Cryptology Design Fundamentals

Slides:



Advertisements
Similar presentations
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Advertisements

Ref. Cryptography: theory and practice Douglas R. Stinson
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CryptographyPerfect secrecySlide 1 Today What does it mean for a cipher to be: –Computational secure? Unconditionally secure? Perfect secrecy –Conditional.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Cryptography Lynn Ackler Southern Oregon University.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
1 Information Theory Nathanael Paul Oct. 09, 2002.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-9 Public-Key Cryptography.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-6 Ciphering and the.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Tutorial-5 Theory of Secret-Key.
Secret Key Cryptography
Cryptography – Test Review
Public-Key Cryptography ElGamal Public-Key Crypto-System
Network Security Design Fundamentals Lecture-13
Symmetric Cryptography
Public-Key Cryptography RSA Rivest-Shamir-Adelmann Public-Key System
Design Problems (Open book)
Introduction Of System Security
Basic Encryption Methods
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Ciphering and the Theory of Secrecy Systems
NET 311 Information Security
B504/I538: Introduction to Cryptography
Cryptography Basics and Symmetric Cryptography
Cryptography Lecture 10.
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Kai Bu 03 Cryptanalysis Kai Bu
Cryptology Design Fundamentals
Traditional Symmetric-Key Ciphers
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Unit 2: Cryptography & Cryptographic Algorithm
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Cryptography Lecture 9.
Cryptology Design Fundamentals
Cryptology System Design Fundamentals
Network Security Design Fundamentals Lecture-13
Ciphering and the Theory of Secrecy Systems
Presentation transcript:

Cryptology Design Fundamentals Grundlagen des kryptographischen Systementwurfs Module ID: ET-IDA-048 27.11.2018, v33 Prof. W. Adi Lecture-6 Ciphering and the Theory of Secrecy Systems

And Fundamentals of ciphering Secrecy Theory And Fundamentals of ciphering Outlines Historical Overview Basic Definitions Shannon’s Secrecy Theorem Perfect Secrecy „Vernam Cipher“ Unicity Distance Secret Key Cipher Principle

Two interesting statements around security! „The only system which is truly secure is one which is switched off , unplugged, locked in a titanium lined safe, buried in a concrete bunker, surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn't stake my life on it ....“ Gene Spafford - Computer Operations, Audit and Security Technology (COAST), Purdue University „If I am asked to stake my life on a cryptographic function, I would not trust any function related to known mathematics“ Ulli Maurer – ETH Zürich, Swisserland

Scientific History of Cryptography Cryptography (Greek: hidden word): is it Art or Science ? The scientific story has three epochs: I. Conventional Cryptography as Art till 1949 Julius Caesar Cipher Kaisiski “ The Art of Deciphering” 1863, ... Gauss Vernam (AT&T) 1926, first perfect/unbreakable system II world ware 1945, Enigma, Hagelin .... Alan Turing يقوب بن اسحق الكندي رسائل في استخراج المعمى Not widely known in convectional public literature: Jakob Alkindi Bagdad (801–873): "father of Islamic or Arabic philosophy“, Mathematician physician and musician. Presented mathematical tools for cryptanalysis: “Treaties on Extracting Cryptograms”, (Doc 4832 Sulaimania Library Istambul Turky)

Akindi’s Contribution in Crytoanalysis (استخراج المعمى) (scientific treatment 1000 years before Shannon’s modern entropy techniques) Introduced for the first time Determining the statistics of the frequency of letters in a particular language and made use of letter statistics to break a cipher by comparing the letter frequency in the cryptogram (showed an example of a text with 3667 letters) He indicated the importance that the cryptogram must be sufficiently long to get more accuracy. Classified different ciphering/deciphering techniques using a tree diagram Showed techniques for hiding information in an existing natural text as Steganography Alkindi’s treatise were dedicated to the government (Calif. In Bagdad Abu Al-abbas) Use of Cryptography was mainly to transfer confidential reports to the Caliph from the different wide spread areas of the Islamic rules territories (called “Bareed “ service) Ref.: http://www.muslimheritage.com/

