CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Classical Encryption Techniques
Chapter 2 Basic Encryption and Decryption (part B)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CSE 651: Introduction to Network Security
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Classical Encryption Techniques CSE 651: Introduction to Network Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Classical Techniques: Substitution
Traditional Symmetric-Key Ciphers
Communication Security
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Cryptography and Network Security Sixth Edition by William Stallings.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
PART VII Security.
Digital Communications
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”

CRYPTOGRAPHY: Cryptography is the study of secret (crypto-) writing (-graphy). It is concerned with developing algorithms which may be used to: It conceals the context of some message from all except the sender and recipient (privacy or secrecy). It verifies the correctness of a message to the recipient (authentication or integrity). It is the basis of many technological solutions to computer and communications security problems.

BASIC TERMINOLOGY: Cryptography: The art or science encompassing the principles and methods of transforming message an intelligible into one that is unintelligible, and then retransforming that message back to its original form. Plaintext : The original intelligible message. Cipher text: The transformed message. Cipher: It is an algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods. Key: Some critical information used by the cipher, known only to the sender & receiver.

Encipher (encode): The process of converting plaintext to cipher text using a cipher and a key. Decipher (decode): The process of converting cipher text back into plaintext using a cipher and a key. Cryptanalysis (code breaking): The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Cryptology: The field encompassing both cryptography and cryptanalysis. CONT’D…

Encryption: The mathematical function mapping plaintext to cipher text using the specified key: Y = E K (X) Decryption: The mathematical function mapping cipher text to plaintext using the specified key: X = D K (Y) = E K -1 (Y) Cryptographic system: The family of transformations from which the cipher function E K is chosen. CONT’D…

B ASIC E LEMENTS : Plaintext: The original message with no transformation. Cipher text: The plaintext message after modification to obscure it from normal usage and readability. encryption converts plaintext into cipher text. decryption converts cipher text into plaintext. Cryptographic algorithm: The mathematical operation used to convert plain text into cipher text. Key: The secret key used to encrypt or decrypt the message.

S TREAM AND B LOCK C IPHERS : Stream Cipher: It encrypts a digital data stream one byte at a time. Block Cipher: It encrypts blocks of plaintext, treated as a whole and used to produce a cipher text block of equal length.

CRYPTOSYSTEM: Quintuple ( E, D, M, K, C ) M set of plaintexts. K set of keys. C set of ciphertexts. E set of encryption functions e: M  K  C. D set of decryption functions d: C  K  M.

S IMPLIFIED C ONVENTIONAL E NCRYPTION M ODEL : Not secret

CLASSICAL ENCRYPTION TECHNIQUES: Substitution Ciphers: Monoalphabetic Ciphers Additive Cipher/ Shift Cipher/ Caesar Cipher Multiplicative Ciphers Affine Cipher Polyalphabetic Ciphers Autokey Cipher Playfair Cipher Vignere Cipher Hill Cipher

SUBSTITUTION CIPHERS: It replaces one symbol with another. If the symbols in the plain text are alphabetic characters, we replace one character with another. For example, we can replace 3 with 7, and 2 with 6. Categorized as either monoalphabetic ciphers or polyalphabetic ciphers.

MONOALPHABETIC CIPHERS: In monoalphabetic substitution, a character (or a symbol) in the plaintext is always changed to the same character (or symbol) in the ciphertext regardless of its position in the text. For example, if the algorithm says that letter A in the plaintext is changed to letter D, every letter A is changed to letter D. The relationship between letters in the plaintext and the ciphertext is always one-to-one.

ADDITIVE CIPHER / SHIFT CIPHER / CAESAR CIPHER: It is the simplest monoalphabetic cipher. It was developed 2000 years ago, by Julius Caesar. Additive Ciphers are sometimes referred to as Shift Ciphers or Caesar Cipher. Replace each letter with the letter standing 3 places further down the alphabet. C i = E(P i )=(P i +3) mod 26. P i =D(C i )=(C i -3) mod 26. Plain Text: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher Text: DEFGHIJKLMNOPQRSTUVWXYZABC

G ENERALIZED C AESAR C IPHER : It can use any shift from 1 to 25, i.e., replace each letter by a letter a fixed distance away. C i =E(P i )=(P i +k) mod 26. P i =D(C i )=(C i -k) mod 26.

MULTIPLICATIVE CIPHERS: The encryption algorithm specifies multiplication of the plaintext by the key and the decryption algorithm specifies division of the ciphertext by the key. Decryption, would be multiplying by the multiplicative inverse of the key.

AFFINE CIPHER: Combining the additive and multiplicative ciphers to get what is called the affine cipher – a combination of both ciphers with a pair of keys. The first key is used with the multiplicative cipher, and the second key is used with the additive cipher.

POLYALPHABETIC CIPHERS: Each occurrence of a character may have a different substitute. The relationship between a character in the plaintext to a character in the ciphertext is one-to-many. For example: “a” could be enciphered as “D” in the beginning of the text, but as “N” at the middle.

AUTOKEY CIPHER: It is a simple polyalphabetic cipher called the autokey cipher. In this cipher, the key is a stream of subkeys, in which each subkey is used to encrypt the corresponding character in the plaintext. The first subkey is a predetremined value secretly agreed upon by Alice and Bob. The second subkey is the value of the first plaintext character (between 0 and 25). The third subkey is the value of the second plaintext. And so on. The name of the cipher, autokey, implies that the subkeys are automatically created from the plaintext cipher characters during the encryption process.

PLAYFAIR CIPHER: Best-known multiple-letter substitution cipher. Digram cipher (diagram to digram, i.e., E(p i p i+1 )=c i c i+1 through key-based 5x5 transformation table). Still leaves much of the structure of the plaintext language  relatively easy to break. Keyword = monarchy Plaintext: H S E A A R M U Ciphertext: B P I M R M C M MONAR CHYBD EFGI/JK LPQST UVWXZ

V IGENÈRE CIPHER : Best-known polyalphabetic ciphers. Each key letter determines one of 26 Caesar (shift) ciphers. c i = E(p i ) = p i + k i mod(key length). Example: Keyword is repeated to make a key as long as the plaintext. Key: deceptivedeceptivedeceptive Plaintext: wearediscoveredsaveyourself Cipheretxt: ZICVTWQNGRZGVTWAVZHCQYGLMGJ

V IGENÈRE CIPHER :

TRANSPOSITION CIPHERS: It does not substitute one symbol for another, instead it changes the location of the symbols. A symbol in the first position of the plaintext may appear in the tenth position of the ciphertext. A symbol in the eight position in the plaintext may appear in the first position of the ciphertext. A transposition cipher reorders (transposes) the symbols.

KEYLESS TRANSPOSITION CIPHERS: Simple transposition ciphers, which were used in the past, are keyless. There are two methods for permutation of characters. In the first method, the text is written into a table column by column and then transmitted row by row. In the second method, the text is written into a table row by row and then transmitted column by column.

KEYED TRANSPOSITION CIPHERS: The permutation is done on the whole plaintext to create the whole ciphertext. Another method is to divide the plaintext into groups of predetermined size, called blocks, and then use a key too permute the characters in each block separately.