CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan 20127748.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Cryptography encryption authentication digital signatures
Computer Science 101 Data Encryption And Computer Networks.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Ref. Cryptography: theory and practice Douglas R. Stinson
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Network Management and Security
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
CSE 651: Introduction to Network Security
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Section 3.6: An Introduction to Cryptography
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Pseudo-Random Functions 1/22 Encryption as Permutation Assume cryptosystem correct and P = C If x  x’ then E K (x)  E K (x’) So, no y is hit by more.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
1 Information Theory Nathanael Paul Oct. 09, 2002.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
CH15 –Security & Crypto.
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography Lecture 4.
PART VII Security.
Cryptography Lecture 3.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan

Contents 14.1 Models, Goals, and Early Cipher Systems A Model of the Encryption and Decryption Process System Goals Classic Threats Classic Ciphers 14.2 The Secrecy of a Cipher System Perfect Secrecy Entropy and Equivocation Rate of a Language and Redundancy Unicity Distance and Ideal Secrecy

Encryption and Decryption Cryptography: a technology for protecting digital asset and design security solution. Plaintext: a message Encryption: the process of transforming message into an unreadable format Ciphertext: the encrypted message Decryption: process turning ciphertext back into plaintext

 The two primary reasons for using cryptosystems: 1) Privacy: to prevent unauthorized persons from extracting information from the channel 2) Authentication: to prevent unauthorized persons from injecting information into channel.  Encryption have two categories: (1) Block: encrypts a block of plaintext at a time (2) Stream: encrypts data one bit or one byte at a time A Model of the Encryption and Decryption Process

 With encryption scheme, plaintext data should never appear in the ciphertext  With channel coding, codes are often in systematic form comprising unaltered message bits plus parity bits.  A single bit error at the input might change the value of output bits in block encryption. This effect is known as error propagation which is desirable cryptographic property  In case of channel coding, we would like system to correct as many errors as possible so that the output is relatively unaffected by input errors as possible. Difference between Encryption and channel coding:

System Goal : The two major requirements for a cryptosystem: 1. To provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key 2. To ensure that the cryptanalyst’s task of producing an estimate of the plaintext without benefit of the key is made difficult and expensive Associated with breaking a particular cryptosystem, two terms are used to describe the degree of difficulty Computationally secure: given enough computing power and disk storage space, the system could eventually be broken. Unconditionally secure: A cryptosystem that can never be broken even if an infinite amount of resources were dedicated to the effort is said to be unconditionally secure.

Classic Threats  The weakest classification of cryptanalytic threat on a system is called a ciphertext only attack cryptanalyst might have knowledge of the general system and the language used in message.  A more serious threat to a system is called a known plaintext attack involves knowledge of the plaintext and its ciphertext  When the cryptanalyst is in the position of selecting the plaintext, the threat is called a chosen plaintext attack.

Classic ciphers Caesar Cipher- earliest examples of a monoalphabetic cipher, used by Julius Caesar during the Gallic wars Sliding everything up by 3 alphabet. where D = A, E = B, F = C, and so on. Polybius square-the code is changed by a rearrangement of the letters in the 5 ⅹ 5. Row-column or column-row number pair

Trithemius progressive key- example of a polyalphabetic cipher. Select the first cipher character from the shift 1 row, the second cipher character from shift 2 row, and so on. Q Plaint text: Shift:

Vigenere key method: used keyword, the key dictates the row choices for encryption and decryption of each successive character in message. T Y P E The variation of key method, called vigenere auto (plain) key method, starts with single letter or word used as a priming key. The priming key dictates the starting row or rows for encrypting the first or first few plaintext characters. Plaintext characters themselves are used as the key for choosing the rows for encryption.

The Secrecy of a cipher system Perfect Secrecy  A cipher system in which the number of messages, the number of keys, and the number of ciphertext transformations are all equal is said to have perfect secrecy if and only if the following two conditions are met: 1. There is only one key transforming each message to each ciphertext. 2. All keys are equally likely.  Perfect secrecy is a very desirable objective since it means that the cipher system is unconditionally secure (can not be broken).

Example: Breaking a Cipher System When the Key Space is Smaller Than the Message Space  Consider that the 29-character ciphertext was produced by a Caesar cipher such that each letter has been shifted by K positions, where 1≤K≤25.  Show how a cryptanalyst can break this code.  In analyzing the ciphertext, reverse the process by creating rows such that each ciphertext letter is replaced by letters of decreasing rank.  The cipher is easily broken by trying all the keys, from 1 to 25, which give only one key (K=10) that produces the meaningful message: WHERE ARE THE HEROES OF YESTERYEAR

Entropy and Equivocation The amount of information in a message is related to the probability of occurrence of the message. Entropy, H(X): the average amount of information per message. It is the expected number of bits in an optimally encoded message X. It can be considered a measure of how much choice is involved in the selection of a message X and is given by Equivocation: the conditional entropy of X given Y, is a more useful measure for the cryptanalyst in attempting to break the cipher and is given by It can be thought of as the uncertainty that message X was sent, having received Y. The cryptanalyst would like H(X|Y) to approach zero as the amount of intercepted ciphertext, Y, increases.

Example: Entropy and Equivocation A sample message set consisting of 8 equally likely messages {X}=X 1, X 2,…,X 8. (a)Find the entropy associated with a message from the set {X}. (b)Given another equally likely message set {Y}=Y 1,Y 2. Consider that the occurrence of each message Y narrows the possible choices of X in the following way: If Y 1 is present: only X 1, X 2, X 3,or X 4 is possible If Y 2 is present: only X 5, X 2, X 7,or X 8 is possible Find the equivocation of message X conditioned on message Y. Solution: (a)P(X)=1/8 H(X)= 8[(1/8)log 2 8]=3bits/message (b)P(Y)=1/2.For each Y, P(X|Y)=1/4 for four of the X`s and P(X|Y)=0 for the remaining four X`s. Using equation, H(X|Y)=2[(1/2)*4(1/4)*log 2 4]= 2 bits/message - We can see that Knowledge of Y has reduced the uncertainty of X from 3 bits/message to 2 bits/message.

Rate of a Language and Redundancy The true rate of a language: the average number of information bits contained in each character and is expressed for messages of length N by For large N, estimates of r for written English range between 1 to 1.5 bits/ character. The absolute rate or maximum entropy of a language: the maximum number of information bits contained in each character assuming that all possible sequences of characters are equally likely and is given by where L: the number of characters in the language. For English alphabet, r’ = log 2 26 =4.7 bits/character. The redundancy of a language is defined in terms of its true rate and absolute rate as D = = 3.2 and the ratio D/r’= 0.68 is a measure of the redundancy in the language.

Unicity Distance and Ideal Secrecy Unicity distance describes the amount of ciphertext needed in order to break a cipher system. It is the smallest message length N for which key equivocation H(K|C) is close to 0. Shannon described an ideal secrecy system as one in which the equivocation of the key H(K|C) does not approach 0 as the amount of ciphertext approaches infinity; i.e. no matter how much ciphertext is intercepted, the key cannot be determined. Ideal secrecy describes a system that does not achieve perfect secrecy but is unbreakable because it does not reveal enough information to determine the key.

K

Question What are the two major requirements for cryptosytem?