Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Cryptography and Network Security Chapter 3
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454: Principles of Cryptography
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Lecture 2 Overview.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Lecture 4 Page 1 CS 136, Fall 2014 More on Cryptography CS 136 Computer Security Peter Reiher October 14, 2014.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Lecture 3 Page 1 CS 136, Fall 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Lecture 4 Page 1 CS 136, Spring 2009 Introduction to Cryptography CS 136 Computer Security Peter Reiher April 9, 2009.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Cryptography Much of computer security is about keeping secrets
Outline Desirable characteristics of ciphers Uses of cryptography
Basic Encryption Methods
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Cryptography.
Outline Desirable characteristics of ciphers Stream and block ciphers
Outline Desirable characteristics of ciphers Uses of cryptography
Outline What is data encryption? Cryptanalysis
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
ICS 454: Principles of Cryptography
Outline What is data encryption? Cryptanalysis
Outline What is data encryption? Cryptanalysis
Outline What is data encryption? Cryptanalysis
Basic Encryption Methods
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014

Lecture 3 Page 2 Advanced Network Security Outline Review of basic concepts of cryptography What is cryptography? Basic cryptographic operations Stream and block ciphers –Cryptographic mode

Lecture 3 Page 3 Advanced Network Security Cryptography Basics Encryption is the process of transforming secret data into something else Even if the attacker sees the transformed data, he can’t understand it How do we transform the data? –One bit or byte pattern is transformed to another bit or byte pattern –Usually in a reversible way

Lecture 3 Page 4 Advanced Network Security Why is Crypto Important? One of the core tools for network security Obviously can help provide secrecy Also can detect data alteration Also can provide authentication Clever uses of crypto can do many useful things

Lecture 3 Page 5 Advanced Network Security Encryption Terminology Encryption is typically described in terms of sending a message The sender is S The receiver is R And the attacker is O

Lecture 3 Page 6 Advanced Network Security More Terminology Encryption is the process of making message unreadable/unalterable by O Decryption is the process of making the encrypted message readable by R A system performing these transformations is a cryptosystem –Rules for transformation sometimes called a cipher

Lecture 3 Page 7 Advanced Network Security Plaintext and Ciphertext Plaintext is the original form of the message (often referred to as P) Transfer $100 to my savings account Ciphertext is the encrypted form of the message (often referred to as C) Sqzmredq #099 sn lx rzuhmfr zbbntms

Lecture 3 Page 8 Advanced Network Security Very Basics of Encryption Algorithms Most algorithms use a key to perform encryption and decryption –Referred to as K The key is a secret Without the key, decryption is hard With the key, decryption is easy

Lecture 3 Page 9 Advanced Network Security Terminology for Encryption Algorithms The encryption algorithm is referred to as E() C = E(K,P) The decryption algorithm is referred to as D() –Sometimes the same algorithm as E() The decryption algorithm also has a key

Lecture 3 Page 10 Advanced Network Security Basic Encryption Methods Substitutions Permutations Combinations of these methods

Lecture 3 Page 11 Advanced Network Security Substitution Ciphers Substitute one or more characters in a message with one or more different characters Using some set of rules Decryption is performed by reversing the substitutions

Lecture 3 Page 12 Advanced Network Security Example of a Simple Substitution Cipher Transfer $100 to my savings account Sqzmredq #099 sn lx rzuhmfr zbbntms Sransfer $100 to my savings account Sqansfer $100 to my savings account Sqznsfer $100 to my savings account Sqzmsfer $100 to my savings account Sqzmrfer $100 to my savings account Sqzmreer $100 to my savings account Sqzmredr $100 to my savings account Sqzmredq $100 to my savings account Sqzmredq #100 to my savings account Sqzmredq #000 to my savings account Sqzmredq #090 to my savings account Sqzmredq #099 to my savings account Sqzmredq #099 so my savings account Sqzmredq #099 sn my savings account Sqzmredq #099 sn ly savings account Sqzmredq #099 sn lx savings account Sqzmredq #099 sn lx ravings account Sqzmredq #099 sn lx rzvings account Sqzmredq #099 sn lx rzuings account Sqzmredq #099 sn lx rzuhngs account Sqzmredq #099 sn lx rzuhmgs account Sqzmredq #099 sn lx rzuhmfs account Sqzmredq #099 sn lx rzuhmfr account Sqzmredq #099 sn lx rzuhmfr zccount Sqzmredq #099 sn lx rzuhmfr zbcount Sqzmredq #099 sn lx rzuhmfr zbbount Sqzmredq #099 sn lx rzuhmfr zbbnunt Sqzmredq #099 sn lx rzuhmfr zbbntnt Sqzmredq #099 sn lx rzuhmfr zbbntmt Sqzmredq #099 sn lx rzuhmfr zbbntms How did this transformation happen? Every letter was changed to the “next lower” letter

