Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Cryptography Made Easy Stuart Reges Principal Lecturer University of Washington.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Secure communication Informatics for economists II Jan Přichystal
Modern Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
A Glimpse of the History of Cryptography
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Cryptography Programming Lab
Cryptography & Cryptanalysis
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Encryption Coursepak little bit in chap 10 of reed.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
CRYPTOGRAPHY v/s CRYPTANALYSIS By Raghuveer Mohan Hardik Barot Neethi Varun Neethi Sekar.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.
Darci Miyashiro Math 480 April 29, 2013
Encryption.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CS100A, Lecture 13, 15 October CS100A Lecture Oct Discussion of Prelim 2 (Tuesday, 20 October, 7:30-9PM) Rooms for Prelim 2 A-K: Hollister.
CS 150 – Computing: From Ada to the Web Cryptography.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Secure communication Informatics for economists II Jan Přichystal
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Cryptography – Test Review
CIT 380: Securing Computer Systems
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
(Tuesday, 20 October, 7:30-9PM) Encryption-Decryption
Public Key Encryption and the RSA Algorithm
Cryptography CS Principles January 19, 2017.
Introduction Of System Security
Basic Encryption Methods
Chapter-2 Classical Encryption Techniques.
Taehyung Kim HPC Lab. POSTECH
Cryptography.
Some basic terminology
Modular Arithmetic and RSA Encryption
History of Cryptography
Rotor Ciphers.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Foundation of Security
Enigma, Cyphers and Encryption
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Cryptography a Presentation Prepared by Vytautas Kondratas.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
Secure Diffie-Hellman Algorithm
Presentation transcript:

Brief Incursion into Cryptography 1 20 th May 2008 Brief Incursion into Cryptography 20 th May 2008

Brief Incursion into Cryptography 2 20 th May 2008 Introduction ● Define terminology ● Evolution of cryptology – Simple methods – The Enigma Machine – Asymmetric Encryption ● Evolution of cryptanalysis ● Future

Brief Incursion into Cryptography 3 20 th May 2008 Terminology ● Cryptography or Cryptology (gr. krýpto – “hidden” + gráfo – “to write” or legein – “to speak”) is the practice and study of hiding information. ● Cryptanalysis (gr. krýpto – “hidden” and the verb analýein – “to loosen” or “to untie”) is the study of methods for obtaining the meaning of encrypted information, without access to the secret information which is normally required to do so.

Brief Incursion into Cryptography 4 20 th May 2008 Back to Basics ● Transposition of the message's letters ● Very secure ● Impracticable ● Need to define some patterns to limit the number of possible combinations For example, consider this short sentence cow cwo ocw owcwco woc 3 letters » 3! combinations letters » 35! combinations » over combinations

Brief Incursion into Cryptography 5 20 th May 2008 Spartan Scytale ● First cryptographic military device (5 th century BC) ● Strand of leather or parchment wrapped around a wooden crane

Brief Incursion into Cryptography 6 20 th May 2008 ● States that women should study 64 arts ● 45 th on the list was mlecchita-vikalpa ● Simple principle: – group letters in the alphabet in randomly chosen pairs – replace the letters with their pair Kama – Sutra A D H I K M O R S U W Y Z ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ ↕ V X B G J C Q L N E F P T meet at midnight cuuz vz cgxsgibz

Brief Incursion into Cryptography 7 20 th May 2008 Caesar's Cypher (1) ● First historically certified use of this type of cypher ● Each letter is replaced by the one found on the 3 rd position counting from the letter's index a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C veni, vidi, vici yhgl, ylgl, ylfl

Brief Incursion into Cryptography 8 20 th May 2008 Caesar's Cypher (2) ● More general: replace each letter shifting its position by 1 to 25 in the alphabet ● Still not very secure – only 25 keys to be checked if someone suspects the algorithm used to encrypt the message

Brief Incursion into Cryptography 9 20 th May 2008 Caesar's Cypher (3) ● Most general: allow each letter in the alphabet to be paired up with any other letter ● Very secure ● Practical Over combinations – an interceptor (checking 1 combination / second) would need almost a billion times the life of the universe to crack it Alice and Bob establish a key phrase like JULIUS CAESAR Remove white spaces and letters that repeat in the key phrase: JULISCAER a b c d e f g h i j k l m n o p q r s t u v w x y z J U L I S C A E R T U V W X Y Z B D F G H J K M P Q

