Terminology and classical Cryptology

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
CIS 5371 Cryptography Introduction.
Introduction to Information Security Chapter II : Classical Ciphers.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cis 4930 Introduction to cryptography
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Data Security and Encryption (CSE348) 1. Lecture # 6 2.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter-2 Classical Encryption Techniques.
Traditional Symmetric-Key Ciphers
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Terminology and classical Cryptology By Hafez Barghouthi

What is Cryptology?

Terminology The art and science of keeping messages secure is cryptography, and it is practiced by cryptographers. Cryptanalysts are practitioners of cryptanalysis, the art and science of breaking cipher text. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology an its practitioners are cryptologists. Modern cryptologists are generally trained in theoretical mathematics (they have to be ). Source: Bruce Schneier, „Applied Cryptography“, Second Edition, p. 1,John Wiley & Sons, 1996

Terminology-2

Terminology-3 A message is plaintext (sometimes called cleartext). The process of disguising a message in such a way as to hide its substance is called encryption. An encrypted message is ciphertext. The process of turning ciphertext back into plaintext is called decryption. A cryptographic algorithm, also called a cipher, is the mathematical function used for encryption and decryption. The security of a modern cryptographic algorithm is based on a secret key. This key might be any one of a large number of values. The range of possible key values is called the keyspace. Both encryption and decryption operations are dependent on the key K and this is denoted by the K subscript in the functions EK(P) = C and DK(C) = P.

Fundamental Assumptions

Fundamental Assumptions-2 Attacker knows every detail of the crypto-graphical algorithm Attacker has an encryption / decryption equipment (HW machine or SW implementation) •Attacker has access to an arbitrary number of plaintext /ciphertext pairs generated with the same (unknown) key. Strong cipher: Best attack should be brute force key search!

Types of Attacks (cryptanalysis) Ciphertext-Only Attack • Attacker knows cipher text of several messages encrypted with the same key and/or several keys. • Recover the plaintext of as many messages as possible or even better deduce the key (or keys). Known-Plaintext Attack • Known cipher text / plaintext pair of several messages. • Deduce the key or an algorithm to decrypt further messages. Chosen-Plaintext Attack • Attacker can choose the plaintext that gets encrypted thereby potentially getting more information about the key Adaptive Chosen-Plaintext Attack • Attacker can choose a series of plaintexts, basing the choice on the result of previous encryption → differential cryptanalysis!

History evidence Codes have decided the fates of empires throughout recorded history • Mary Stuart, Queen of Scotland was put to death by her cousin Queen Elizabeth of England, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. Source: Simon Singh, „The Code Book“, Doubleday, 1999 Cryptanalysis is not just for fun .

Caesar Monoalphabetic Substitution Cipher

Monoalphabetic Substitution (old and weak but not bad) Each character in an alphabet is replaced by another character in the same alphabet or sometimes even by a symbol of a different alphabet. 26! Different keys it seem to be secure. Each occurrence of a specific plaintext character is always mapped to the same cipher text character. Weak against count statistics of natural language plaintexts. Not bad coz great Idea Substitution using S-Boxes • In modern ciphers a fixed number of plaintext bits are grouped together and are substituted by a different bit combination according to a fixed lookup table. • A software or hardware module which implements this substitution operation is called an S-Box.

Redundancy of Natural Language Texts

Vigenère Polyalphabetic Substitution Cipher

Poly alphabetic substitution Effectively smears the characteristic statistics of natural language text. For a long time was thought to be unbreakable. Problem of long period using the key. A frequency analysis can be effected on each individual alphabet.

How to construct a Secure Cipher?

Thomas Jefferson‘s Cipher Wheel Protect communications from England and France to the U.S Device consisted of an iron spindle and a screw used to keep 36 distinct wooden wheels fixed in place. On each of the numbered wheels the 26 letters of the alphabet were engraved on the circumference in arbitrary order, so that no two cylinder had the same order. In order to encrypt a plain text, the letters were arranged on a single line by aligning the individual wheels accordingly. The cipher text could then be read off by selecting any other line of the cylinder.

The German Enigma The Enigma was an electromechanical rotor machine implementing a poly alphabetic substitution cipher. It was used by the German Wehrmacht and Kriegsmarine to encrypt most of its communications. Due to several weaknesses both in the implementation and the usage of the machine, the cipher could be broken by the British.

Claude Shannon 1916 - 2001 The Father of Information Theory • Model of a secrecy system. • Definition of perfect secrecy. • Basic principles of „confusion“ and „diffusion“. Basic Principles of „Confusion“ and „Diffusion“ Shannon was the first to formulate these two principles explicitly, „confusion“ standing for substitution operations and „diffusion“ standing for transposition or permutation operations. These two principles are still actively used in modern ciphers.

confusion Caesar and Vigenère cipher. S-Box in modern cipher.

Transposition Cipher In a classical transposition cipher the plaintext is written on a piece of paper in horizontal rows of c characters each. The ciphertext is read out vertically column after column The columns could be chosen in any order. In modern ciphers a fixed number of bits are written in linear order into a buffer and are read out in a permuted order controlled by a fixed lookup table. A software or hardware module which implements this permutation operation is called a P-Box.

Transposition Cipher-1

Perfect secrecy

Shannon‘s Model of a Secrecy System