11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas.

Slides:



Advertisements
Similar presentations
Cryptology with Spreadsheets A Computer Course for Everyone Jim Belk Texas A&M University.
Advertisements

Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Cryptography Kinder Garden Number theory and Classical Cryptosystems Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/10/2010 INCS.
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
MATH10001 Project 2 Groups part 1 ugstudies/units/ /level1/MATH10001/
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Section 2.9 The Hill Cipher; Matrices
Algebraic Properties: The Rules of Algebra Be Cool - Follow The Rules!
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
FINITE FIELDS 7/30 陳柏誠.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
symmetric key cryptography
Introduction to Information Security Chapter II : Classical Ciphers.
By: Hector L Contreras SSGT / USMC
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Monoids, Groups, Rings, Fields
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Chapter 4 – Finite Fields
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
6.6 Rings and fields Rings  Definition 21: A ring is an Abelian group [R, +] with an additional associative binary operation(denoted · such that.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Section 2.5 Polyaphabetic Substitutions
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
UNIT - 2.  A binary operation on a set combines two elements of the set to produce another element of the set. a*b  G,  a, b  G e.g. +, -, ,  are.
Shahram Khazaei Siavash Ahmadi Fall 2015
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
PROPERTIES OF REAL NUMBERS. COMMUTATIVE PROPERTY OF ADDITION What it means We can add numbers in any order Numeric Example Algebraic Example
CSCI 115 Chapter 1 Fundamentals. CSCI 115 §1.1 Sets and Subsets.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
by D. Fisher (2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition 1.
(2 + 1) + 4 = 2 + (1 + 4) Associative Property of Addition.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
6.6 Rings and fields Rings  Definition 21: A ring is an Abelian group [R, +] with an additional associative binary operation (denoted ·) such that.
Properties of Algebra. 7 + ( ) = ( ) + 9.
@Yuan Xue Quick Review.
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
CS480 Cryptography and Information Security
Topic 12: Number Theory Basics (2)
Properties of Operations
Asad Gondal Ali Haider Mansoor
Classical Ciphers – 2 CSCI284 Spring 2004 GWU
I. Finite Field Algebra.
Conventional Cryptosystem(I)
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas Jefferson. RIGHT: The famous Enigma machine used by Nazi cryptologists (and broken by Polish and British codebreakers) during World War II. BOTTOM LEFT: The Cray XMP supercomputer, which represents the most advanced type of machine used for cryptologic purposes today--at least to the public's knowledge.

22

 Shift cipher – Shift character-by-character under modular n – Julias Caeser ( B.C.) cipher e k (x) = (x +k) mod 26, 0 <= k <=25, d k (y) = (y - k) mod 26 a -> C, b -> D, c-> E, … (k=2) p: korea --> C : MQTGC – Traffic Analysis : propagate frequencies of plaintext to ciphertext – COA (Ciphertext Only Attack) 33

44 Letter Frequency(%) Letter Frequency(%) Letter Frequency(%) e 12.7 d 4.3 p 1.9 t 9.1 l 4.0 b 1.5 a 8.2 c 2.8 v 1.0 o 7.5 u 2.8 k 0.8 i 7.0 m 2.4 j 0.2 n 6.7 w 2.3 x 0.1 s 6.3 f 2.2 q 0.1 h 6.1 g 2.0 z 0.1 r 6.0 y 2.0 (1) Pr(e)=0.12, (2) Pr(t,a,o,i,n,s,h,r) = 0.06 ~0.09 (3) Pr(d,l)=0.04 (4) Pr(c,u,m,w,f,g,y,p,b)= 0.015~0.023 (5) Pr(v,k,j,x,q,z) <=0.01 Frequency of English Alphabet

