Types of Cryptanalysis attacks

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Network Security Chapter
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Information Systems Security
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Computer Security (CS4800)
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Information Security CPIT 425 Instructor: Bashair Alrashed LAB1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Symmetric Cryptography
Prof. N.N.GAIKWAD M.P.A.S.C COLLEGE PANVEL DIST-RAIGAD
History and Background Part 4: Transposition Ciphers
Introduction Of System Security
Computer and Data Security 4th Class
Basic Encryption Methods
Information and Computer Security CPIS 312 Lab 2
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Cryptography.
- Stream Cipher and Block Cipher - Confusion & Diffusion
Networks Encryption.
Cryptography Basics and Symmetric Cryptography
Outline What is data encryption? Cryptanalysis
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
NET 311D Information Security
Outline What is data encryption? Cryptanalysis
Algorithm Types & Algorithm Modes
Fun with Cryptography The Science of Secrecy.
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Confusion and Diffusion
Traditional Symmetric-Key Ciphers
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Types of Cryptanalysis attacks 3. Chosen-plaintext attack The cryptanalyst (attacker) not only has access to the cipher text and associated plain text for several message. But be also chooses the plain text that gets encrypted, so his job is to divide the plaintext into several blocks by which he can deduce the key (or keys) used to encrypt the message or an algorithm to decrypt any new message encrypted with the same key (or keys)

Chosen-plaintext attack

Types of Cryptanalysis attacks 4. Adaptive-chosen-plaintext attack This is a special case of a chosen-plaintext attack. Note only can the cryptanalyst (attacker) choose the plaintext that is encrypted, but he can also modify his choice based on the result of pervious encryption

Types of Cryptanalysis attacks 5. Chosen-Cipher text attack The cryptanalyst (attacker) here can choose a set of encrypted messages and try to decrypt them to access the plaintext text with the key. This method is used to attack cryptographic systems using two keys K1, K2 that is known as Public-Key algorithm, and sometimes attack cryptographic systems using one key which is known as One-Key algorithm.

. Chosen-Cipher text attack

Types of Cryptanalysis attacks 6. Chosen-key attack Here the cryptanalyst (attacker) has some information that has to do with different keys and tries to reach the desired key

Types of Cryptanalysis attacks 7 -Rubber-hose cryptanalysis Is the use of bribery, extortion and threat to access the key. Note that, the methods from 1 to 4 assume that the cryptanalyst has complete knowledge of the encryption algorithm used

Traditional or Classic Cipher Traditional ciphers used two techniques for hiding information from intruder : Transposition cipher Substitution cipher

Transposition Ciphers A transposition cipher does not substitute one symbol for another, instead it changes the location of the symbols. A symbol in the first position of the plaintext may appear in the tenth position of the cipher text, while a symbol in the eighth position in the plaintext may appear in the first position of the cipher text. In other words, a transposition cipher reorders (transposes) the symbols Note A transposition cipher reorders symbols.