CSE565: Computer Security Lecture 2 Basic Encryption & Decryption

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Lecture 23 Symmetric Encryption
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Transposition
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Asad Gondal Ali Haider Mansoor
Prof. N.N.GAIKWAD M.P.A.S.C COLLEGE PANVEL DIST-RAIGAD
Basic Encryption Methods
Cryptography.
EEC 688/788 Secure and Dependable Computing
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Traditional Symmetric-Key Ciphers
Basic Encryption Methods
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York, 14260 8/31/17 UB Fall 2017

Overview Lecture 2 Overview Terminology (10 minutes) Encryption by Substitutions & Transpositions (60 minutes) 8/31/17 UB Fall 2017

Announcements Background Material – 1 Properties of Arithmetic Inverses Divisors Prime Numbers Greatest Common Divisor Background Material – 2 Modular arithmetic Basic properties Operations Refer to Useful Notes on Handouts page 8/31/17 UB Fall 2017

Terminology Encryption A process of encoding a message Decryption It is the reverse process Encryption Algorithms A key K is generally used Symmetric encryption: Asymmetric encryption: Original Plaintext Plaintext Ciphertext Encryption Decryption P=D(C) =D(E(P)) P=(p1,p2, …pn) C=(c1,c2, … cm) C=E(P) 8/31/17 UB Fall 2017

Cryptography & Cryptanalysis Hidden writing – encryption to conceal text Cryptanalysis Break an encryption Attempt to break a single message Attempt to recognize patterns in encrypted messages Attempt to find general weaknesses Breakable Encryption Given enough time and data, encryption can be broken Practicality is an issue Risky to proclaim an algorithm secure! 8/31/17 UB Fall 2017

Cryptanalysis Attacks Type of attack What is known to cryptanalyst Ciphertext only Algorithm, ciphertext Known plaintext Algorithm, ciphertext, corresponding plaintext Chosen plaintext Algorithm, ciphertext, plaintext chosen by analyst with corresponding ciphertext Chosen ciphertext Algorithm, ciphertext, ciphertext chosen by analyst with corresponding decrypted plaintext Chosen text Combination of the above two Brute force attack is the simplest. But may not be practical. 8/31/17 UB Fall 2017

Substitutions & Transpositions Monoalphabetic Ciphers Polyalphabetic Ciphers These are called Stream Ciphers Transpositions Permutation These are Block Ciphers 8/31/17 UB Fall 2017

Monoalphabetic Ciphers Caesar Cipher Formula: Treaty Impossible --> wuhdwb lpsrvvleoh Advantages & Disadvantages Easy to perform Simple, so easy to predict the pattern Repeat characters give clue to break Permutation Cipher Use a key ABCDE ……… Keyab………. Since key is short, most plaintext letters are only one or two positions off Time complexity of these algorithms – linear in n where n is the no. of characters in plaintext 8/31/17 UB Fall 2017

Polyalphabetic Substitution Ciphers Main problem with mono-alphabetic ciphers is the non-flat frequency distribution A flat distribution gives no information to cryptanalyst Flattening by combining distributions Two or more separate encryption alphabets for the same character of the plaintext E.g., one encryption for characters in odd positions and another for at even positions Reduces the repeat symbols in the ciphertext Makes it hard to break (Discussion of an example) Combine distributions that are high with ones that are low. T is sometimes enciphered as a and sometimes as b, X is sometimes enciphered as a and sometimes as b. The high frequency of T mixes with the low frequency of X. This produces a more moderate distribution for a and b. 8/31/17 UB Fall 2017

Vigenere Tableau Need to smooth out peaks and valleys of frequency distribution Can be done by extending no. of permutations Extreme case – extend to 26 permutations A 26 X 26 table is used (discussion of example) Key word of length 3 is sufficient to smooth out the distribution Cryptanalysis of Polyalphabetic Substitution Reading exercise Focus on Kasiski method and Index of Coincidence method (Look up Ref. Texts) (http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher) Kasiski method for repeated patterns Makes use of the regularity of English Index of coincidence – works on the variation of the frequencies in a distribution – how high is high and how low is low…..it is a probabilistic method 8/31/17 UB Fall 2017

Perfect Substitution Cipher Requires an infinite non-repeating sequence of alphabets This will confound the cryptanalyst One-Time pads Vernam Cipher Uses an arbitrarily long sequence of numbers Formula: Random Numbers Middle digits of phone numbers in a residential directory Pseudo random numbers – linear congruential random number generator 8/31/17 UB Fall 2017

Unbreakable Cipher Use a Vigenere table with 27 characters (includes space) Use a one-time key as long as the message Two different decryptions using two keys Cryptanalyst cannot figure out which key is correct – hence the code is unbreakable ciphertext key plaintext ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS pxlmvmsydofuyrvzwc tnlebnecvgdupahfzzlmnyih mr mustard with the candlestick in the hall ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYT pftgpmiydgaxgoufhklllmhsqdqogtewbqfgyovuhwt miss scarlet with the knife in the library 8/31/17 UB Fall 2017

Transpositions It is a method where letters of the message are rearranged Goal here is diffusion rather than confusion Information is spread widely across the ciphertext Columnar transposition is an easy one Characters are rearranged into columns (Study of an example) Encipherment/Decipherment Complexity Algorithm is constant in the amount of work per character Time is proportional to length of message Space required is directly proportional to message length Output characters cannot be produced until all characters are read in Delay depends on the length of the message Not appropriate for long messages 8/31/17 UB Fall 2017

Cryptanalysis Digrams, trigrams & other patterns used to break encryption Digram – letter pairs such as -re- -th- -en- -ed- etc. Trigram – groups such as ent, and, ing, thi etc. Cryptanalysis by trial & error & using a moving window for comparison This is a reading exercise! (http://en.wikipedia.org/wiki/Transposition_cipher) Double transposition algorithm makes breaking more difficult It uses transposition of a transposed text Discussion of example 8/31/17 UB Fall 2017

Summary Stream Ciphers Mono and poly-alphabetic encryptions Since they convert one symbol of plaintext immediately into a symbol of ciphertext Features include: a) speed of transformation, b) low error propagation Disadvantages are: a) low diffusion, b) susceptible to malicious insertions Block Ciphers Columnar transposition algorithm and fractionated Morse Group of plaintext symbols are encrypted as one block Features include: a) diffusion, b) immunity to insertions Disadvantages are: a) slowness of encryption, b) error propagation 8/31/17 UB Fall 2017