Download presentation
Presentation is loading. Please wait.
1
M. en C. Nidia Asunción Cortez Duarte
INSTITUTO POLITÉCNICO NACIONAL ESCUELA SUPERIOR DE CÓMPUTO Cryptography M. en C. Nidia Asunción Cortez Duarte
2
Maestría en Ciencias (Criptografía) CINVESTAV-IPN
Ingeniería Sistemas Computacionales ESCOM-IPN (10ma generación) Departamento de Ingeniería en Sistemas Computacionales Cryptography -NCD
3
Why did you choose this optative class?
Name Why did you choose this optative class? What do you know about cryptography? What’s the difference between cryptography and security information? Do you like program in HW or SW? Why? Cryptography -NCD
4
2015-2016/02 Group 3CM3 Monday, Thursday 7:00 - 8:30
Friday 8:30 – 10:00 Laboratory LS3 (tolerance of 10 min) Cryptography -NCD
5
AIM OF THE LEARNING UNIT: The student designs primitives and cryptographic applications using existant algorithms, techniques and existant tools. Cryptography -NCD
6
Alice Bob Cryptography -NCD
7
Alice Bob Candy Cryptography -NCD
8
Security Shell Model Cryptography -NCD
9
CONTENTS: U1: Cryptography Fundamentals. U2: Symmetric Cryptography.
Definition and importance of cryptography Cryptographic services. Cryptographic system characteristics Attacks U2: Symmetric Cryptography. Symmetric cryptography characteristics Perfect secrecy Classical cryptosystems Modern cryptography algorithms Modes of operation Cryptography -NCD
10
CONTENTS: U3: Public key Cryptography. U4: Digital Signatures.
Public key cryptography characteristics. Integers modulo n. Number theory Public key algorithms U4: Digital Signatures. Hash functions Message authentication codes: MAC Digital signatures. Cryptography -NCD
11
REFERENCES Trappe, W. Washington, L. (2006). Introduction to Cryptography with Coding Theory (2ª Ed.). United States of America: Ed. Prentice Hall. ISBN-13: Stallings, W. (2010). Cryptography and network security (5ª Ed.). United States of America: Ed. Prentice Hall. ISBN-13: Stinson, D. R. (2005). Cryptography: theory and practice (3ª Ed.). United States of America: Ed. Chapman&Hall/CRC. ISBN-13: Konheim, A. G. (2007). Computer Security and cryptography. United States of America: Ed. John Wiley & Sons. ISBN-13: Paar, C. Pelzl, J. Preneel B. (2009). Understanding Cryptography: A textbook for students and practitioners. United States of America: Ed. Springer Verlag. ISBN-13: Cryptography -NCD
12
LEARNING EVALUATION Assessment Portfolio of Evidences: Exercise-solving (class or hw) 30% 20% Laboratory Practices 20% 30% Learning Evidence 40% 40% 30% Quiz(s) 10% 10% Project 10% 70% Cryptography -NCD
13
HW1 Read the story "The Gold Bug" In teams of 5 next Monday expose the story in English! Cryptography -NCD
14
Class Cryptography -NCD
15
Since humans began sending each other secret
messages, they have been writing in code. Those messages were Military plans Sensitive blueprints Love letters Encrypting the communication can protect it from prying eyes. Cryptography -NCD
16
The search for the unbreakable code continues!
