Introduction to Cryptology Fall 2007. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Cryptography Lecture 1: Introduction Piotr Faliszewski.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Systems of Equations as Matrices and Hill Cipher.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Traditional Symmetric-Key Ciphers
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Cryptology aka Cryptography Tim Cahill Ryan Church.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography – Test Review
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Cryptography Survey.
Cryptography Survey.
Simple Encryption- Lesson 5
Computer Security Chapter Two
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Introduction to Cryptology Fall 2007

Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove integrity [1] Cryptography comes from the Greek words Kryptos, meaning hidden, Graphen, meaning to write. Cryptography is the art of communicating confidentially through an insecure channel Cryptanalysis is the art of deciphering those communications when one is not the legitimate receiver. Cryptology is the union of these two domains. Cryptology is actually the study of codes and ciphers.

Definitions Plaintext the original message that is to be changed into a secret form Cipher, Cryptosystem, Encryption Method is a procedure for converting the plaintext message into encrypted message – ciphertext The word cipher originates from the Hebrew word "Saphar," meaning "to number." Decryption - the process that conducted by the intended receiver to recover original message (plaintext) from the encrypted message (ciphertext) Key - keeps the message secret

Encryption-Decryption Plaintext Cipherte xt Encryption Method Encryption key Cipherte xt Plaintext Decryption method Decryption Key

Symmetric and Asymmetric Ciphers Symmetric Cipher – knowledge of encryption key is equivalent to knowledge of the decryption key, or the same key is used for encryption and decryption. Asymmetric Cipher (Public-Key Cryptosystem) the knowledge of encryption key give little information about the decryption key and vice versa

Early History of Cryptology Polybius’ Checkboard 205 – 123 B.C. Plaintext POLYBIUS produces the ciphertext ZYXWV5 UTSRQ4 PONML3 KIJHGF2 EDCBA

Julius Caesar Cipher The letters of the alphabet are coded as: A B C D... Z Caesar Cipher One of the simplest examples of a substitution or shift cipher Have been used by Julius Caesar to communicate with his army Caesar is considered to be one of the first persons to have ever employed encryption for the sake of securing messages

Caesar Cipher Caesar decided that shifting each letter in the message would be his standard algorithm Caesar simply replaced each letter in a message with the letter that is three places further down the alphabet - encryption BCDEFGHIJKLMNOPQRSTUVWXYZ EFGHIJKLMNOPQRSTUVWXYZABC A D

Caesar Cipher Ciphertext may be deciphered or decrypted by replacing each letter by the third previous letter. Example: Plaintext: dog Ciphertext: GRJ Example: Ciphertext: BDQD Plaintext: yana

Caesar Cipher Remember: we think of each letter as corresponding to a number from 0 to 25 To encrypt, we map numbers according to C  ( P + 3 )(mod 26) To decrypt, we map numbers according to P  (C – 3) (mod 26)

Substitution and Affine Ciphers General Substitution Cipher: To encrypt: C = (P + K) (mod 26), K is the KEY To decrypt: P = (C - K) (mod 26), K is the SAME KEY Affine Cipher: To encrypt: C = (A  P + B) (mod 26), A and B are KEYS. A is relatively prime to 26 To decrypt: P = A -1  (C - B) (mod 26) A -1 is multiplicative inverse of A mod 26