CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Data Encryption Standard (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
Chapter 5 Cryptography Protecting principals communication in systems.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 23 Symmetric Encryption
Review What is security: history and definition Security policy, mechanisms and services Security models.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Network Security Chapter
CSE 651: Introduction to Network Security
Lecture 2 Overview.
CIS 725 Security. Cryptosystem Quintuple ( E, D, M, K, C ) M set of plaintexts K set of keys C set of ciphertexts E set of encryption functions e: M 
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
Information Systems Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Symmetric-Key Cryptography
Terminology and classical Cryptology
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
September 10, 2009Introduction to Computer Security ©2004 Matt Bishop Slide #8-1 Chapter 8: Basic Cryptography Classical Cryptography Public Key Cryptography.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Lecture 2: Introduction to Cryptography
Lecture 23 Symmetric Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Network Security Lecture 3 Secret Key Cryptography
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
@Yuan Xue Quick Review.
Cryptography.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
Computer Security Chapter Two
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography

CIT 380: Securing Computer SystemsSlide #2 Perfect Security: The One-Time Pad A Vigenère cipher with a random key at least as long as the message. Provably unbreakable. Example ciphertext: DXQR. Equally likely to correspond to –plaintext DOIT (key AJIY ) –plaintext DONT (key AJDY ) –and any other 4 letters.

CIT 380: Securing Computer SystemsSlide #3 One-Time Pad Warning: keys must be random, or you can attack the cipher by trying to regenerate the key. Approximations, such as using computer pseudorandom number generators to generate keys, are not random.

CIT 380: Securing Computer SystemsSlide #4 Block Ciphers Encrypt groups (blocks) of chars at once. Improvement over single char substitution –Cryptanalysis must use digraph frequencies for two-char blocks. –Longer blocks are more difficult to analyze. –Modern ciphers are block ciphers. Example: Playfair Cipher, 1854

CIT 380: Securing Computer SystemsSlide #5 Playfair Cipher Create 5x5 table –Fill in spaces with letters of key, dropping duplicate letters. –Fill remaining spaces with unused letters of alphabet in order Drop Q … or I = J PLAYF I|JREXM BCDGH KNOQS TUVWZ

CIT 380: Securing Computer SystemsSlide #6 Playfair Cipher Encryption Algorithm 1.If letters of pair are identical (or only one letter remains), add an “X” after first letter. 2.If two letters are in same row or column, replace them with the succeeding letters. 3.Otherwise, two letters form a rectangle, and we replace them with letters on the same row respectively at the other pair of corners.

CIT 380: Securing Computer SystemsSlide #7 Playfair Cipher Example Plaintext is HELLO WORLD –Pair HE is rectangle, replace with DM –Pair LX (X inserted) is rectangle, YR –Pair LO is rectangle, replace with AN –Pair WO is rectangle, replace with VQ –Pair RL is in column, replace with CR –Pair DX is rectangle, replace with GE Ciphertext is DMYRANVQCRGE

CIT 380: Securing Computer SystemsSlide #8 Transposition Cipher Cryptanalysis Anagramming –If 1-gram frequencies match English frequencies, but other n-gram frequencies do not, –then, message likely ciphered via transposition. –Rearrange letters to form n-grams with highest frequencies.

CIT 380: Securing Computer SystemsSlide #9 Cryptanalysis Example Rail Fence Ciphertext: HLOOLELWRD Frequencies of 2-grams beginning with H –HE –HO –HL, HW, HR, HD < Frequencies of 2-grams ending in H –WH –EH, LH, OH, RH, DH ≤ Implies E follows H

CIT 380: Securing Computer SystemsSlide #10 Cryptanalysis Example Arrange so the H and E are adjacent HE LL OW OR LD Read across, then down, to recover plaintext.

CIT 380: Securing Computer SystemsSlide #11 Shannon Criteria 1.Kerchoff’s Principle –The only secret should be the key. –Cipher should be secure if mechanism known but not the key. 2.Use both substitution + permutation –Substitution: hide local patterns of language. –Permutation: hide large-scale patterns by mixing different parts of plaintext.