For thousands of years we have been inventing codes, and when those were broken we set about inventing better codes. The search for the unbreakable code continues! Cryptography -NCD
17
Cryptography Since a dictionary Kriptos = hide and graphos = write,
the art to write in an enigmatic mode. . Cryptography -NCD
18
Cryptography Classical Modern Transposition Substitution Symmetric
Asymmetrical Block Flows Cryptography -NCD
19
Exersice Encrypt your first name with all the classic ciphers we will see Cipher n i d i a key Caesars QLGLD Shift-3 … … … Cryptography -NCD
20
Exercise Suppose someone uses the Shift-19 cipher and sends the message LHXTLR to you, find the original message. Cryptography -NCD
21
Encrypt “cryptography class”
Let C1=3p+2 C2= 2p+5 Encrypt “cryptography class” Cryptography -NCD
22
Encrypt “cryptography class”
Let C1=3p+2 C2= 2p+5 Encrypt “cryptography class” Cryptography -NCD
23
Let Encryption function C=7p+5 Find the decryption function
C= LFICHLFIJTBIJLH Find the plaintext Cryptography -NCD
24
Ancient Egyptian hieroglyps
Julius Caesar 100 BC Roman Shift Cipher Rosetta Stone Ancient Egyptian hieroglyps Demotic Ancient Greek Egyptian writing system hieroglyph Cryptography -NCD
25
Slaves Shift-cipher Pig-pen Enigma Machine Cryptography -NCD
26
Vigenere Encrypt p=cryptography class using the key=secret
Cryptography -NCD
27
Cryptography “The study of mathematical techniques related to the aspects of information security, such as confidentiality, integrity and availability of the data, authentication of entity and origin, it doesn’t includes only the media to provide information security, but to a set of techniques.” Menezes & Vanstone Handbook of Applied Cryptography Cryptography -NCD
28
Cryptography Text Message which will be transmited in a safe way. Cipher Message that results after an encryption of the text. Key Is the information which allows to encrypt and decrypt the message. Cryptography -NCD
29
Cryptography : the art to write in an enigmatic mode
Cryptology Discipline which studies how to achieve secure communications over ways which aren’t besides it resolves another issues. (Disciplina que estudia cómo lograr comunicaciones seguras a través de formas que no son) Cryptography : the art to write in an enigmatic mode Cryptoanalisys Discipline which studies how to break cryptographic schemas. Cryptography -NCD
30
Theory of the Information
In its clasification in science, cryptography comes from a branch of the mathematic, which was initiated by the mathematic Claude Elwood Shannon in 1948, denominated “Theory of the Information”. This branch of the science which is divided in: “Code Theory” and “Cryptology”. As the same way Cryptology is divided in Cryptanalisys and Cryptography, as it is shown in the next figure: Mathematics Theory of the Information Code Theory Cryptology Cryptography Cryptoanalisys Cryptography -NCD
31
Historically Cryptography can be clasified in two:
Clasification Historically Cryptography can be clasified in two: Classical Cryptography it’s the one which was used before the actual age until half XX Century. It also can be understood as non computarized cryptography or non digitized. The used methods were varied, some very simple and other very complex to cryptanalize for the age. It can be said that the modern Cryptography was initiated after 3 facts: The first was the publication of the “Theory of Information” by Shannon. The second, the appearance in 1974 of the standard of the encryption system DES (Data Encryption Standard) and finally with the appearance of the study in 1976 made by Whitfield Diffle and Martin Hellman about the application of mathematic functions in a single way to a decrypt model named public key encrypt. Both classical and modern cryptography are classified in accordance to the techniques or methods which are used to encrypt messages. Cryptography -NCD
32
Cryptography Classical Modern Transposition Sustitution Symmetric
Asymmetrical Block Flows Cryptography -NCD
33
As it was mentioned, classical cryptography is very old.
