Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Information Systems Security Cryptography Domain #3.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
CSCI-235 Micro-Computers in Science Privacy & Security.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter 2 Basic Encryption and Decryption
Basic Encryption Methods
Cryptography.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Computer Security Cryptography

Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data integrity –Source authentication –Non-repudiation

Definitions  Cryptography –Hiding the meaning of communication  Cipher –Transforms characters or bits into an unreadable format  Cryptographic Algorithm –Procedure that turns readable data into an unreadable format (usually through mathematical formulas

More Definitions  Cryptanalysis –Science of studying and breaking encryption mechanisms  Cryptology –Study of cryptography and cryptanalysis  Key Clustering –When two keys generate the same ciphertext from the same plaintext

MORE Definitions  Cryptosystem –Encompasses all of the components for encryption and decryption  Plaintext –Readable format / decrypted  Ciphertext –Unreadable format / encrypted  Work Factor –Time, effort, and resources necessary to break a cryptosystem (should be too high for compromise)

Symmetric Cryptography  Two instances of the same key –One key used for encryption and decryption –Sender/receiver use same key (public/shared)  Key distribution a problem  Secure 2 nd channel needed or offline  Does not implement non-repudiation

Historical Symmetric Keys  Hieroglyphics –Recorded in use in 2000 B.C. –1 st known type of cryptography –Only certain people knew the symbols –Used to glorify the life of deceased

Scytale Cipher  Paper or leather was wrapped around a rod  Message was written on paper and delivered by messenger  Sender and receiver had to have rod of same diameter  Was used around 400 B.C.  Transposition Cipher

Caesar Cipher  Symmetric cipher  Keys shifted ‘n’ number of letters  Also referred to as a shift cipher  If one alphabet is used – monoalphabetic substitution  If two alphabets are used – polyalphabetic substitution

Example  Decode the following messages:  OP CPOVT QPJOUT PO FYBN

Vigenere Cipher  Polyalphabetic substitution cipher  Proposed by court of King Henry III  An extension of the Caesar Cipher  Strength is no frequency analysis can be performed

Enigma Machine  Rotor cipher used polyalphabetic substitution  Employed in WWII  Symmetric – original setting of rotors and how rotors moved must be the same  Sender entered characters and the rotors moved

Vernam Cipher  One-time pad –Only method that is completely secure –Still used today for backups encryption method –Senders uses one-time pad to encrypt and receiver uses twin to decrypt

Vernam  Deemed unbreakable if: –Pad is truly random values –Used only once –Securely distributed –Securely stored –Pad is at least as long as message

Key & Algorithm Relationship  Key – long string of values  Algorithm – group of mathematical equations that can be used for the encryption process  Used together – key values are used by the algorithm to indicate which equations to use, in what order, and with what values

Breaking Cryptosystems  Brute Force –Attempts all possible combinations of a given key space to derive the key  Takes ciphertext, applies key, and sees if understandable plaintext is derived –How many possible keys?  40-bit key = 1 trillion  56-bit key = 72 quadrillion –Easily breakable due to Moore’s Law –In 1998, broke DES in three days with 1536 PCs running at 40 MHz

Frequency Analysis  Patterns in ciphertext are identified and matched back to plaintext  For example, the most common letters in the English language are “iron seat”  Allows attackers to reverse-engineer encryption process

Characteristics of Strong Algorithms  Confusion –Complexity of the process to increase the workfactor of reverse engineering –Interceptor should not be able to predict what changing one character will do to ciphertext  Diffusion –Component going through an encryption should have MANY things take place –Change should affect many part of the ciphertext

Kerckhoff’s Principle  Only secrecy involved with cryptography should be the key  Should not base security on figuring out the algorithm  Algorithms should be publicly known  Government does NOT agree