Introduction CS 303 Algorithmic Number Theory and Cryptography

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CS110: Computers and the Internet Encryption and Certificates.
Lec. 5 : History of Cryptologic Research II
Network Security Section 1: Introduction to security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Encryption CS110: Computer Science and the Internet.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Overview of Cryptography
Chapter 8: Network Security
CIT 380: Securing Computer Systems
Thinking the Impossible “Modern Cryptography”
CH15 –Security & Crypto.
Traditional Symmetric-Key Ciphers
Computer and Data Security 4th Class
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
CSCI-235 Micro-Computer Applications
Chapter 8: Network Security
NET 311D Information Security
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Cryptography: Cesar Cipher
Digital Communications
Traditional Symmetric-Key Ciphers
Basic of Modern Cryptography
Computer Security Chapter Two
Chapter 8: Network Security
Symmetric Encryption or conventional / private-key / single-key
Crypto for CTFs.
Chapter 8: Network Security
Presentation transcript:

Introduction CS 303 Algorithmic Number Theory and Cryptography September 4, 1997 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson

KHOOR

HELLO

Introduction to Classical Cryptography September 4, 1997 Introduction to Classical Cryptography Objective: Introduction to Cryptography and Cryptanalysis Shift Cipher Substitution Cipher Attacks and adversaries Frequency analysis

Classical Cryptography Basic problem: Secure communication over an insecure channel Solution: private key encryption m  E(k,m) = c  D(k,c) = m Shannon provided a rigorous theory of perfect secrecy based on information theory Adversary has unlimited computational resources, but key must be as long as message

Communication Scenario Encryption key Decryption key ciphertext Alice Encrypt Decrypt Bob plaintext Eve

Shift Cipher hello all hail ceasar September 4, 1997 Shift Cipher hello all hail ceasar If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others. — Suetonius, Life of Julius Caesar 56

Shift Cipher m  E(k,m) = c = m+k mod 26 c  D(k,c) = c-k mod 26 KHOOR September 4, 1997 Shift Cipher KHOOR DOO KDLO FHDVDU a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 3 m  E(k,m) = c = m+k mod 26 c  D(k,c) = c-k mod 26

Possible Attacks Kerchoff’s Principle Ciphertext only Known plaintext Chosen plaintext Chosen ciphertext

Cryptanalysis of Shift Ciphers Number of keys = size of alphabet Ciphertext only Brute force Look for most frequently occurring symbol Known plaintext m + k = c (mod 26) Chosen plaintext 1 + k = c (mod 26) Chosen ciphertext m + k = 1 (mod 26)

September 4, 1997 Frequency Analysis en.wikipedia.org/wiki/Frequency_analysis_(cryptanalysis) scottbryce.com/cryptograms

War and Peace 3,223,402 Characters http://www.gutenberg.org/ebooks/2600

freq.pl infile = file(filename,'r') freq = {} count = 0 for c in string.ascii_lowercase: freq[c] = 0 for line in infile: for c in line.lower(): if c.isalpha(): freq[c] = freq[c] + 1 count = count + 1 keys = freq.keys() keys.sort() for c in keys: print "freq[" + c + "] = ",float(freq[c])/count

Substitution Cipher m  E(k,m) = c = (m) c  D(k,c) = -1(c) NYVVZ September 4, 1997 Substitution Cipher NYVVZ JVV NJSV RYJDJC a b c d e f g h i j k l m n o p q r s t u v w x y z J E R M Y O H N S T U V W X Z A B C D F G I K L P Q Key – bijection from {0..25}  {0..25}: i  (i) m  E(k,m) = c = (m) c  D(k,c) = -1(c)

Cryptanalysis of Substitution Ciphers Number of keys = n! where n is the size of the alphabet Ciphertext only Brute force (too expensive) Frequency analysis Known plaintext m  (m) = c, for known (m,c). Partial permutation Chosen plaintext m  (m) = c, m = 0..n-1 Chosen ciphertext -1(c)  m, c = 0..n-1

One Time Pad Pad = b1  bn  {0,1}* chosen randomly m = m1  mn E(Pad,m) = c = m  Pad D(Pad,c) = c  Pad = (m  Pad)  Pad = m m,c PrPad[E(Pad,m) = c] = 1/2n No information gained from seeing c However, E(Pad,m)  E(Pad,m’) = m  m’