Akindi’s Cipher Classification (استخراج المعمى) (873 AD) From the year 873

Scientific Epoch and Breakthrough in Cryptography 2. Modern scientific epoch: (1949) Shannon (AT&T) 1948 “A Mathematical Theory of Communication” Shannon’s Breakthrough in Communication: Error-free transmission is possible on noisy channels! C= B log2 (1 + S/N) Shannon (AT&T) 1949 'Communication Theory of Secrecy Systems‘ proved mathematically that Vernam cipher is unbreakable !Just new Scientific methodology but NO breakthrough in Cryptography! 3. Breakthrough to Modern Cryptology in 1976 Diffie and Hellman 1976 Public key Cryptography (Stanford University) Diffie Hellman ‘s Breakthrough in Cryptography: Secured transmission is possible on unsecured channels! ....... Any new Breakthrough expected ? !

2. Is Security a Science, Art or Magic ? BIG OPEN QUESTIONS 1. Is Security Measurable? 2. Is Security a Science, Art or Magic ? Question raised by James L. Massey Cryptography - Science or Magic? MIT, October 1, 2001, Running Time: 00:57:10 http://mitworld.mit.edu/video/42

Two Major Security Tasks Authentication Securely identify an entity Secrecy Keep data safe against illegal users Security tasks require to deploy Cryptographic mechanisms to be realized Cryptography is the science dealing with hiding information and data security questions

Secret Key Cryptography in Use Conventional Secret Key Cryptography in Use Fundamental Concepts

Cryptography : Basic definetions Attacker Crypto-analyser Channel Y = E (Ze,X) Cryptogram/Cipher text Message Clear text D (Zd,Y) Decryption Key Deciphering X Receiver Message X Sender Clear text Ciphering Encryption-Key E (Ze,X) Intruder Attacker Ze Zd

Cryptographic Attacks: Basic definetions Type of attacks: Cipher text only attack Known plaintext attack Chosen plaintext attack Chosen ciphertext attack Chosen Cipher/Plain Text Attack: is mostly assumed as a basis to evaluate the quality of a cipher Kerckhoff’s Principle: A General system security evaluation assumption: Attacker knows everything but not the key !

Secret Key Crypto-System : mechanical analog Key = Z Secret key agreement Key = Z Z SENDER RECEIVER Z Lock Message Message Z

Conventional Cryptography till 1976 : Secret Key systems Known locks as Standard Ciphers Security rests on the Cipher Ciphering De-Ciphering Sender Receiver Y = E (Z,X) X E ( Z,X ) X D ( Z,Y ) Message Channel Message Secret Key = Z Z Secret Key Channel Z

Is Cryptographic Security Measurable ? Yes and No ! Security measures adopted today: System is unconditionally secure (perfect) : System impossible to break with any means (whatever) One not very practical system is known ! Non-sceientific statement System is practically secure: System possible to break but with very huge means All modern practical systems fall under this category!

The Theory of “System Secrecy” Information Entropy: Shannon 1949 InformationSOURCE Output Examples: P : Probability function

The Theory of “System Secrecy” Example for calculating information entropy The probability of Head is 0.5 and the probability of Tail is 0.5 too. If you get either head or tail you will get 1 bit of information : For instance, 0 denotes Head and 1 denotes Tail : vice versa flipping a fair coin The entropy for that case is = 1 2 Possibilities which are equally probable!