Brief Incursion into Cryptography th May 2008 Cryptanalysis (1) ● The most general Caesar Cypher was considered very secure until the Arabs invented cryptanalysis ● They developed methods for finding the original message without knowing the key ● First writing of this method is in a book written by Abu Yusuf Ya'qub ibn Is-haq ibn as-Sabba ibn 'omran ibn Ismail al-Kindi

Brief Incursion into Cryptography th May 2008 Cryptanalysis (2) ● Method consists of 2 steps – Examine a relative long plain text and count the number of appearances of each letters; do the same for the encrypted text – Match the most frequent letters in the plain text with the most frequent in the encrypted one and, with little ingeniousness, discover the message ● This kind of cryptanalysis led to the beheading of Queen Mary of Scotland in 1857

Brief Incursion into Cryptography th May 2008 Taking advantage of technology ● Arthur Scherbius – wanted to replace code created by means of paper and pencil ● The most dreadful encrypting machine – The Enigma (1918)

Brief Incursion into Cryptography th May 2008 The Enigma (1) ● Three components: keyboard, rotor, display ● The rotor played the most important role

Brief Incursion into Cryptography th May 2008 The Enigma (2) ● Later, there were added two more components: the reflector and the plugboard

Brief Incursion into Cryptography th May 2008 The Enigma (3) ● The plugboard had the role to swap certain letters, increasing the number of possible combinations

Brief Incursion into Cryptography th May 2008 The Enigma (4) ● Rotor orientation – 3 rotors with 26 orientations each ● 26x26x26= ● Rotors' display – 3 rotors can be arranged in ● 3!= 6 ● Plugboard – assume we inverse 6 pairs of leter ● = ≈

Brief Incursion into Cryptography th May 2008 The Enigma (5) ● At first sight, it was the ultimate encryption machine ● Little flaws in the encryption process, flaws in the usage of the machine, capture of keys notebooks permitted the Allies to crack the system ● Alan Turing was the one to create the machine which, by the end of war, was multiplied in 200 copies ● Successful cryptanalysis of the Enigma machine meant winning the war for the Allies

Brief Incursion into Cryptography th May 2008 Distributing keys ● Big problem, from both practical and security point of view ● It was tackled by many cryptologists ● In 1976, Whitfield Diffie made the breakthrough, at least in theory

Brief Incursion into Cryptography th May 2008 Asymmetric key (1)

Brief Incursion into Cryptography th May 2008 Asymmetric key (2) ● Postal analogy: – Bob makes a padlock and a key – Bob multiplies the padlock in 1000 copies and sends each one to a postal office in the country – Anyone can put a message in a box and lock it using the padlock (you don't need the key to seal the padlock) – Now, only Bob can use his unique key to open the box and read the message

Brief Incursion into Cryptography th May 2008 Asymmetric key (3) ● Resolves the problem of distributing keys, the biggest issue of cryptography ● Finding a mathematical function which emulates this behavior is not an easy task ● 1977 – Ron Rivest, Adi Shamir and Leonard Adleman came with the mathematical function and completely changed cryptography

Brief Incursion into Cryptography th May 2008 Asymmetric key (4) ● The algorithm, known as RSA, is a pseudo one-way mathematical function, hard to reverse ● The keys: – Private: two large prime numbers – Public: the multiplication of those two numbers ● Under present conditions of technical and mathematics, to reverse the function it would take all our world's computer power and the age of universe in time

Brief Incursion into Cryptography th May 2008 Asymmetric key (5) 1. 2.

Brief Incursion into Cryptography th May 2008 Where are we heading ● Any code, as history taught us, is breakable sooner or later ● Unfortunately for cryptography, tests are being made regarding the build of a quantum computer – making possible to crack asymmetric algorithms in a matter of seconds ● Fortunately, there are already algorithms which are 100% safe and can not be broken – in practice, but also in principle

Brief Incursion into Cryptography th May 2008 Q & A ● Please feel free to contact me for additional information on any of these topics at