CIT 380: Securing Computer SystemsSlide #12 SP-Networks Combine Substitution+Permutation (transposition) –Substitution: adding unknown key values will confuse attacker about value of plaintext symbol. –Permutation: Transposing text to ensure nothing is left in its original position. Designing for Security –Block Size –Number of Rounds Each input bit is XOR of several output bits from previous round. –Choice of S-boxes

CIT 380: Securing Computer SystemsSlide #13 Overview of the DES 1.Block cipher: encrypts blocks of 64 bits –56-bit key + 8 parity bits 2.Product cipher –substitution + transposition 3.16 rounds (iterations) of encryption –Round key generated from user key –Each round is a Feistel network.

CIT 380: Securing Computer SystemsSlide #14 DES Modes Electronic Code Book Mode (ECB) –Encipher each block independently. Insecure. Cipher Block Chaining Mode (CBC) –XOR each block with previous ciphertext block. –Requires an initialization vector for the first one.

Triple DES :Encrypt-Decrypt-Encrypt Mode (3 keys: k, k´, k´´) –c = DES k (DES k´ –1 (DES k’’ (m))) –Double-encryption vulnerable to meet-in- middle attack, reducing difficulty from to CIT 380: Securing Computer SystemsSlide #15

CIT 380: Securing Computer SystemsSlide #16 CBC Mode Encryption  init. vector m1m1 DES c1c1  m2m2 c2c2 sent … … …

CIT 380: Securing Computer SystemsSlide #17 Current Status of DES Design for computer system, associated software that could break any DES-enciphered message in a few days published in Several challenges to break DES messages solved using distributed computing.

Advanced Encryption Standard NIST selected Rijndael as Advanced Encryption Standard, successor to DES. –128-bit block product cipher. –Designed to withstand attacks that succeeded on DES. –Keys: 128, 192, or 256 bits. CIT 380: Securing Computer SystemsSlide #18

CIT 380: Securing Computer SystemsSlide #19 Key Points 1.Cryptography is the art of securing messages. 2.Types of ciphers 1.Substitition 2.Transposition (permutation) 3.Product

Key Points 3.Cryptanalysis 1.Language features can be used to break ciphers. 2.Frequency analysis: Kaski test, Index of Coincidence. 4.Block ciphers 1.DES CIT 380: Securing Computer SystemsSlide #20

Public Key Cryptography Bob’s Key Pair – Public Bob, Private Bob Alice’s Key Pair –Public Alice, Private Alice Bob and Alice know each other’s public key, in fact everyone may know their public keys CIT 380: Securing Computer SystemsSlide #21

Encryption/Decryption Bob to Alice –Encryption by Bob CipherText = Public Alice (Message) –Decryption by Alice Message = Private Alice (CipherText ) Confidentiality is ensured because only Alice knows her private key CIT 380: Securing Computer SystemsSlide #22

Integrity/Non-repudiation Bob to Alice –Bob signs his message SignedDoc= Private Bob (Doc ) – Alice verifies the signature Doc = Public Bob (SignedDoc) CIT 380: Securing Computer SystemsSlide #23

Confidentiality + Integrity Bob to Alice –Encryption + Signing by Bob CipherText = Private Bob (Public Alice (Message)) –Decryption + Verifying by Alice Message = Private Alice (Public Bob ( CipherText )) CIT 380: Securing Computer SystemsSlide #24

RSA Key generation Encryption Decryption A worked example CIT 380: Securing Computer SystemsSlide #25

CIT 380: Securing Computer SystemsSlide #26 References 1.Matt Bishop, Introduction to Computer Security, Addison-Wesley, Paul Garrett, Making, Breaking Codes: An Introduction to Cryptology, Prentice Hall, David Kahn, The Codebreakers, MacMillan, Wenbo Mao, Modern Cryptography: Theory and Practice, Prentice Hall, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.Alfred J. MenezesPaul C. van OorschotScott A. Vanstone 6.NIST, FIPS Publication 46-3: Data Encryption Standard (DES), 1999, 7.Bruce Schneier, Applied Cryptography, 2 nd edition, Wiley, US Government Dept of the Army, FM FIELD MANUAL, 1990, 9.John Viega and Gary McGraw, Building Secure Software, Addison- Wesley, 2002.