Cryptography Survey.

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Encryption with Keys and Passwords
Substitution Ciphers.
Lesson 2-18 AP Computer Science Principles
Chapter 8: Network Security
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public Key Encryption and Digital Signatures
Public-key Cryptography
Cryptography.
Information and Computer Security CPIS 312 Lab 2
Taehyung Kim HPC Lab. POSTECH
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to security goals and usage of cryptographic algorithms
Chapter 8: Network Security
M3: Encryption r By Andrew Stringer.
Lesson 5: Simple Encryption
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
PART VII Security.
Cryptography Survey.
Cryptography and Network Security
Simple Encryption- Lesson 5
Fun with Cryptography The Science of Secrecy.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Cryptography: Cesar Cipher
Exercise 1: Let’s Communicate - Decrypt The message
Digital Communications
Introduction to Cryptography I
Fluency with Information Technology Lawrence Snyder
Chapter 8: Network Security
Symmetric Encryption or conventional / private-key / single-key
Security in Distributed Systems
Secure Diffie-Hellman Algorithm
Chapter 8: Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Survey

Problem: How would you send a message over an unsecure communication channel? NECACELTAS

Problem: How would you play poker over the internet?

Cryptography vocabulary Plaintext-preencryption text Ciphertext-text after it has the encryption Encryption-function from plain text to ciphertext Decryption-function from ciphertext to plaintext Key- object which allows encryption/decryption

Caesar’s Cipher NECACELTAS

Caesar’s Cipher RIGEGIPAEX

Substitute each letter with the one 4 ahead in the alphabet. This can augmented by allowing various shifts How is it cracked? Try every key

Substitution How is it cracked? a b c d e f g h i j k l m n o p q r s t u v w x y z t h o m a s j e f r n b c d g i k l p q u v w x y z Letter           Frequency           a 8.167% b 1.492% c 2.782% d 4.253% e 12.702% f 2.228% g 2.015% h 6.094% i 6.966% j 0.153% k 0.772% l 4.025% m 2.406% n 6.749% o 7.507% p 1.929% q 0.095% r 5.987% s 6.327% t 9.056% u 2.758% v 0.978% w 2.360% x 0.150% y 1.974% z 0.074% How is it cracked?

Vigenere Cipher theanswerstotheexam facadefacadefacadef Letter           Frequency           a 8.167% b 1.492% c 2.782% d 4.253% e 12.702% f 2.228% g 2.015% h 6.094% i 6.966% j 0.153% k 0.772% l 4.025% m 2.406% n 6.749% o 7.507% p 1.929% q 0.095% r 5.987% s 6.327% t 9.056% u 2.758% v 0.978% w 2.360% x 0.150% y 1.974% z 0.074% facadefacadefacadef yhgaqwbetswsyhgeaer How is it cracked?

One time pad theanswerstotheexam theveryverysecretke moivrjuzvjrgxjviqkq How is it cracked?

Claude Shannon Decided that the security of the system should depend only on the key Proved that one-time-pad with random key is completely secure

Early 20th Century “Gentlemen don't read each other's mail.”

Symmetric Key

Asymmetric key

RSA plaintext: t encryption key: n, e decryption key: n, d

RSA Choose large primes p and q. Let n=pq

Example of RSA

Suppose we want to encrypt 5

Signing documents I’m Spartacus I’m Spartacus

Signing documents I’m Spock (I’m Spock)^d mod n ((I’m Spock)^d mod n)^e mod n I’m Spock

RSA How is it cracked?

AES Symmetric encryption process used in most transactions Approved by NSA for “Top Secret” documents

The Future Quantum Cryptography

Typical Transaction Give me the Amazon key Here it is, signed by us Lets use this AES key

Mental Poker What do we need?

Mental Poker Agree upon a set of strings to represent the deck

Mental Poker Player 1 encrypts every card with key A and shuffles Player 2 encrypts every card with key B and shuffles

Mental Poker Player 1 decrypts key A from all the cards and encrypts each one with a distinct key (A1,A2 etc) Player 2 decrypts key B from all the cards and encrypts each one with a distinct key (B1,B2 etc)

Mental Poker When Player 1 agrees that Player 2 should be able to see a card, they hand over the appropriate key