History and Background Part 4: Transposition Ciphers

Slides:



Advertisements
Similar presentations
Computer Science 101 Data Encryption And Computer Networks.
Advertisements

Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Public Key Encryption Algorithm
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 12 Cryptography (slides edited by Erin Chambers)
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Lec. 5 : History of Cryptologic Research II
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CS480 Cryptography and Information Security
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Communication Security
Cryptography and Network Security
Computer and Data Security 4th Class
CS4780 Cryptography and Information Security
History and Background Part 3: Polyalphabetic Ciphers
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Permutations and Ciphers
Transposition Ciphers
PART VII Security.
DES supplement.
ICS 454: Principles of Cryptography
Traditional Symmetric-Key Ciphers
Types of Cryptanalysis attacks
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Information and Computer Security CPIS 312 Lab 3
Presentation transcript:

History and Background Part 4: Transposition Ciphers CSCI 5857: Encoding and Encryption

Outline Transposition ciphers Attacks on transposition ciphers Effectiveness of using multiple keys Avalanche effect as a goal of encryption

Transposition Cipher Ciphertext = Permutation of plaintext Permutation = integers from 1 to n rearranged n = number of characters in block of text Example: A permutation of size 7 might be 1357246 That permutation is the transposition key K

Transposition Algorithm Assign each plaintext character a number based on position Move each plaintext character into ciphertext position given by permutation Mathematically ci = pK[i] Simple example: Plaintext: runaway Permutation: 1357246 Ciphertext: rnwyuaa

Column Transposition Ciphers Break plaintext into columns Example plaintext: longlongagoinagalaxyfaraway Key: 5241763 (size n of key = 7 columns) 5241763 longlon gagoina galaxyf arawayx Break plaintext into rows of size n of key Insert extra chars to fill columns (padding)

Column Transposition Example 5 2 4 1 7 6 3 l o n g l o n g a g o i n a g a l a x y f a r a w a y x For column with label i: Append contents of column i to ciphertext Resulting ciphertext: goaw oaar nafx ngla lgga onyy lixa This column second, and so on This column first

Column Transposition Decryption Divide ciphertext into n strings Arrange strings into columns, with order of columns determined by key goawoaarnafxnglalggaonyylixa 5 2 4 1 7 6 3 l o n g l o n g a g o i n a g a l a x y f a r a w a y x

Attacks on Transposition Ciphers Brute force: Trying all possible permutations Key of size n  n! possible keys Solution: Choose key such that n! tests is computationally secure Cryptographic attacks: Eliminate column pairs with unlikely adjacent letters l i x a n a f x

Multiple Transposition Ciphers Can apply transposition multiple times with same key to defeat cryptographic attacks Ciphertext after first permutation: goawoaarnafxngla lggaonyylixa Ciphertext after second permutation: wfglonayagoaaaly grnlanaxoxgi 5 2 4 1 7 6 3 g o a w o a a r n a f x n g l a l g g a o n y y l i x a

Using Multiple Keys Is this more secure than C = E(p, k1)? Important question: Does using multiple keys always make encryption more secure? Brute force attacks Cryptographic attacks Mathematically: C = E(E(p, k1), k2) Is this more secure than C = E(p, k1)?

Multiple Keys Examples Example: Caesar cipher with 2 keys K1 = 3 K2 = 8 Equivalent to single key K3 = 11 Still only 26 possible mappings from P to C Example: Transposition cipher with 2 keys K1 = 5241763 K2 = 7325641 Equivalent to single key K3 = 6357142 Still only 7! possible mappings from P to C No more secure in either case!

Multiple Key Effectiveness Only if: Using multiple keys greatly increases the number of possible ciphertexts Applying multiple keys is not equivalent to applying a single key No k3 such that E(E(p, k1), k2) = E(p, k3) Possible ciphertexts After applying K1 and K2 After applying K1

Avalanche Effect Small change in key  Large change in ciphertext Desirable property of cipher Knowing some of key  rest of key still hard to find Not a property of substitution ciphers Property of transposition ciphers (particularly if applied multiple times)

Avalanche Effect in Transposition Example: two similar keys applied twice plaintext = longlongagoinagalaxyfaraway k1 = 5241763 ciphertext = wfglonayagoaaalygrnlanaxoxgi k2 = 5421763 ciphertext = wfglaalylaoaonrygaangoaxnxgi Already different in 14 of 28 characters

Substitution and Transposition Most modern block ciphers combine substitution and transposition Substitution gives large number of possible keys to defeat brute force attacks Transposition gives avalanche effect to defeat cryptographic attacks

What’s Next Let me know if you have any questions Begin work on Assignment 1: History and Background