K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Lec. 5 : History of Cryptologic Research II
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
ITMS – 3153 Information Systems Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Terminology and classical Cryptology
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Modern Symmetric-key Ciphers
Lecture 3 Basic Security Concepts cont.. Homework 1. Score: 10 points Due: September 12, :00 am via dropbox Last day to submit with 4%/day penalty:
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Symmetric Algorithm of Cryptography
Cryptography.
Chapter-2 Classical Encryption Techniques.
- Stream Cipher and Block Cipher - Confusion & Diffusion
PART VII Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

K. Salah1 Cryptography Module I

K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it  Only the recipient should get it  Proof of the sender’s identity  Message shouldn’t be corrupted in transit  Message should be sent/received once only

K. Salah3 Terminology  Cipher: Arabic word means “meaningless” or “hiding meaning” The term cipher is used to refer to encryption and decryption algorithms. Decryption: recovering meaning from ciphertext  Cryptography: art and science of keeping messages secure  Cryptanalysis: art and science of breaking ciphertext Brute force attack Tries all possible keys on a piece of ciphertext  Cryptology: study of both cryptography and cryptanalysis

K. Salah4 Encryption and decryption  A key is a number (value) that the cipher, as an algorithm, operates on.  To encrypt a message, we need an encryption algorithm, an encryption key, and the plaintext. These create the ciphertext.  To decrypt a message, we need a decryption algorithm, a decryption key, and the ciphertext. These reveal the plaintext.  In cryptography, the encryption/decryption algorithms are public; the keys are secret.

K. Salah5 Symmetric-key cryptography  In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.  In symmetric-key cryptography, the same key is used in both directions  The algorithm used for decryption is the inverse of the algorithm used for encryption.  It takes less time to encrypt a message using a symmetric-key algorithm than it takes to encrypt using a public-key algorithm.  Symmetric-key cryptography is often used for long messages  Disadvantages: Each pair of users must have a unique symmetric key. Key distribution must be done secretly (difficult when parties are geographically distant, or don't know each other) Need a key for each pair of users n users need n*(n-1)/2 keys If the secret key (and cryptosystem) is compromised, the adversary will be able to decrypt all traffic and produce fake messages

K. Salah6 Symmetric (Secret Key) Cryptosystem Encryption Decryption Plaintext Ciphertext K SenderRecipient C=E(K,M) M=D(K,C) K needs secure channel

K. Salah7 Asymmetric or Public Key Cryptosystem Encryption Decryption Plaintext Ciphertext SenderRecipient C=E(K pub,M) M=D(K priv,C) Recipient’s public Key (K pub ) Recipient’s private Key (K priv ) K pub needs reliable channel

K. Salah8 Basic Encryption Techniques Substitution (Replacement) Substitution (Replacement) Transposition or Permutation (Rearranging) Transposition or Permutation (Rearranging) Combinations and iterations of these Combinations and iterations of these  The principle of “Rounds”

K. Salah9 Caesar cipher A cipher using the substitution method substitutes one symbol with another. A cipher using the substitution method substitutes one symbol with another. Monoalphabetic: A character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. Ex. Caesar Cipher. Monoalphabetic: A character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. Ex. Caesar Cipher. In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one Simple to implement but easy to break Simple to implement but easy to break  Common alphabets in English Letters E, T, O, A occur far more often than J, Q, X, Z  Can id the pattern easily

K. Salah10 Vigenere cipher In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many Each occurrence of a character can have a different substitute Each occurrence of a character can have a different substitute  ‘A’ can be changed to ‘D’ at the beginning, and later ‘A’ can be changed to ‘X’ at the middle Key is like: Take the position of the character in the text, divide the number by 10, and let the remainder be the shift value. Key is like: Take the position of the character in the text, divide the number by 10, and let the remainder be the shift value. Ex. Vigenere Cipher. Ex. Vigenere Cipher.  The reminder is not shifted, but chosen from a table Difficult to attack when compared to Monoalphabetic. Difficult to attack when compared to Monoalphabetic.

K. Salah11 Transpositional cipher The characters retain their plaintext form but change their positions to create the ciphertext. The characters retain their plaintext form but change their positions to create the ciphertext. The text is organized into a two-dimensional table, and the columns are interchanged according to a key. The text is organized into a two-dimensional table, and the columns are interchanged according to a key.

K. Salah12 Block cipher Modern ciphers use a block of bits as the unit of encryption/decryption. Modern ciphers use a block of bits as the unit of encryption/decryption. P-box (P for permutation) performs a transposition at the bit level. It can be implemented in hardware or software, but hardware is faster. P-box (P for permutation) performs a transposition at the bit level. It can be implemented in hardware or software, but hardware is faster.

K. Salah13 S-box S-box (S for substitution) performs a substitution at the bit level. S-box (S for substitution) performs a substitution at the bit level. The S-box substitutes one decimal digit with another. The S-box substitutes one decimal digit with another. The S-box normally has three components: an encoder, a decoder, and a P-box. The S-box normally has three components: an encoder, a decoder, and a P-box. The decoder changes an input of n bits to an output of 2 n bits. This output has one single 1 (the rest are 0s) located at a position determined by the input. The P-box permutes the output of decoder, and the encoder changes the output of the P-box backs to a binary number in the same way as the decoder, but inversely. The decoder changes an input of n bits to an output of 2 n bits. This output has one single 1 (the rest are 0s) located at a position determined by the input. The P-box permutes the output of decoder, and the encoder changes the output of the P-box backs to a binary number in the same way as the decoder, but inversely.  For example, If the number is 010    110

K. Salah14 What makes a good cryptosystem? A good cryptosystem is one whose security does not depend upon the secrecy of the algorithm.  Two reasons: Achieving security through obscurity does not last for long The algorithm can not be shared by public From Bruce Schneier:  “Good cryptographers rely on peer review to separate the good algorithms from the bad.'' Confusion (by substitution) Confusion (by substitution)  Has a complex relationship between plaintext/key and ciphertext  Not easy to deduce the relation and thus see a pattern Diffusion (by permutation) Diffusion (by permutation)  Distributing and spreading the information from plaintext over the entire ciphertext  Therefore, changes in plaintext produce numerous changes in different and random parts of the ciphertext, not the same ones!