Security in Computing Cryptography (Traditional Ciphers)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Chapter Ten The Application and Presentation Layers.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Modern Symmetric-key Ciphers
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Columnar Transposition
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Cryptography.
Cryptography II Jagdish S. Gangolly School of Business
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Security in Computing Cryptography (Traditional Ciphers)

I.Substitution Ciphers A. Monoalphabetic Substitution Ciphers 1.An improvement over the Caesar cipher 2.Change/replace one symbol with another - 3.Obscures the meaning of a symbol (confusion) 4.P { a b c d e f g ……. z } C { Q W E R T Y U ……. M } 5.Each symbol in the plain alphabet P maps onto some other symbol in the cipher alphabet C

6.Effectively, we are using a 26-character key (26-letter string) corresponding to the alphabet 7.In how many ways can all the 26-character be rearranged (permutation)? B. Brute force attack 1.Not feasible: 26! (4 x ) – Enormous the key space; 2.At 1 nsec (billionth of a second) per solution, a computer would take ~10 billion years (10 10 ) to try all the keys I.Substitution Ciphers

4 x Incomprehensible!

B. Cryptanalysis Attack 1.Basic attack takes advantage of statistical properties of English: 2.In English, e (most common letter) followed by t, o, a, n, i, etc. 3.Common two-letter combinations (digrams): th, in, er, re, an 4.Common three-letter combinations (trigrams): the, ing, and, ion I.Substitution Ciphers

1.First, count relative frequencies of all letters in the ciphertext 2.Second, tentatively assign most common letter to e, next common one to t and so on 3.Third, find common trigrams of the form [t ? e], strongly suggesting that ? is h 4.Fourth, check if [t h ? t] occurs frequently, suggesting that ? stands for a I.Substitution Ciphers

C. Multiple substitutions 1.Two or more substitution ciphers used in series 2.Letters 1, 3, 5.. encrypted under cipher (or key) 1 ; letter 2, 4, 6 encrypted cipher (or key) 2 etc. I.Substitution Ciphers

3.Example a)I THINK THAT I SHALL NEVER SEE b)Under cipher 1 : I H N T A I H L N V R E c)Under cipher 2: T I K H T S A L E E S E d)Cipher 1 = n + 3; cipher 2 = n + 5 e)Ciphertext 1 : L K Q W D L K O Q Y U H f)Ciphertext 2 : Y N P M Y X F Q J J X J g)Result: LYKNQPWMDYLXKFOQQJYJUXHJ I.Substitution Ciphers

II.Transposition Ciphers A. Various Types 1.Plaintext symbols are simply reordered and not replaced like substitution cipher (diffusion) 2.Each letter represents itself keeping the frequency distribution intact 3.Simple Example a)Plaintext : CAT b)Possible Ciphertext: { CTA, ACT, ATC, TCA, TAC }

II.Transposition Ciphers B. Columnar Transposition Simple Example 1.Plaintext written in fixed-length rows, read off by columns 2.Example: SAM PLE becomes SPALME C. Other more complex Examples 1.Use of a key to number the columns....

III.One-Time Pad 1.The only unbreakable cipher (Theoretically) 2.Example 1.First, convert the plaintext message into a bit string (7-bit ASCII) e.g. “ I love you.” I l o

III.One-Time Pad 2.Second, choose random bit string key (key pad) with same length as the plaintext 3.Third, compute XOR (eXclusive OR) of the two strings, bit by bit plaintext: … key pad: … Ciphertext: …

IV.Book Cipher 1.Similar to one-time pad 2.Uses book (poem, piece of music, newspaper) to which both sender and receiver have access 3.Starting at a predetermined place in the shared object, use the element of the object as random numbers for a on-time pad 4.Weaknesses due to predictability in written objects, possible availability of shared objects to third party

V.Hardware Implementation A. Transposition 1.P-Box (Permutation Box or P-Box) device B. Substitution 1.S-Box (Substitution Box or S-Box) device C. Product Cipher 1.Combines P-Boxes and S-Boxes

V.Hardware Implementation A. Transposition 1.P-Box (Permutation Box or P-Box) device B. Substitution 1.S-Box (Substitution Box or S-Box) device C. Product Cipher 1.Combines P-Boxes and S-Boxes