algorithm secret Two levels of secrecy Benefits of having algorithm public Peer review, evaluation and cryptanalysis

Cryptanalysis and Brute-Force Attack Typically, the objective of attacking an encryption system is to recover the key in use rather than simply to recover the plaintext of a single ciphertext. There are two general approaches to attacking a conventional encryption scheme:

Cryptanalysis Cryptanalytic attacks rely on the nature of the algorithm plusperhaps some knowledge of the general characteristics of the plaintext oreven some sample plaintext–ciphertext pairs. This type of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

Brute-force attack The attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

Brute Force Attack Try every possible combination until you find the result Key Size (bits)Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs = 4.3  µs= 35.8 minutes2.15 milliseconds = 7.2  µs= 1142 years10.01 hours = 3.4  µs= 5.4  years 5.4  years = 3.7  µs= 5.9  years 5.9  years 26 characters (permutation) 26! = 4   µs= 6.4  years 6.4  10 6 years

Concepts A private key cipher is composed of two algorithms encryption algorithm E decryption algorithm D The same key K is used for encryption & decryption K has to be distributed beforehand

Classical Ciphers Substitution Ciphers Transposition Ciphers

Substitution Ciphers Shift Ciphers (Caesar Cipher) Monoalphabetic Polyalphabetic Letters of plaintext are replaced by other letters, numbers or symbols

The Caesar cipher (e.g) The Caesar cipher is a substitution cipher, named after Julius Caesar. Operation principle: each letter is translated into the letter a fixed number of positions after it in the alphabet table. The fixed number of positions is a key both for encryption and decryption.

The Caesar cipher K=3 Inner: ciphertext Outer: plaintext

An example For a key K=3, plaintext letter: ABCDEF...UVWXYZ ciphtertext letter: DEF...UVWXYZABC Hence TREATY IMPOSSIBLE is translated into WUHDWB LPSRVVLEOH

Caesar Cipher (Another example) Earliest known substitution cipher (shift cipher) Replaces each letter by 3rd next letter Transformation can be defined as: a b c d e f g h i j k l m n o p q r s t u v w x y z d e f g h i j k l m n o p q r s t u v w x y z a b c

Caesar Cipher If each letter is assigned a number (a=0, z=25), Encryption/Decryption defined as: C = E(p) = (P + 3) mod (26) P = D(c) = (C – 3) mod (26) Example: meet me after the toga party phhw ph diwhu wkh wrjd sduwb

Summary of today’s lecture We discussed some examples of applying cryptography We also practiced how cryptanalysis can break the secret The classical ciphers such as substitution was discussed with example

Next lecture topics Our discussion will continue on symmetric and asymmetric cryptography We will also explore more examples of cryptography such as Playfair cipher

The End