The cryptographical techniques were very clever and were used to send secret messages between people who had the power or in the war age to send instructions. Unlike the modern cryptography, the algorythm of the cryptographic system was kept in secret. Classical Cryptography also includes the construction of machines, which through mechanisms, commonly gear and rotors, they transform a clear message to a encrypted message, like the Enigma machine used in the World War II. Cryptography -NCD
34
Euclides: Greatestx common divisor [ 300BC]
Historical overview Euclides: Greatestx common divisor [ 300BC] • Eratóstenes: Sieve to find prime numbers[ 220BC] Fibonacci: algorithm for factoring integers[1200 AD] Cryptography -NCD
35
Fermat: Factoring and prime number theorem[ 1630 AD]
•Euler: Fermat’s general petit algorithm [1750 AD] • Gauss: new factoring algorithm [1820 AD] Cryptography -NCD
36
Scytale Cesar Codes Kama Sutra Encryption method by transposition
Classical Encrypt Scytale Encryption method by transposition [Sparta, 650 BC] Cesar Codes Encryption method by mono-alphabetical sustitution[Roman Empire, 50BC] Kama Sutra Hindu Technique which allowed lovers to communicate without being caught. [550 AD] Cryptography -NCD
37
Babington’s mono-alphabetical encryption
Used by Maria I, queen of the Scots [1542 AD] Cryptography -NCD
38
Sustitution Encrypt The encryption alphabet consists in a rearrangement of the original text’s alphabet. Like that each letter of the original alphabet is always replaced for the same letter of the encryption alphabet …How many different keys are in our alphabet? Cryptography-NCD Cryptography -NCD
39
Edgar Allan Poe (1809-1849) THE GOLD BUG
'A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.' 53++!305))6*;4826)4+.)4+);806*;48!8`60))85;]8*:+*8!83(88)5*!; 46(;88*96*?;8)*+(;485);5*!2:*+(;4956*2(5*-4)8`8*; );)6 !8)4++;1(+9;48081;8:8+1;48!85;4)485!528806*81(+9;48;(88;4(+?3 4;48)4+;161;:188;+?; Cryptography -NCD
40
Class 3 Cryptography -NCD
41
Introduction Cryptography is a very useful tool when we want
Computer Security confidentiality and integrity can be guaranteed, but we must know how to use it, to achieve that it’s important to have clear the basic concepts of the modern cryptographyc systems. Cryptography -NCD
42
The need of Information Security in an enterprise has changed in the last decades, before the use of the computers, Information Security was provided by physical media, for example the use of safes and administrative measures, like document clasification procedures. With the computer, and even more with the arrival of the Internet, it has been essential the use of automatized tools for the protection of files and information stored in the computers, some of this tools are firewalls, IDS (Intrution Detection System) and cryptographyc systems. Cryptography -NCD
43
Attacks Cryptography -NCD
44
Alice John Cryptography -NCD
45
Kerckhkoff’s Principle
Eva’s objectives 1.Read the original message. 2.Get Alice’s secret key. 3.Modify the original message. 4.Usurp Alice’s identity. Kerckhkoff’s Principle It parts from the premise that the foe knows the used cryptographic algorithm. So, the system’s security must be based on: • The algorithm quality (strenght). • The key size (bit size of the key). Cryptography -NCD
46
Alice John Eva Cryptography -NCD
47
Alice John Eva Interruption Cryptography -NCD
48
Alice John Eva Interruption Interception Cryptography -NCD
49
Alice John Eva Interruption Interception Modification
Cryptography -NCD
50
Alice John Eva Interruption Interception Modification Fabrication
Cryptography -NCD
51
“Yes, I do.” Alice “No, I don’t.” Alice Cryptography -NCD
52
Security According to the Real Spanish Academy means:
Definitions Security According to the Real Spanish Academy means: Attribute of secure. Said of a mechanism which assures a correct behavior, forseeing failures, frustration or violent. Information Security. We can talk about it like the set of rules, plans and actions which allow the assurance of the information keeping the properties of confidentiality, integity and availability. Confidentiality means that the information can be read only by those who are authorized. Integrity means that the information can only be created and modified for those who are authorized, and that the information keeps it hole structure and completeness. Avilability means that the information must be accessible for consult or modification in the time it’s needed only for those who are authorized. Computer Security. Set of policies and mechanisms which allows us to guarantee the confidentiality, integrity and availability of the system resources (Understand system resources as the processing memory, storage in a physical device, processing time, band width and the information stored in the system). Cryptography -NCD
53
Integridad Autenticación No repudio Cryptography -NCD
54
HOMEWORK Consider the spanish alphabet, m=3 P=“amigoconductor”
Key=“peligroso” find C Find 𝑘 −1 Download RFC DES Cryptography -NCD
55
Cryptography -NCD
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.