2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Scott CH Huang COM 5336 Cryptography Lecture 1 Scott CH Huang COM 5336 Cryptography Lecture 1 Introduction.
Classical Cryptography
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Information Systems Security
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Cryptography By, Anthony Lonigro & Valentine Mbah.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Chapter Ten The Application and Presentation Layers.
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
CSCI 5857: Encoding and Encryption
2001 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
1 Cryptanalysis With thanks to Professor Sheridan Houghten.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Attacks Overview Nguyen Cao Dat 1. BK TP.HCM Outline  Cryptographic Attacks ▫ Frequency analysis ▫ Brute force attack ▫ Meet-in-the-middle attack ▫ Birthday.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption CS110: Computer Science and the Internet.
Intro to Cryptography Lesson Introduction
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
CSCI-235 Micro-Computers in Science Privacy & Security.
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Classical Techniques: Substitution
Cryptography and Network Security
CS4780 Cryptography and Information Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Some Basic Terminology Symmetric Encryption
Cryptography Lecture 2.
Simple Encryption- Lesson 5
Presentation transcript:

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 8. Encryption 6. Routers 7. Encryption 8. NT, UNIX and NetWare 8.1 Introduction 8.2 Encryption 8.8 Private-key 8.9 Public-key Objectives: To understand the main methods used encryption. To analyse simple encryption schemes. To understand the public-key encryption method. Objectives: To understand the main methods used encryption. To analyse simple encryption schemes. To understand the public-key encryption method.

Encryption and the OSI model

Encryption process

Key sizes and number of keys Code size No. of keys Code size No. of keys Code size No. of keys                10 26 Year Time to decrypt (years) 0 1 million Assumption: Computer power doubles every year.

Using parallel processing over time Processors Year 0 Year 1 Year 2 Year 3 Year 4 Year 5 Year 6 Year

Methods used to crack the code Known plaintext attack. Where the hacker knows part of the ciphertext and the corresponding plaintext. The known ciphertext and plaintext can then be used to decrypt the rest of the ciphertext. Chosen-ciphertext. Where the hacker sends a message to the target, this is then encrypted with the target’s private-key and the hacker then analyses the encrypted message. For example, a hacker may send an to the encryption file server and the hacker spies on the delivered message. Exhaustive search. Where the hacker uses brute force to decrypt the ciphertext and tries every possible key. Active attack. Where the hacker inserts or modifies messages.

Methods used to crack the code (cont.) Man-in-the-middle. Where the hacker is hidden between two parties and impersonates each of them to the other. The replay system. Where the hacker takes a legitimate message and sends it into the network at some future time. Cut and paste. Where the hacker mixes parts of two different encrypted messages and, sometimes, is able to create a new message. This message is likely to make no sense, but may trick the receiver into doing something that helps the hacker. Time resetting. Some encryption schemes use the time of the computer to create the key. Resetting this time or determining the time that the message was created can give some useful information to the hacker. Time attack. This involves determining the amount of time that a user takes to decrypt the message; from this the key can be found.

Letters (%) Digrams (%) Trigrams (%) Words (%) E TH 3.16 THE 4.72 THE 6.42 T 9.02 IN 1.54 ING 1.42 OF 4.02 O 8.21 ER 1.33 AND 1.13 AND 3.15 A 7.81 RE 1.30 ION 1.00 TO 2.36 N 7.28 AN 1.08 ENT 0.98 A 2.09 I 6.77 HE 1.08 FOR 0.76 IN 1.77 R 6.64 AR 1.02 TIO 0.75 THAT 1.25 S 6.46 EN 1.02 ERE 0.69 IS 1.03 H 5.85 TI 1.02 HER 0.68 I 0.94 D 4.11 TE 0.98 ATE 0.66IT 0.93 L 3.60 AT 0.88 VER 0.63 FOR 0.77 C 2.93 ON 0.84TER 0.62 AS 0.76 F 2.88 HA 0.84 THA 0.62WITH 0.76 U 2.77 OU 0.72ATI 0.59 WAS 0.72 M 2.62 IT 0.71 HAT 0.55HIS 0.71 P 2.15 ES 0.69 ERS 0.54 HE 0.71 Y 1.51 ST 0.68 HIS 0.52 BE 0.63 W 1.49 OR 0.68 RES 0.50NOT 0.61 G 1.39 NT 0.67 ILL 0.47BY 0.57 B 1.28 HI 0.66 ARE 0.46 BUT 0.56 V 1.00 EA 0.64 CON 0.45 HAVE 0.55 K 0.42 VE 0.64 NCE 0.43 YOU 0.55 X 0.30 CO 0.59 ALL 0.44 WHICH 0.53 J 0.23 DE 0.55 EVE 0.44 ARE 0.50 Q 0.14RA 0.55 ITH 0.44 ON 0.47 Z 0.09 RO 0.55 TED 0.44OR Probability of occurances in plain text

