Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Stream cipher diagram + + Recall: One-time pad in Chap. 2.
Cryptography Kinder Garden Number theory and Classical Cryptosystems Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/10/2010 INCS.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Classical Cryptography
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
symmetric key cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
PRNGs Pseudo-random number generation. Randomness and Cryptography Randomness and pseudo-randomness are useful in cryptography: –To generate random and.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Classical Polygraphic Ciphers
Cryptography and Network Security
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Crypto for CTFs.
Presentation transcript:

Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers (26! Permutations) Sherlock Holmes P27 (Visual Substitution) The Playfair and ADFG[V]X Ciphers Block Ciphers PseudoRandom Number Generators

Shift Cipher y=x+k (mod 26) attack  XQQXZH (k=23 mod 26) great  ITGCV (k=2 mod 26) a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d

Affine Cipher y=ax+b mod 26 how are you  QZNHOBXZD, (a,b)=(5,7) wo??er?u?  NZUWBOGDK, (a,b)=(5,7) gcd(a,26)=1 is required Table for ax=1 mod 26 1(1) 7(15) 15( 7) 21(5) 3(9) 9( 3) 17(23) 23(17) 5(21) 11(19) 19(11) 25(25)

Frequencies of Letters in English a b c d e f g h i j k l m n o p q r s t u v w x y z

Vigenere Cipher The same letter need not be enciphered as the same letter Key: vector=(21,4,2,19,14,17) h e r e i s h o w i t w o r k s v e c t o r v e c t o r v e c t C I T X W J C S Y B H N J V M L Attacks according to the following information (1) The frequencies of letters in English A0=[.082,.015,.028, …,.020,.001] is larger than, j=1,2,...,25 (2) Key length (3) Digrams (e.g., WX) or trigrams (e.g., FHQ)

Sherlock Holmes A visual substitution (use a visual pattern to replace each English letter)

The Playfair p l a y f i r b c d e g h k m n o q s t u v w x z meet at the schoolhouse  me et at th es ch ox ol ho us ex EG MN FQ QM KN BK SV VR GQ XN KU

ADFGX Cipher A D F G X A p g c e n D b q o z r F s l a f t G m d v i w X k u y x h Kaiser Wilhelm  XA FF GG FA AG DX GX GG FD XX AG FD GA

Block Ciphers Hill cipher, DES, AES, RSA, Electronic Codebook, Elliptic Curve cryptosystems Find the inverse of A and B (mod 26) A=3 4 inv-A= M = [1 2 3; 4 5 6; ] inv-M=[22 5 1; ; ]

Hill Cipher blockcipherx ( ) (2 10 2) (8 15 7) ( ) ( )M=( ) (mod 26) = RBZ (2 10 2)M =( ) (mod 26) = MUE blockcipher  RBZMUEPYONOM

Binary Numbers and ASCII ASCII – American Standard Code for Information Interchange A=65= ~ Z=90= a=97= ~ z=122= [33~47] ! “ # $ % & ' ( ) * +, -. / [48~64] : ; ¡ = ¿

One-time Pads By Gilbert Vernam and Joseph Mauborgne around 1918 The key is a random sequence of 0’s and 1’s of the same length as the message. Once a key is used, it is discarded and never used again ⊕ = Used in “hot line” between USSR and US

Pseudo-random Bit Generation Rand() based on a linear congruential generator x n =ax n-1 + b (mod m) with gcd(a,m)=1, m= = x 0 =seed, a=16847, b= Blum-Blum-Shub (BBS) bit generator Select n=pq, the product of two primes x 0 =seed=x 2 (mod n), where gcd(x,n)=1 x j =(x j-1 ) 2 (mod n) and b j = x j ^ 1

Linear Feedback Shift Register (LFSR) Sequences (mod 2) Plaintext (x 1, x 2, x 3, x 4, x 5 )=(0,1,0,0,0) X n+5 =X n + X n+2 (mod 2) X n+m =c 0 x n +c 1 x n+1 +····+c m-1 x n+m-1 (mod 2) X n+31 =X n + X n+3 (mod 2) has period

Proposition Let M be a matrix (mod 2) {x 1 x 2 x 3 ··· x m x 2 x 3 x 4 ··· x m+1 ︰ x m x m+1 x m+2 ··· x 2m-1 }={x j } If the sequence {x j } satisfies a linear recurrence of length less than m, then det(M)=0. Cinversely, if the sequence satisfies a linear recurrence of length m and det(M)=0, then the sequence also satisfies a linear recurrence of length than m.

(plaintext) (key) (ciphertext)

Cryptanalysis Suppose X n+2 =C 0 X n +C 1 X n+1

Cryptanalysis If the linear recurrence of length is less than m,then

Irreducible Polynomial mod 2 x n+m =c 0 x n +c 1 x n+1 +····+c m-1 x n+m-1 (mod 2) f(T)=T m –c m-1 T m-1 - ‥‥ - c 1 T 1 – c 0 If f(T) is irreducible, then its period divides 2 m – 1, an interesting case is when 2 m – 1 is a prime (Mersenne primes) 2 31 – 1 = is a prime number Further discuss this topic later

Enigma A mechanical encryption device used by the Germans in World War II. A rotor machine

Enigma

Schematic diagram of Enigma

K:keyboard R:revering drum S:plugboard L,M,M:rotors

Single Rotor 26 substitution cipher A1,A27,A53…. A2,A28,A54…. Frequency analysis

Three Rotors 26*26*26*6= possibilities ways of interchanging six pairs of letters on the plugboard.

To Attack Enigma A codebook containing the daily settings. During a given day,every first letters in plaintexts is encrypted in the same substitution cipher.

To Attack Enigma Message key:a sequence of three letters,for example,r,f,u. rfurfu Daily setting Encrypting the message key Reset

To Attack Enigma dmqvbn vonpuy pucfmq AD=(dvpf..)… AD=(dvpfkxgzyo)(eijmunqlht)(bc)(rw)(a)(s)

The Effect of the Plugboard AD has cycles of length 10,10,2,2,1,1. SADS -1 has cycles of length 10,10,2,2,1,1. The cycle lengths remain unchanged. Substitution cipher

Bletchley Park

Exercises Problems from 2.13 Exercises on p.55~59 Problems from 2.14 Exercises on p.59~62