Cryptography Lynn Ackler Southern Oregon University.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
Applied Cryptography Chapter 1 Foundations Jaewon Lee.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptography, Authentication and Digital Signatures
Lec. 5 : History of Cryptologic Research II
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Network Security Section 1: Introduction to security.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue Quick Review.
ISA 400 Management of Information Security
Chapter 2 Basic Encryption and Decryption
Chapter-2 Classical Encryption Techniques.
Cryptography.
Chapter 3:Cryptography (16M)
Security through Encryption
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Cryptography Lynn Ackler Southern Oregon University

Information Assurance Keep information in a known and trusted state that can be used appropriately.

NSA Information Security Model Confidentiality Integrity Availability Transmission Storage Processing Technology Policies Training Information States Critical Information Characteristics Security Measures

Cryptography – Introduction Chapter 1 Cryptography - Services –Confidentiality –Authentication –Integrity –Nonrepudiation

Encryption/Decryption Render text unreadable –Plaintext – message to be scrambled –Encryption – scrambling the message –Ciphertext – scrambled message –Decryption – unscrambling the ciphertext

Cryptography Art and science of encryption techniques Cryptographers Cryptanalysis Art and science of braking encryption Cryptanalysts Cryptology Branch of mathematics studing both cryptography and cryptanalysis

Encryption/Decryption Encryption Decryption PlaintextCiphertext Original Plaintext M E(M) = CD(C) = M CM D(E(M)) = M

Keys (Magic decoder rings) Secrecy by obscurity Secret algorithm Secrecy via a secret Keys, usually a number kept secret Algorithm is public and studied Keyspace Set of all possible keys Should be big

Symmetric Key Cryptography Key to encrypt is the same as to decrypt Usually very fast Problem is to distribute the key Block ciphers/algorithms Stream ciphers/algorithms

Encryption/Decryption Encryption Decryption Plaintext Ciphertext Original Plaintext M E K (M) = CD K (C) = M CM D K (E K (M)) = M Key

Asymmetric Key Cryptography Key to encrypt is different from the key to decrypt Usually very slow Distribution is not a problem Block algorithm only

Encryption/Decryption Encryption Decryption Plaintext Ciphertext Original Plaintext M E K1 (M) = CD K2 (C) = M CM D K2 (E K1 (M)) = M Encryption Key Decryption Key

Public - Key Cryptography Two keys: –Public key –Private key If one is used to encrypt the other must be used to decrypt.

Cryptanalysis Break the encryption Attack: a cryptanalysis attempt Compromise: loss of a key

Standard Attacks Cryptanalytic attacks Ciphertext–only attack Known–plaintext attack Chosen–plaintetxt attack Adaptive–chosen–plaintext attack Chosen–ciphertext attacks Rubber–hose attack

Ciphertext-only Attack Ciphertext of several messages Same key, hopefully Same algorithm Goals Recover plaintext and/or key/keys Example: Encrypted hard drive

Known-plaintext Attack Plaintext and Ciphertext of several messages are known Same key, hopefully Same algorithm Goals Recover key/keys At least recover the next messasge Example A collection of s

Chosen-plaintext Attack Plaintext and Ciphertext of several messages are known Can have ciphertext for any chosen plaintext Same key and algorithm Goals Recover the key At least recover the next message Example Encrypted bank deposits to your account

Chosen-ciphertext Attack Any Ciphertext can be decrypted Same key and algorithm Goals Recover the key Example Breaking a tamper proof crypto box

Rubber Hose Attack Uncooperative person Goals Recover the key Recover password Example Any one with a secret Technique Sex, Money and Pain

Security of Algorithms If the cost to break is greater than the value of the data, you are probably safe. Not always though. Seti at home

Categories of Breaks Total break Algorithm and key is deduced Global deduction An alternative algorithm is found Local deduction The plaintext is found for a single intercepted ciphertext Information deduction Format of plaintext, a few bits of the key, etc.

Security Levels Unconditionally secure One time pad Conditionally secure Brute force attack Computationally secure

Steganography Data hiding in plain sight. Often is not invariant under data compression.

Substitution Ciphers Alphabet substitution Monoalphabetic – letter for letter Homophonic – one or more for a letter Polygram – block for block Polyalphabetic – multiple simple substitutions Substitution algorithms Caeser Cipher – rotate n mod 26 Modulo arithmetic Lookup tables

Transposition Cipher Plaintext in rows Ciphertext from the columns t he quick brown f ox jumed over t he lazy dog Ciphertext: t hfteoh xeq ujliuacmz key d b d rooovgwe nr

Simple XOR XOR: '^' in C,  in mathematics 0  0 = 0 0  1 = 1 1  0 = 1 1  1 = 0 Note: a  0 = a a  a = 0 (a  b)  b = a

Simple XOR Encryption Key: K Messag: M Ciphertext: C = M  K Message: M = C  K = (M  K)  K = M  (K  K) = M

One-Time Pads The one time pad is a substitution cipher with a very very long random substitution key. Statistically it is perfectly secure.

One-Time Pads Problems The key must be a random sequence of characters. The pad can be used only once. Both parties must have the exact same pad. If one character is dropped everything afterward is lost.

One-Time Pads Uses Low bandwidth communication. Ultra secure communication. Forever secure.