Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.

Similar presentations


Presentation on theme: "Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004."— Presentation transcript:

1 Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004

2 Computer Science and Engineering Contents  Algorithms (Revisited)  Operating Systems Review  Students Topics for Presentation  Encryption  Substitution and Transposition Ciphers

3 Computer Science and Engineering Algorithms -- revisited Hashing - Why? Hash Tables Hash Functions Insert Lookup

4 Computer Science and Engineering Applications OS -- Review OS – a program that acts as an intermediary between a user of a computer and the computer hardware. OS Hardware Users

5 Computer Science and Engineering OS -- Review OS Services Program Execution I/O Operation File System manipulation Communications Error detection Resource Allocation Accounting Protection

6 Computer Science and Engineering OS -- Review Process Memory Management

7 Computer Science and Engineering Student Presentations (15 minutes) 8/31 9/2 9/7 9/9

8 Computer Science and Engineering Main Components in Sending Messages senderreceiverMedium Intruder Block it Intercept it Modify it Fabricate an authentic looking message

9 Computer Science and Engineering Cryptography nSecret writing nDisguised data cannot be read, modified, or fabricated easily nEncryption : encoding (encipher) n plaintext  cipher text P =  C = C = E(P) (E = encryption rule) nDecryption : decoding (decipher) n Cipher text  plaintext C =  P = P = D(C) (D = decryption rule)

10 Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext

11 Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext EncryptionDecryption plaintext Original plaintext ciphertext Symmetric Cryptosystem Asymmetric Cryptosystem key KEKE KDKD

12 Computer Science and Engineering Cryptanalysis nHow to break an encryption! nCryptanalyst n Deduce the original meaning of the ciphertext n Determine the decryption algorithm that matches the encryption one used Breakable Encryption!

13 Computer Science and Engineering Ciphers  Substitution Ciphers Substitute a character or a symbol for each character of the original message  Transposition Ciphers The order of letters is rearranged (Uppercase – plaintext, lowercase – ciphertext)

14 Computer Science and Engineering Exercise wklv phvvdjh lv qrw wrr kdug wr euhdn

15 Computer Science and Engineering The Caesar Cipher -- Substitution  C i = p i + 3 A  d B  e C  f … X  a Y  b Z  c  Time complexity  table search  ??

16 Computer Science and Engineering Cryptanalysis of the Caesar Cipher  TREATY IMPOSSIBLE  wuhdwb lpsrvvleoh  Break is preserved  Double letters are preserved  Repeated letters

17 Computer Science and Engineering Other Substitutions  Permutation – Alphabet is scrambled, each plaintext letter maps to a unique ciphertext letter For example 1, 2, 3, 4, 5, 6, 7, 8, 9, 10  1 = 1, 3, 5, 7, 9, 8, 6, 4, 2  1 (1) = 1,  1 (2) = 3,  1 (3) = 5,  1 (4) = 7, etc.  Key can be used to control the permutation used to

18 Computer Science and Engineering Example  ABCDEFGHIJKLMNOPQRSTUVWXYZ  wordabcefghijklmnpqstuvxyz  ABCDEFGHIJKLMNOPQRSTUVWXYZ  profesinalbcdghjkmqtuvwxyz

19 Computer Science and Engineering Cryptanalysis of substitution ciphers  Clues  Short words  Words with repeated patterns  Common initial and final letters  ….  Brute force attack (could be impossible – more than 1000 years)  Knowledge of language may simplify it  English E, T, O, A occur far more than J, Q, X, Z  Context

20 Computer Science and Engineering Vernam Cipher EncryptionDecryption plaintextOriginal plaintext ciphertext Non-repeating series of numbers

21 Computer Science and Engineering Example Plaintext  V E R N A M C I P H E R  21 4 17 13 0 12 2 8 15 7 4 17 Random numbers  76 48 16 82 44 3 58 11 60 5 48 88 Sum  97 52 33 95 44 15 60 19 75 12 52 105 Sum mod 26  19 0 7 17 18 15 8 19 23 12 0 1 Ciphertext  t a h r s p i t x m a b

22 Computer Science and Engineering Transposition  The letters of the message are rearranged  Columnar transposition  Example: THIS IS A MESSAGE TO SHOW HOW A COLMUNAR TRANSPOSITION WORKS

23 Computer Science and Engineering T H I S I S A M E S S A G E T O S H O W H O W A C O L M U N A R T R A N S P O S I T I O N W O R K S tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasna


Download ppt "Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004."

Similar presentations


Ads by Google