Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Lesson 2 - Encryption ITD2323 Lecture by: IZWAN SUHADAK ISHAK Assistant Lecturer Universiti Industri Selangor.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Elementary Cryptography Steven Bogaerts. Goal of Cryptography ● Ensure security of communication over insecure medium  Privacy (secrecy, confidentiality)
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Network Management and Security
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CMPE 471 BASIC ENCRYPTION AND DECRYPTION. TERMINOLOGY & BACKGROUND S R S T RT O O Suppose S (Sender) wants to send a message to R (Reciever). S entrusts.
Computer and Network Security Rabie A. Ramadan Lecture 2.
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
R R R CSE870: Advanced Software Engineering: Cheng1 Encryption A Brief Overview.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
PART VII Security.
Unit 2: Cryptography & Cryptographic Algorithm
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004

Computer Science and Engineering Contents  Algorithms (Revisited)  Operating Systems Review  Students Topics for Presentation  Encryption  Substitution and Transposition Ciphers

Computer Science and Engineering Algorithms -- revisited Hashing - Why? Hash Tables Hash Functions Insert Lookup

Computer Science and Engineering Applications OS -- Review OS – a program that acts as an intermediary between a user of a computer and the computer hardware. OS Hardware Users

Computer Science and Engineering OS -- Review OS Services Program Execution I/O Operation File System manipulation Communications Error detection Resource Allocation Accounting Protection

Computer Science and Engineering OS -- Review Process Memory Management

Computer Science and Engineering Student Presentations (15 minutes) 8/31 9/2 9/7 9/9

Computer Science and Engineering Main Components in Sending Messages senderreceiverMedium Intruder Block it Intercept it Modify it Fabricate an authentic looking message

Computer Science and Engineering Cryptography nSecret writing nDisguised data cannot be read, modified, or fabricated easily nEncryption : encoding (encipher) n plaintext  cipher text P =  C = C = E(P) (E = encryption rule) nDecryption : decoding (decipher) n Cipher text  plaintext C =  P = P = D(C) (D = decryption rule)

Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext

Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext EncryptionDecryption plaintext Original plaintext ciphertext Symmetric Cryptosystem Asymmetric Cryptosystem key KEKE KDKD

Computer Science and Engineering Cryptanalysis nHow to break an encryption! nCryptanalyst n Deduce the original meaning of the ciphertext n Determine the decryption algorithm that matches the encryption one used Breakable Encryption!

Computer Science and Engineering Ciphers  Substitution Ciphers Substitute a character or a symbol for each character of the original message  Transposition Ciphers The order of letters is rearranged (Uppercase – plaintext, lowercase – ciphertext)

Computer Science and Engineering Exercise wklv phvvdjh lv qrw wrr kdug wr euhdn

Computer Science and Engineering The Caesar Cipher -- Substitution  C i = p i + 3 A  d B  e C  f … X  a Y  b Z  c  Time complexity  table search  ??

Computer Science and Engineering Cryptanalysis of the Caesar Cipher  TREATY IMPOSSIBLE  wuhdwb lpsrvvleoh  Break is preserved  Double letters are preserved  Repeated letters

Computer Science and Engineering Other Substitutions  Permutation – Alphabet is scrambled, each plaintext letter maps to a unique ciphertext letter For example 1, 2, 3, 4, 5, 6, 7, 8, 9, 10  1 = 1, 3, 5, 7, 9, 8, 6, 4, 2  1 (1) = 1,  1 (2) = 3,  1 (3) = 5,  1 (4) = 7, etc.  Key can be used to control the permutation used to

Computer Science and Engineering Example  ABCDEFGHIJKLMNOPQRSTUVWXYZ  wordabcefghijklmnpqstuvxyz  ABCDEFGHIJKLMNOPQRSTUVWXYZ  profesinalbcdghjkmqtuvwxyz

Computer Science and Engineering Cryptanalysis of substitution ciphers  Clues  Short words  Words with repeated patterns  Common initial and final letters  ….  Brute force attack (could be impossible – more than 1000 years)  Knowledge of language may simplify it  English E, T, O, A occur far more than J, Q, X, Z  Context

Computer Science and Engineering Vernam Cipher EncryptionDecryption plaintextOriginal plaintext ciphertext Non-repeating series of numbers

Computer Science and Engineering Example Plaintext  V E R N A M C I P H E R  Random numbers  Sum  Sum mod 26  Ciphertext  t a h r s p i t x m a b

Computer Science and Engineering Transposition  The letters of the message are rearranged  Columnar transposition  Example: THIS IS A MESSAGE TO SHOW HOW A COLMUNAR TRANSPOSITION WORKS

Computer Science and Engineering T H I S I S A M E S S A G E T O S H O W H O W A C O L M U N A R T R A N S P O S I T I O N W O R K S tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasna