Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security – Additional material.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Lecture 3.3: Public Key Cryptography III CS 436/636/736 Spring 2012 Nitesh Saxena.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Announcement Homework 1 out, due 1/18 11:59pm If you purchased the textbooks, but it hasn’t arrived, please see TA for copies of the questions, Project.
Review Overview of Cryptography Classical Symmetric Cipher
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter 3 Encryption Algorithms & Systems (Part B)
Chapter 9 – Public Key Cryptography and RSA Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  shared by both.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Introduction to Computer and Network Security Iliano Cervesato 2 September 2008 – Public-key Encryption.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
A Cryptography Tutorial Jim Xu College of Computing Georgia Tech
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The RSA Algorithm Rocky K. C. Chang, March
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Computer System Security CSE 5339/7339
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Introduction to Cryptography Multimedia Security.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Merkle-Hellman Knapsack Cryptosystem
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
Presentation transcript:

Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang

Contents n MODELS,GOALS,AND EARLY CIPHER SYSTEMS n THE SECRECY OF A CIPHER SYSTEM n PRACTICAL SECURITY n STREAM ENCRYPTION n PUBLIC KEY CRYPTOSYSTEMS

Model of a cryptographic channel Plaintext M Encipher Decipher Public channel Plaintext Cryptanalyst Key Ciphertext K K Secure channel

The two primary reasons for using cryptosystems in communications n (1)privacy,to prevent unauthorized persons from exacting information from the channel n (2)authentication,to prevent unauthorized persons from injecting information into the channel

System Goals The major requirements for a cryptosystem 1.To provide an easy and inexpensive means of encryption and decryption to authorized users in possession of the appropriate key 2.To ensure that the cryptanalyst’s task of producing an estimate of the plaintext without benefit of the key is made difficult and expensive

Classic Threats n Ciphertext-Only Attack n Known-Plaintext Attack n Chosen-Text Attack

Classic Ciphers n Caesar Cipher ex. Plaintext : N O W I S T H E T I M E : Ciphertext : Q R Z L V W K H W L P H n Polybius square. Plaintext : NOWI S T H E T I M E Ciphertext: n Polyalphabetic cipher. Plaintext: NOWI S T H E T I M E Ciphertext: OQZMXZ O M CS X Q

Caesar’s alphabet with a shift of 3 Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ CHIPHERTEXT: DEFGHIJKLMNOPQRSTUVWXYZABC Polybius square A B C D E F G H IJ K L M N O P Q R S T U V W X Y Z

Trithemius progressive key

THE SECRECY OF A CIPHER SYSTEM What is Perfect Secrecy?? Entropy and Equivocation Rate of a language and Redunancy Unicity Distance and Ideal Secrecy

P(M o )=1/4M0M0 0 C0C0 1 C1C1 C2C2 2 C3C3 3 P(M 1 )=1/4 M1M1 P(M 2 )=1/4 M2M2 P(M 3 )=1/4 M3M3 PlaintextCiphertext Example of perfect secrecyKey C s =T k j (M i ) S=( ) modulo-N

PRACTICAL SECURITY n Substitution n Permutation n Product Cipher System n The Data Encryption Standard

Substitution box n=3 input 2 n = output n = input output

Permutation box input output

Individual keying capability Example of binary key

Initial Permutation (IP)

E-Table Bit Selection

P-Table Permutation

Final Permutation (IP -1 )

Key Permutation PC

Key Schedule of Left Shifts Iteration Number of left shifts i

Key Permutation PC

STREAM ENCRYPTION n Key Generation Using a Linear Feedback Shift Register n Vulnerabilities of Linear Feedback Shift Registers

Linear feedback shift register example feedback output x4x4 x3x3 x2x2 x1x1 Modulo-2 adder

PUBLIC KEY CRYPTOSYSTEMS n Signature Authentication Using a Public Key Cryptosystem n A Trapdoor One-Way Function n The Rivest-Shamir-Adelman Scheme n The Knapsack Problem n A Public Key Cryptosystem Based on a Trapdoor Knapsack

The important features of a public key cryptosystem n The encryption algorithm,,and the decryption algorithm,,are invertible transformations on the plaintext,M,or the ciphertext,C,defined by the key K.That is,for each K and M, n For each K, and are easy to compute. n For each K,the computation of from is computa-tionally intractable.

Public Key cryptosystem M Crypto machine Subscriber A Directory A- B- C-.. Crypto machine Subscriber B M

Signature authenticaton using a public key cryptosystem M Crypto machine A Date Crypto machine A Public channel Directory Crypto machine B Crypto machine B M Directory Signature storage

The Rivest-Shamir-Adelman Scheme 1.Each user chooses his own value of n and another pair of positive integers (e,d),and n=pq, =(p-1)(q-1),gcd[,d]=1, ed modulo- =1,and p,q are prime numbers. 2..The user places his encryption key the number pair (n,e),in the public directory. 3. The decryption key consists of the number pair (n,d),of which d is kept secret. 4.messages are first represented as integers in the range (0,n-1) 5.Encryption: modulo-n Decryption: modulo-n RSA

How to Compute e A variation of Euclid’s algorithm for computing the gcd of and d is to compute e 1.First,compute a series …... where =, =d,and = modulo-,until an =0 is found. than the gcd (, d )= 2.For each compute numbers and such that = + 3.If =1,then is the multiplicative inverse of modulo-.If is a negative number, the solution is +

The Knapsack problem 1.Let us express the knapsack problem in terms of a knapsack vector ‘a’ and a data vector ’ x’. 2.The knapsack,S,is the sum of a subset of the components of the knapsack vector where = ax

Super-increasing and how to slove “x” 1.super-increasing is 2.When a is super-incresing,the solution of x is found by starting with if S (otherwise ),and continuing as follows: = where

A Public key Cryptosystem Based on a Trapdoor Knapsack -this scheme,also known as the Merkle-Hellman scheme method: 1.we form a super-increasing n-tuple a’,and select a prime number M such that,also select a random number,W, where 1<W<M,and we form to satisfy the following relationship: W modulo -M =1,note:the vector a’ and the number M,W, are all kept hidden. 2.we form a with the elements from a’ as: modulo-M

3.When a data vector x is to be transmitted,we multiply x by a, yielding the number S,which is sent on the public channel. 4.The authorized user receives S and converts it to S’ : = = 5.Since the authorized user knowns the secretly held super-increasing vector a’,he can use S’ to find x.

CONCLUSION 1.We have presented the basic models and goals of the cryptographic process,and looked at some early cipher systems. 2.We defined a system that can exhibit perfect secrecy. 3.We outlined the DES algorithm in detail,and we also considered the use of linear feedback shift registers(LFSR) for stream encryption systems. 4.RSA scheme,based on the product of two large prime numbers, and the Merkle-Hellman scheme,based on the classical knapsack problem.