Frequency analysis Determine the probabilities of ciphertext letters. The least probable should be ‘j’, ‘k’, ‘x’ and ‘z’. These have an accumulated occurrence of less than 1 per cent. One of the letters, an ‘e’, should have an occurrence of more than 10 per cent. Next the ciphertext letter probabilities should be measured against standard English language letter probabilities. If the two do not tie-up, it is likely that the text was written in another language. If the single letters do not yield the code, then two letter occurrences of the same letter should be examined. The most common ones are: ss, ee, tt, ff, ll, mm and oo. If the ciphertext contains repeated letters, it may relate to one of these sequences. If there are spaces between the words, the two letter words can be examined. The most popular two letter words are: an, as, at, am, be, by, do, of, to, in, it, is, so, we, he, or, on, if, me, up, go, no and us. If possible, the list of letter probabilities should be related to the type of message that is being sent. For example, military communications tend to omit pronouns and articles (excluding words like he, a and I). Try and identify whole phrases, such as ‘Hello who are you’. This can be used as a crowbar to get the rest of the code. If the ciphertext corresponds to correct letter probabilities, but the deciphered text is still unreadable, it may be that the code is a transpositional cipher, where the letters have had their positions changed. For example, every two cipher characters have been swapped around.

Caesar shift and code mappings abcdefghijklmnopqrstuvwxyz YZABCDEFGHIJKLMNOPQRSTUVWX the boy stood on the burning deck RFC ZMW QRMMB ML RFC ZSPLGLE BCAI Caesar shift : abcdefghijklmnopqrstuvwxyz mgpoafzbcdiehxjklntqrwsuvy This is an example piece of text qbct#ct#mx#aumhkea#kcapa#jf#qauq Code mappings : 26! Different codes [4.0310 26 ] 26 Different codes Weaknesses: Frequency analysis shows probabilities

Vigenère code Plaina b c d e f g h i j k l m n o p q r s t u v w x y z 1b c d e f g h i j k l m n o p q r s t u v w x y z a 2c d e f g h i j k l m n o p q r s t u v w x y z a b 3d e f g h i j k l m n o p q r s t u v w x y z a b c 4 (E)e f g h i j k l m n o p q r s t u v w x y z a b c d 5f g h i j k l m n o p q r s t u v w x y z a b c d e 6 (G)g h i j k l m n o p q r s t u v w x y z a b c d e f 7h i j k l m n o p q r s t u v w x y z a b c d e f g 8i j k l m n o p q r s t u v w x y z a b c d e f g h 9j k l m n o p q r s t u v w x y z a b c d e f g h i 10k l m n o p q r s t u v w x y z a b c d e f g h i j 11l m n o p q r s t u v w x y z a b c d e f g h i j k 12m n o p q r s t u v w x y z a b c d e f g h i j k l 13 (N)n o p q r s t u v w x y z a b c d e f g h i j k l m 14o p q r s t u v w x y z a b c d e f g h i j k l m n 15p q r s t u v w x y z a b c d e f g h i j k l m n o 16q r s t u v w x y z a b c d e f g h i j k l m n o p 17 (R)r s t u v w x y z a b c d e f g h i j k l m n o p q 18s t u v w x y z a b c d e f g h i j k l m n o p q r 19t u v w x y z a b c d e f g h i j k l m n o p q r s 20u v w x y z a b c d e f g h i j k l m n o p q r s t 21v w x y z a b c d e f g h i j k l m n o p q r s t u 22w x y z a b c d e f g h i j k l m n o p q r s t u v 23x y z a b c d e f g h i j k l m n o p q r s t u v w 24y z a b c d e f g h i j k l m n o p q r s t u v w x 25z a b c d e f g h i j k l m n o p q r s t u v w x y GREENGREENGREEN hellohowareyou NVPPBNFAEEKPSY For example: EE coded as ll, wa and yo

Homophonic Substitution a b c d e f g h i j k l m n o p q r s t u v w x y z Plaintexth e l l o e v e r y o n e Ciphertext:

Basic encryption operators EXCLUSIVE-OR ‘A’ Key (5) Ex-OR Enter key value >> 5 Bit-shift ch=ch << 1; which shifts the bits of ch one place to the left, and decrypted by: ch=ch >> 1; Hello. This is some sample text.ch=rot_left(ch); !±±½¸€Q¡¥Í€¥Í€Í½µ€Í …µÁ±€ÑáѸ4(4(É‘¸

Public-key encryption