@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography and Network Security Sixth Edition by William Stallings.
Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea
CSCE 790G: Computer Network Security
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Cryptography Week-6.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Cryptography. Introduction Cryptography is the art of achieving security by encoding messages to make them non- readable. Some cryptography algorithms.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Instructor: Dania Alomar
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Public-Key Cryptography and RSA
Classical Polygraphic Ciphers
Cryptography and Network Security
CS4780 Cryptography and Information Security
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue

@Yuan Xue Cryptography Overview Cryptography is a strong tool against many kinds of security threats. Encryption (Symmetric/Asymmetric) Hash Function Message Authentication Code Digital Signature

@Yuan Xue Let’s start with encryption What encryption does. Introduce the basic concepts in encryption and study the encryption model. How encryption works. Examine the basic principles to design encryption algorithms. Start with two building blocks of encryption algorithms Build stronger and practical encryption algorithms How encryption can fail. Discuss cryptanalysis Show how encryption algorithms can be broken. How encryption can be applied. Study how encryption algorithms can be used as building blocks with protocols and structures to perform security services.

@Yuan Xue Model for Encryption Start with an example Suppose Alice wants to send a message to Bob. She wishes the message not to be understood by others. “secret codes”  substitute a letter for each letter in the original message.  The codes must be agreed by Bob Bob Alice

@Yuan Xue Caesar Cipher

@Yuan Xue Simple Encryption Model Desired Cryptosystem: P = D(E(P))

@Yuan Xue Symmetric Encryption Model The “key” is the key. The encryption/decryption algorithms (E and D) are published The key K is kept secret

@Yuan Xue Asymmetric Encryption Model The encryption/decryption algorithms (E and D) are published One key is published, the other is kept secret

@Yuan Xue Cryptography vs. Cryptanalysis Cryptography Studies the encryption and decryption schemes. Cryptanalysis studies how to “break the code”, i.e., how to decrypt the ciphertext without the knowledge of the encryption details.  Based on the knowledge of the attacker  Ciphertext only attack encryption algorithm and ciphertext  Known plaintext attack  More details later

@Yuan Xue Classical Encryption Algorithms How they work Why they work Any design principles behind?

@Yuan Xue Mono-Alphabetic Ciphers Caeser cipher How many possible substitutions? Bruce-force attack  Enumerate all possible keys Allow arbitrary substitution How many possible substitutions? How to represent the key? How to derive the key?

@Yuan Xue Attacking Encryption Scheme Goal break a single message deduce the key in order to break the subsequent messages. Approach Brute-force attack tires every possible key on a piece of cihphertext until an intelligible translation into plaintext is obtained. Cryptanalysis exploits the characteristics of the algorithm and the traces of structure or pattern in the plaintext that survive encryption  How ? -- Use statistical tools and properties of languages.

@Yuan Xue Frequency Analysis

@Yuan Xue Multiple-letter Ciphers Key idea: Treat consecutive letters in the plaintext as a single unit (block) and translate the unit into ciphertext. Benefit: Lessen the extent to which the structure of the plaintext survives in the ciphertext, thus are stronger against frequency analysis. Issue: How to specify a mapping (substitution)?

@Yuan Xue Single letter Bigram

@Yuan Xue Playfair Cipher Use a table to specify the mapping

@Yuan Xue Playfair Cipher Playfair cipher was invented in 1854 by Charles Wheatstone, but bears the name of Lord Playfair who promoted the use of the cipher. Playfair cipher takes two-letter combinations (digrams) as single units for encryption. The encryption algorithm takes a 5*5 matrix of letters as a key table to translate digrams. The key table is constructed by a keyword.

@Yuan Xue Playfair Cipher Details To encrypt a message, 1. If both letters are the same (or only one letter is left), add an ``x'' (any uncommon letter will do) after the first letter. For example, ``balloon'' would be treated as ``ba lx lo on''. 2. If the letters appear on the same row of the table, replace them with the letters to their immediate right respectively (the table wraps around). For example, ar is encrypted as RM. 3. If the letters appear on the same column of the table, replace them with the letters immediately below respectively. For example, mu is encrypted as CM. 4. If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. For example, hs is encrypted as BP, and ea is encrypted as IM (or JM).