Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Stream Cipher July 2011.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption CS110: Computer Science and the Internet.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
@Yuan Xue Quick Review.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Encryption with Keys and Passwords
Web Security.
CS480 Cryptography and Information Security
Public Key Cryptography
Cryptography Dr. X.
Cryptography Why Cryptography Symmetric Encryption
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Security.
May 2008 Prepared by Dr. Abdulrahman Awadhi
Cryptography and Network Security
Introduction Of System Security
Encryption
Cryptography.
CSCI-235 Micro-Computer Applications
Topic 1: Data, information, knowledge and processing
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Quantum Key Distribution
B504/I538: Introduction to Cryptography
Elliptic Curve Cryptography (ECC)
Chapter 3:Cryptography (16M)
Security through Encryption
PART VII Security.
Rivest, Shamir and Adleman
Security.
Elliptic Curve Cryptography (ECC)
برگرفته از اسلایدهای © University of Glamorgan
Foundation of Security
Section 2: Cryptography
Fun with Cryptography The Science of Secrecy.
Lesson 7: Simple Encryption
Kharkiv National Pedagogical University
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Unit 2: Cryptography & Cryptographic Algorithm
Encryption Basics Types of ciphers Algorithms Modes Key Length
EKRJGTU CTG CYGUQOG! Can you break the code?.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan Muhammad Shahid Rafiq Muhammad Shozib

Vernam Cipher Vernam Cipher, also known as the one-time-pad.Gilbert Vernam invented and patented his cipher in 1917 while working at AT&T. Vernam cipher Also known as One-time-pad.

What Is One-Time pad? In cryptography, the one-time pad is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as the message being sent. In this technique, a plaintext is paired with a random secret key (also referred to as a one-time pad)

Encryption Formula: plaintext + key = cipher text 

Decryption Forumla: cipher text-key=plain-text

Some Rules for Encryption First We chose plain text which we want to convert into cipher text. We can chose random key. Key length is always equal to length of cipher text. After adding plain text and keys .If num is ≥26 then we subtract 26 from cipher text in Encryption. Keys have two copies One for sender and one for receiver. Keys is discarded after one time use.

Encryption Example

Decryption

Another Example “same message” but now this time key is different.

Encyption H E L L O 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key = 30 16 13 21 25 message + key = 4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) (message + key) E Q N V Z → ciphertext

Decryption: E Q N V Z cipher-text 4 (E) 16 (Q) 13 (N) 21 (V) 25 (Z) cipher-text - 23 (X) 12 (M) 2 (C) 10 (K) 11 (L) key = -19 4 11 11 14 For negative value we add 26 for make it positive 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) cipher-text – key H E L L O → message

This cipher is unbreakable in a very strong sense This cipher is unbreakable in a very strong sense. The intuition is that any message can be transformed into any cipher (of the same length) by a pad, and all transformations are equally likely

Modern use of the Vernam Cipher The Vernam Cipher can also be implemented with modern computer technology.

Why OTP is secure? The security depends on the randomness of the key.

Drawback in OTP Key-stream should be as long as plain-text. Key distribution & Management difficult.

Solution Stream Ciphers in which key-stream is a solution Stream cipher generated in pseudo-random fashion from relatively short secret key.