The Theory of “System Secrecy” Information Entropy: Shannon 1949 Amount of information in a message M having n possible combinations is defined by Shannon as “Entropy” H(M) where: over all n-possible messages Mi Maximum entropy if all n combinations are equally probable , that is Prob(Mi) = 1/n for any i, Hence: = n  ( 1/n log2 n ) = log2 n where n is the number of possible meanings Example 1: M = months of the year H(M) = log2 12  3.6 bits Example 2: 2k equally probable keys H(M) = log2 2k = k bits

The Theory of Secrecy Systems Shannon 1949 If the entropy function for information source X: H (X) = -  pr(xi) . log2 pr(xi) {x} Then: 0  H (X)  log2 t (for t possibilities for message X) If the key entropy similarly is is H(Z) , then: Shannon Condition for Perfect Security is H (Z)  H (X) The key entropy (H(Z) for a key with k-bits if all key combinations are equally used: H(Z) = - 2k [ ( 1/2k ) . Log2 (1/2k) ] H (Z) = k In this case the necessary condition for Perfect Security is : k  H (X)

The only known Perfect Cipher: One-time-Pad OTP (Vernam Cipher) Invented by Vernam (AT&T 1926) Proved later to be impossible to break by Shannon (AT&T 1949) Gilbert Vernam 1890 – 1960 (AT&T) Cipher Text X+Z Clear Text X Z + Clear Text X+Z+Z=X + Z !Addition in GF(2)! key-tape Use key just one time!! Random One Time secret Key Unconditional Secrecy if : Key length = Clear text length (Shannon 1949) H(z) > H(X)

Generalised One-Time Pad System is also perfect for any Group < G, * > Cipher Text X*Z Clear Text X * Z * Z-1 =X Z-1 * Clear Text X * Z Key-tape One Time secret Key Key length = Clear text length !!! No key is repeatedly used!!

Improving Security by Message Compression Enhance security by reducing redundancy Perfect security always possible iff: Key length = Clear text length that is K=N Idea: make K=N if N > K by reducing N trough data compression Compressed to k Bits Clear text X N Bits / N > K K / K / Ideal Compressor Cipher Cipher text / K Unconditionally Secure! Key

Unicity Distance: Minimum required ciphertext to break a cipher Key equivocation function: H (Z|y1, y2, y3...yn) for non-randomized cipher Cipher Unicity Distance Information Redundancy Unicity Distance nu : is the minimum amount of ciphertext symbols which in principle can determin the secret key in a ciphertext only attack Or: Expected minimum amount of ciphertext needed for brute-force to break a cipher

(by increasing the unicity distance) Original Clear text N-Bits Plain Text Padding technique to improve security (by increasing the unicity distance) As larger uniucity distance means higher security, therefore a technique is proposed to increase the unicity distance by appending random unknown clear text as follows: Original Clear text N-Bits How to reduce r without compression? N Bits Random pattern L Random Bits New clear text N+L Bits H(X) N‘= N +L New unicity distance: u n N N + L = ¢

Compute the cipher‘s unicity distance nu and the clear text entropy. Example: A block cipher having a key size of 128 bits is encrypting a clear text with a block length of 128 bits. The clear text redundancy is r=0.8. Compute the cipher‘s unicity distance nu and the clear text entropy. The „unicity distance was doubled by appending L random bits to the clear text block. Compute L and the new clear text entropy. After all the above cipher changes an observer was able to watch 1000 cipher text bits. Would the observer with unlimited resources theoretically be able to uniquely break the cipher in that case ? Give a reasoning for your answer. SDF2009

Solution: K= 128 Bits, H(x)=? Bits, r = 0.8 K before 128 bits Data K= 128 Bits, H(x)=? Bits, r = 0.8 after 128 bits Data 128 random bits K r 1. Unicity distance nu = = 128/0.8 = 160 Bits (the cipher can be theoretically broken after 160 cipher bits) As r = [ N – H(x) ] / N => N . r = N – H(x) => entropy H(x) = N · (1-r) => H(x) = 128 · (1-0.8) = 25.6 Bits n‘u = [ ( N + L ) / N ] · nu 2 ∙ 160 = [( 128 + L ) / 128] · 160 => L = 128 Bits H‘(x) = L + H(x) = 128 + 25,6 = 153.6 bits 3. The observer can theoretically break the cipher as the number of the observed cryptogram bits (1000 bits) is more than the unicity distance (320 bits) of the cipher. 26