Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptography and Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography and Network Security Sixth Edition by William Stallings.
Cryptography and Network Security Chapter 2
Cryptography and Network Security Chapter 2. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts.
CSCE 790G: Computer Network Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Classical Encryption Techniques
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Information Security Prepared By: Prof. Ajaykumar T. Shah
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography Cryptography is the technique of secret writing.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
Introduction to Information Security Chapter II : Classical Ciphers.
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Lec. 5 : History of Cryptologic Research II
Information Security and Management 2. Classical Encryption Techniques Chih-Hung Wang Fall
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security Chapter 2. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Classical Encryption Techniques CSE 651: Introduction to Network Security.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
11/21/ Session Plan Overview of Classical encryption techniques: Symmetric cipher model Substitution Transposition Steganography.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Computer Security (CS4800)
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction (Pendahuluan)  Information Security  Criptography.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Conventional Encryption Message Confidentiality
Communication Security
Cryptography and Network Security
Part 1 By Dr. Shadi Masadeh
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
Conventional Encryption Message Confidentiality
“Classical Encryption Techniques”
CLASSICAL ENCRYPTION TECHNIQUES
Presentation transcript:

Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1

 Symmetric Cipher Model 1. Cryptography 2. Cryptanalysis and Brute-Force Attack  Substitution Techniques 1. Caesar Cipher 2. Monoalphabetic Ciphers 3. Playfair Cipher 4. Hill Cipher 5. Polyalphabetic Ciphers 6. One-Time Pad  Transposition Techniques  Rotor Machines  Steganography

 Symmetric encryption (conventional encryption) is a form of cryptosystem in which encryption and decryption are performed using the same key  Symmetric encryption transforms plaintext into ciphertext using a secret key and an encryption algorithm and decrypt by the same key and a decryption algorithm  Two types of attack on an encryption algorithm 1. Cryptanalysis based on properties of the encryption algorithm 2. Brute-force, trying all possible keys

 Traditional (pre-computer) symmetric ciphers use substitution and/or transposition techniques 1. Substitution techniques map plaintext elements (characters, bits) into ciphertext elements 2. Transposition techniques systematically transpose the positions of plaintext elements  Rotor machines are sophisticated pre-computer hardware devices that use substitution techniques.  Steganography is a technique for hiding a secret message within a larger one in such a way that others cannot discern the presence or contents of the hidden message.

Ciphertext Input Decryption algorithm Secret key Decryption Plaintext output Plaintext Input Encryption algorithm Secret key Encryption Ciphertext output

 Plaintext: The original intelligible message or data that is fed into the algorithm as input  Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext  Secret key: The secret key is also an input to the encryption algorithm  Ciphertext: The scrambled unintelligible message produced as output  Decryption algorithm: It takes the ciphertext and the secret key to produce the original plaintext

Encryption Y = E(K, X) Decryption X = D(K, Y) Chipertext Plaintext Secrete key Encryption algorithm Decryption algorithm

 Strong encryption algorithm  Secret key should be secret (sender/receiver)

 Cryptology 1- Cryptography (enciphering) 2- Cryptanalysis (deciphering)  Cryptanalyst (Opponent-Adversary- Hacker)

 Encryption techniques  Substitution techniques  Transposition techniques  Secret keys  Symmetric (single-key)  Asymmetric (two-key)  Plaintext processing  Block cipher (processes one block of input elements at a time)  Stream cipher (processes one of input elements at a time)

 Cryptanalysis ( plaintext-ciphertext pairs- algorithm nature)  Brute-force attack (try possible keys)  Objective recover the key

 Unconditionally secure  Computationally secure  Cost of breaking cipher > value of encrypted information  Time of breaking cipher > lifetime of information

 32-bit key  56-bit key (DES)  128-bit key (AES)  168-bit Key Key Size (bits)Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs = 4.3  µs= 35.8 minutes2.15 milliseconds = 7.2  µs= 1142 years10.01 hours = 3.4  µs= 5.4  years5.4  years = 3.7  µs= 5.9  years5.9  years 26 characters (permutation) 26! = 4   µs= 6.4  years6.4  10 6 years DES: Data Encryption Standard AES: Advanced Encryption Standard

1. Caesar Cipher 2. Monoalphabetic Ciphers 3. Playfair Cipher 4. Hill Cipher 5. Polyalphabetic Ciphers (Vigenère cipher– Vernam cipher) 6. One-Time Pad  - Substitution techniques  - Transposition techniques Rail fence

 Plaintext: meet me after the party  Ciphertext: PHHW PH DIWHU WKH SDUWB abcdefghijklmnopqrstuvwxyz DEFGHIGKLMNOPQRSTUVWXYZABC Letter 3 rd letter Gaius Julius Caesar: Roman Dictator, 1st century BC

 C = E(K, P) = (P + K) mod 26  P = D(K, C) = (C - K) mod 26 abcdefghijklm nopqrstuvwxyz

 5 × 5 matrix  Allied forces “MONARCHY” MONAR CHYBD EFGI/JK LPQST UVWXZ World War II Baron Playfair is a British scientist and a friend of Sir Charles Wheatstone in1854

 Example:  Plaintext: “How are you” “HO WA RE YO UQ”  Ciphertext: “FH XN MK HN WL”

 C = E(K, P) = PK mod 26  P = D(K, C) = CK -1 mod 26  For 3 × 3 matrix Lester S. Hill (1891–1961) :An American mathematician and educator

1. Vigenère Cipher 2. Vernam Cipher

 C i = (p i + k i mod m ) mod 26  p i = (C i - k i mod m ) mod 26 Blaise de Vigenère (5 April 1523 – 19 February 1596): French diplomat, cryptographer, translator and alchemist

“decpective”

Gilbert Sandford Vernam (3 April 1890 – 7 February 1960): American scientist

 Let the message be “IF” then its ASCII code be ( ) and the key be ( )  Encryption: Plaintext: Key: Ciphertext:  Decryption: Ciphertext: Key: Plaintext:

 An Army Signal Corp officer, Joseph Mauborgne, proposed an improvement to Vernam cipher that yields the ultimate in security  Mauborgne suggested using random key one time to encrypt and decrypt a single message  Random key  Unbreakable  One-time pad is the only cryptosystem that is referred to as perfect secrecy Joseph Mauborgne was American General (February 26, 1881 – June 7, 1971) co-invented the one time pad with Gillbert Vernam in 1914

Example

 Rail fence “meet me after the toga party”

Hebern rotor machine Rotor machines

 Steganography Character marking Invisible ink Pin puncture Type writer correction ribbon

Thank you for your attention