Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Computer Security CS 426 Lecture 3
Chapter 2 – Classical Encryption Techniques
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MAT 1000 Mathematics in Today's World Winter 2015.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
Lecture 23 Symmetric Encryption
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
History and Background Part 4: Transposition Ciphers
Cryptography and Network Security
Computer and Data Security 4th Class
Basic Encryption Methods
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Topic 3: Data Encryption.
Cryptography Survey.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
PART VII Security.
ICS 454: Principles of Cryptography
NET 311D Information Security
Cryptography Survey.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Double Transpositions
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh CRYPTOGRAPHY Block 6, Unit 1, Section 2 Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh Contents Overview Method of Encryption Caesar Technique (Shift cipher) Improved Caesar Method (code word) Transposition Cipher (n-gram) One-time pad scheme (ploy-alphabetic) Q & A + Implementation of Java code Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh Overview In this section, we will discuss how each of the following encryption technique works a Caesar cipher or often called shift cipher. Then, an enhanced version of Caesar's code using ‘code word’. After that, we will discuss the Transposition encryption techniques. And before we end this presentation will know how One-time pad scheme is calculated. Finally, Questions & Answers and a short demo. Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh Method of Encryption There are two method of encryption: Substitution Transposition Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Caesar Technique (Shift cipher) One of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Caesar Technique (Shift cipher) Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Caesar Technique (Shift cipher) Example (TMA06-Q2(i)(a)): The message: WILLIAMSHAKESPEARE Key: 12 Encipher to: IUXXUMYETMWQEBQMDQ HOW? Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Caesar Technique (Shift cipher) The Vigneree table used to map each letter in the message to its equivalent : WILL = IUXX Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Improved Caesar Method (code word) An improved technique of shift-cipher were introduced which relays on two elements: Code Word Shift number (the Key) Since the previous method is weak and easy to break, an improved version must be found to increase the level of security. Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Improved Caesar Method (code word) Example (TMA06,Q2(i)(b)): Message: WILLIAMSHAKESPEARE Code word: TEMPLAR Key: 4 Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Improved Caesar Method (code word) Step1: Generating the alphabet-table A B C D E F G H I J K L T M P R M N O P Q R S T U V W X Y Z H I J K Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Improved Caesar Method (code word) Step2: Transforming the letters (Simple letter mapping): Message: WILLIAMSHAKESPEARE Transformed to: WCGGCTHQBTFLQKLTOL A B C D E F G H I J K L T M P R M N O P Q R S T U V W X Y Z H I J K Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Improved Caesar Method (code word) Step3: Shifting the letters Take the transformed text and shift each letter by 4 (refer to Vigenere table) Transformed to: WCGGCTHQBTFLQKLTOL Shift by 4: AGKKGXLUFXJPUOPXSP Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh So far… Overview Method of Encryption Caesar Technique (Shift cipher) Improved Caesar Method (code word) Transposition Cipher (n-gram) One-time pad scheme (ploy-alphabetic) Q & A + Implementation of Java code Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Transposition Cipher (n-gram) Also, known as mono-alphabetic. Simply, it’s a process that divide the message into number of columns called grams. See next example for explanations. Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Transposition Cipher (n-gram) Example: Message: SEND ME SEVEN HUNDRED POUNDS TOMORROW Using 8-gram (8 columns) , we distribute the message letters like this: Key 1 2 3 4 5 6 7 8 S E N D M V H U R P O T W Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Transposition Cipher (n-gram) Now we choose an 8-digist key. E.g. the key is : 13572468 After that, we combined all letters of each column, to get the cipher. The order of combination has to be the same as the key. The result will be: svetnnpmmuursddoeedodhooennrersw Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

One-time pad scheme (ploy-alphabetic) Also known as a poly-alphabetic code. This code is theoretically unbreakable. Let’s take an example.. >> Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

One-time pad scheme (ploy-alphabetic) Example: Plaintext: TESTMESSAGE one-time pad: 3,19,21,4,7,22,17,25,3,11,3, Plaintext T E S M A G # in Alpha. 19 4 18 12 6 1-time pad 3 21 7 22 17 25 11 Addition 23 39 26 35 43 Mod 26 13 9 Cipher W X N J R D H Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh

Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh Q & A + Demo Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh