CH15 –Security & Crypto.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security – Additional material.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Security & Cryptography.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Security & Cryptography.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Lec. 5 : History of Cryptologic Research II
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Classical Encryption techniques
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
Linear Cryptanalysis of DES
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
@Yuan Xue Quick Review.
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Chapter Five Prepared by: Raval, Fichadia
Chapter 2 Basic Encryption and Decryption
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Classical Encryption techniques
Cryptography.
SYMMETRIC KEY ALGORITHMS
NET 311 Information Security
Cryptography and Network Security Chapter 3
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
SYMMETRIC KEY ALGORITHMS
Confusion and Diffusion
Information Security IT423
Cryptography Lecture 16.
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Florida State University
Presentation transcript:

CH15 –Security & Crypto

Basics What if protection is “broken” by unauthorized user, or system is subverted Crypting information can help Definitions of Cryptology Cryptography, Cryptanalysis Model Ciphertext = E(Plaintext,Ke) Sent over unsecured channel Plaintext = D(Ciphertext, Kd) Cryptanalyst can see C, knows D and E, sometimes even Ke, and has “extra information”

Threats Ciphertext Only – The intruder can only see ciphertext. This is the easiest kind of attack to mount Known Plaintext – The intruder has some corresponding plaintext-ciphertext pairs. Perhaps as the side information Chosen Plaintext – The intruder can find out the encryption of any arbitrary plaintext Limited breakin ?

Some Design Principles Shannon’s Principles Diffusion – spread correlations and dependencies between keys and strings so that length of plaintext needed to break the code is maximized Confusion – make functional dependencies amongst related variables as complex as possible Exhaustive Search Principle

Classification of CrytoSystems Conventional Geared towards languages Caesar (E = M+k mod size of alphabet) Substitution Cipher (size! keys) Polyalphabetic ( periodic sequence of substitution ciphers : vignere, onetime pad) Modern Geared towards binary information Private Key Public Key

Private Key/DES Basic operations Permutation: diffuse information by permuting bits Substitution: replace an m bit input with an n bit output such that there is no simple relation between them to cause confusion DES works on 64 bit Data blocks using 56 bit key+8 parity bits (keylength an issue)

DES Steps Permute the 64 bits using IP 16 iterations of Li = Ri-1 Ri = L i-1 XOR f(R i-1, Ki)