 (Def) a =b mod m if m | b-a ◦ a is congruent to b modulo m  Z m = {0,1,…,m-1}, (+, *), What is Z m * ? P1. + is closed, for any a,b  Z m a+b  Z m P2. + is commutative, for a,b  Z m, a+b = b+a P3. + is associative, for a,b,c  Z m, (a+b)+c = a +(b+c) P4. 0 is additive identity, for a  Z m, a+0=0+a=a P5. Additive inverse of any a  Z m is m-a, a+(m-a)=(m-a)+a=0 P6. * is closed, for any a,b  Z m ab  Z m P7. * is commutative, for any a,b  Z m,ab = ba P8. * is associative, for any a,b,c  Z m, (ab)c = a(bc) P9. 1 is multiplicative identity, for any a  Z m, a x 1 =1 x a = a P10. * distributes over +, for any a,b,c  Z m, (a+b)c=(ac)+(bc), a(b+c)=(ab) + (ac) 55

 Algebraic structure ◦ Group : P1,P3-P5, (Z m, +)  and +P2 : commutative (Abelian) group ◦ Ring : P1-P10, (Z m,+, x), Ex : Z, polynomial ◦ (Finite) Field : Commutative ring in which all non-zero (finite) elements have multiplicative inverses : Ex : (Z p *, +,x)  Number theory ◦ (Th) ax = b mod m has a unique solution x  Z m for every b  Z m iff gcd(a,m)=1. ◦ (Def) Euler phi-function  (m) : number of relative prime to m. If m=  i=1 n p i e i,  (m)=  i=1 n (p i e i - p i e i -1 ) ◦ (Def) a  Z m, multiplicative inverse of a is a -1  Z m s.t. aa -1 =a -1 a=1 mod m 66

77  Substitution cipher – 1 to 1 mapping random of a word – single /multi characters – single/multi/random table – Ex) Substitution table ㄱ ㄴ ㄷ ㄹ ㅁ ㅂ ㅅ ㅇ ㅈ ㅊ 3 ㅋ ㅌ ㅍ ㅎ ㅏ ㅑ ㅓ ㅕ ㅗ ㅛ 4 ㅜ ㅠ ㅡ ㅣ P : 대한민국 -> C : – COA Conventional Cryptosystem(II)

88 Word Frequency(%) Word Frequency(%) Word Frequency(%) the 6.41 a i of in it and 3.15 that for to is as Frequency of English Words

 Affine Cipher – K = {(a,b)  Z 26 x Z 26 : gcd(a,26)=1} – e k (x) = ax +b mod 26 – d k (y) = a -1 (y-b) mod 26 – Ex : e K (x) = 7x + 3, d K (y) = 15(y-3) = 15y -19 – Propagate PT’s Traffic into CT – COA – a variation of Substitution cipher 99

 Vigenere Cipher – Improve weakness of Ceaser cipher – Use different Shift per each word – Ex) repetition use of key word P : vig ene res cip her K : key key key key key C : FME ORC BIQ MMN RIP – Cryptanalysis (Kasiski, 1863) : Index of Coincidence Step 1: search a length of a key word Step 2: search a key  10 10

 Hill Cipher e K (x) : (y 1,y 2,…,y m ) =(x 1,x 2,…,x m ) K where K is m x m matrix and gcd(det K, 26) =1 – d K (y) = y K -1 – (Ex) K = 11 8 K -1 = x : july, (j,u)= (9,20), (l,y) = (11,24) (9,20) K = (3,4) = (D,E), (11,24) K = (11,22) = (L,W) – KPA  11 11

  Permutation (or Transposition) cipher – m=6,  = (3,5,1,6,4,2),  -1 = (3,6,1,5,2,4) – (Ex) x= shesellsseashellsbytheseashore x= shesel|lsseas|hellsb|ythese|ashore y= EESLSH|SALSES|LSHBLE|HSYEET|HRAEOS – special case of Hill cipher Conventional Cryptosystem(VI)

  Vernam Cipher (One-time Pad) – Improve weakness of Vigenere cipher – Use different key per each alphabet – Ex) Binary alphabet u P : o n e t i u P’: u K : u C : – Use the same length of a key as that of a plaintext – Perfect Cipher : p (x|y) = p(x) for all x  P, y  C – Impossible COA Conventional Cryptosystem(VII)

 14 14