Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-

Slides:



Advertisements
Similar presentations
Cryptography and Network Security
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 2
Cryptography and Network Security Chapter 2. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts.
CSCE 790G: Computer Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Classical Encryption Techniques
Review What is security: history and definition Security policy, mechanisms and services Security models.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Cryptography is the technique of secret writing.
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security and Management 2. Classical Encryption Techniques Chih-Hung Wang Fall
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security Chapter 2. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
1 Ch. 2 Classical Encryption Techniques. 2 Contents Symmetric Cipher Model Substitution Techniques Transposition Techniques Rotor Machines Steganography.
Classical Encryption Techniques CSE 651: Introduction to Network Security.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
11/21/ Session Plan Overview of Classical encryption techniques: Symmetric cipher model Substitution Transposition Steganography.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Cryptography. Introduction Cryptography is the art of achieving security by encoding messages to make them non- readable. Some cryptography algorithms.
Information Systems Security 3. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves,
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Conventional Encryption Message Confidentiality
Communication Security
Cryptography and Network Security
Part 1 By Dr. Shadi Masadeh
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
Conventional Encryption Message Confidentiality
“Classical Encryption Techniques”
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2- secret key Decryption Plaintext output

Symmetric Cipher Model Plaintext: The original intelligible message or data that is fed into the algorithm as input. Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext. Secret key: The secret key is also an input to the encryption algorithm. Ciphertext: The scrambled unintelligible message produced as output. Decryption algorithm: It takes the ciphertext and the secret key to produce the original plaintext.

Symmetric Cipher Model

Computer Security ( CS4800 ) Lecture 4 Ch.2 Classical Encryption Techniques Prepared by Dr. Lamiaa Elshenawy

Security Mathematics Encryption Y = E(K, X) Decryption X = D(K, Y) Chipertext Plaintext Secrete key Encryption algorithm Decryption algorithm

Security Requirements Strong encryption algorithm Secret key should be secret (sender/receiver)

Symmetric Cipher Model - Cryptology 1- Cryptography (enciphering) 2- Cryptanalysis (deciphering) - Cryptanalyst

Cryptography Encryption techniques  Substitution techniques  Transposition techniques Secret keys  Symmetric (single-key)  Asymmetric (two-key) Plaintext processing  Block cipher  Stream cipher

Cryptanalysis and Brute-Force Attack  Cryptanalysis ( plaintext-ciphertext pairs)  Brute-force attack (try possible keys) Objective recover the key

Cryptanalysis and Brute-Force Attack Unconditionally secure Computationally secure  Cost of breaking cipher > value of encrypted information.  Time of breaking cipher > lifetime of information.

4-bit key 56-bit key (DES) 128-bit key (AES) Key Size (bits)Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs = 4.3  µs= 35.8 minutes2.15 milliseconds = 7.2  µs= 1142 years10.01 hours = 3.4  µs= 5.4  years5.4  years = 3.7  µs= 5.9  years5.9  years 26 characters (permutation) 26! = 4   µs= 6.4  years6.4  10 6 years Cryptanalysis and Brute-Force Attack

Symmetric Cipher Techniques Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers (Vigenère cipher–Vernam cipher) One-Time Pad - Substitution techniques - Transposition techniques Rail fence

Caesar Cipher plain: meet me after the party cipher: PHHW PH DIWHU WKH SDUWB abcdefghijklmnopqrstuvwxyz DEFGHIGKLMNOPQRSTUVWXYZABC Letter 3 rd letter

Caesar Cipher C = E(K, P) = (P + K) mod 26 P = D(K, C) = (C - K) mod 26 abcdefghijklm nopqrstuvwxyz

Monoalphabetic Ciphers

Playfair Cipher 5 × 5 matrix Allied forces “MONARCHY” MONAR CHYBD EFGI/JK LPQST UVWXZ World War II

Hill Cipher C = E(K, P) = PK mod 26 P = D(K, C) = CK -1 mod 26 For 3 × 3 matrix

Polyalphabetic Ciphers Vigenère Cipher C i = (p i + k i mod m ) mod 26 p i = (C i - k i mod m ) mod 26

Vigenère Cipher “deceptive”

Vernam cipher

One-Time Pad Random key Unbreakable

Transposition techniques Rail fence “meet me after the toga party”

Symmetric Cipher Techniques Rotor machines Hebern rotor machine

Steganography Character marking Invisible ink Pin puncture Type writer correction ribbon

Thank you for your attention