Lecture 3 Page 13 Advanced Network Security More Complex Substitutions Monoalphabetic substitutions –More complex mappings of plaintext symbols to ciphertext symbols –But always same mapping Polyalphabetic substitutions –Multiple mappings of plaintext to ciphertext symbols Key-driven substitutions –Algorithms for creating unpredictable polyalphabetic substitutions

Lecture 3 Page 14 Advanced Network Security Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re scrambled Decryption uses key to unscramble

Lecture 3 Page 15 Advanced Network Security Characteristics of Permutation Ciphers Doesn’t change the characters in the message –Just where they occur Thus, character frequency analysis doesn’t help cryptanalyst

Lecture 3 Page 16 Advanced Network Security Columnar Transpositions A very simple type of permutation cipher Write the message characters in a series of columns Copy from top to bottom of first column, then second, etc.

Lecture 3 Page 17 Advanced Network Security T e 0 y n c r r g o a t s s u n $ o a n s 1 v a t f 0 m i c Example of Columnar Substitution T r a n s f e r $ t o m y s a v i n g s a c c o u n t How did this transformation happen? T T e e 0 0 y y n n c c r r r r g g o o a a t t s s s s u u n n $ $ o o a a n n s s l l v v a a t t f f 0 0 m m i i c c Looks a lot more cryptic written this way: Te0yncrr goa tssun$oa ns1 vatf0mic

Lecture 3 Page 18 Advanced Network Security Generalized Transpositions Any algorithm can be used to scramble the text Usually somehow controlled by a key Generality of possible transpositions makes cryptanalysis harder

Lecture 3 Page 19 Advanced Network Security Combining Substitution and Permutation Modern ciphers tend to use both methods Typically by combinations of: –Shifts and masks –Logical bitwise operations –Table lookups Generally with repeated rounds

Lecture 3 Page 20 Advanced Network Security Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers work on a given sized chunk of data at a time

Lecture 3 Page 21 Advanced Network Security Stream Ciphers PlaintextCiphertext Key Encryption fsnarT fsnar T SS fsna r q qS fsn a zzqS fs n m mzqS f s rrmzqS f e ermzqS Of course, actual cipher used could be arbitrarily complex

Lecture 3 Page 22 Advanced Network Security Advantages of Stream Ciphers +Speed of encryption and decryption Each symbol encrypted as soon as it’s available +Low error propagation Errors affect only the symbol where the error occurred Depending on cryptographic mode

Lecture 3 Page 23 Advanced Network Security Disadvantages of Stream Ciphers –Low diffusion Each symbol separately encrypted Each ciphertext symbol only contains information about one plaintext symbol –Susceptible to insertions and modifications –Not good match for many common uses of cryptography –Some disadvantages can be mitigated by use of proper cryptographic mode

Lecture 3 Page 24 Advanced Network Security Block Ciphers PlaintextCiphertext Key Encryption T r a n s f e r $ 1 0 T s r f $ a e 1 n r 0 T r a n s f e r $ 1 0 T s r f $ a e 1 n r 0

Lecture 3 Page 25 Advanced Network Security Advantages of Block Ciphers +Good diffusion Easier to make a set of encrypted characters depend on each other +Immunity to insertions Encrypted text arrives in known lengths Most common Internet crypto done with block ciphers

Lecture 3 Page 26 Advanced Network Security Disadvantages of Block Ciphers –Slower Need to wait for block of data before encryption/decryption starts –Worse error propagation Errors affect entire blocks