 Introduction › What is Cryptology › Confusion and Diffusion › History  Methods › Single Key › Public Key  Cryptanalysis Overview  Ethics.

Slides:



Advertisements
Similar presentations
Computer Science 101 Data Encryption And Computer Networks.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Modern Cryptography.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Classical Cryptography
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Chapter 12 Cryptography (slides edited by Erin Chambers)
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Classical Encryption Techniques
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Information Systems Security
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
ITMS – 3153 Information Systems Security
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Terminology and classical Cryptology
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Classical Polygraphic Ciphers
Cryptography and Network Security
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
Campbell R. Harvey Duke University and NBER
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Modern Cryptography.
Presentation transcript:

 Introduction › What is Cryptology › Confusion and Diffusion › History  Methods › Single Key › Public Key  Cryptanalysis Overview  Ethics

What is Cryptology Confusion and Diffusion History

 The use and study of methods of hiding information  Plaintext: The message (not encrypted)  Cipher text: The encrypted message  Encryption: The process of converting the plaintext into cipher text  Code: Rule for replacing a piece of the plaintext with something else  Key: Known only b the transmitter and receiver, used to encrypt/decrypt the message  Cryptanalysis: The science of code breaking

 Confusion: The interceptor should not be able to predict the effect of changing one symbol of plaintext will affect cipher text.  Diffusion: Information from plaintext should be spread throughout the cipher text so that changes to the plaintext will cause changes throughout the cipher text.

 Spartans in Ancient Greece › First documented use of cryptography › Used a tapered baton called a scytale › The message could only be read when the parchment upon which the message was written was wrapped around the scytale  4 th Century BC: first treatise › Written by Aeneas Tacticus › In the book: On the Defense of Fortifications

 WWI › Most famous cipher was the German ADFGVX fractional cipher  WWII › Rotor Cipher Machines › Most famous Cipher Machine: Germany’s Enigma  Cracked by the British using the Turing Bomb

Single Key Monoalphabetic Ciphers Polyalphabetic Ciphers DES AES Public Key Key Distribution RSA

 Key for encrypting and decrypting are the same  Monoalphabetic Cipher: Each letter in the plaintext will always be replaced by the same letter/symbol › Ex: Caesar Cipher  Polyalphabetic Cipher: Each letter in the plaintext may not always be replaced by the same letter/symbol › Ex: Playfair Cipher

 Caesar Cipher: Shift the alphabet › DOG = GRJ  Keyword: keyword then fill in alphabet › COMPUTER SCIENCE = CJGKSQOM PCYOHCO ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC ABCDEFGHIJKLMNOPQRSTUVWXYZ DICTONARYBEFGHJKLMPQSUVWXZ

 Polyalphabetic Cipher  Charles Wheatstone in 19 th Century England  5X5 grid, fill in the key at the beginning and then add the rest of the alphabet (in order) › I/J are in the same box  Pair the letters of the message into digrams. › If there is an odd number, add X to the end › If there a digraph is made up of identical letter, separate them with a different letter

 Rules for exchanging letters 1. If the columns and rows are different  New letter is the row of the current letter and the column of its pair 2. If the rows are the same  New letter is the one to the right 3. If the columns are the same  New letter is the one below

 Key: Dictionary  Message: Computer Science  CO MP UT ER SC IE NC EX  TD PQ XD GN PO DF RD HU  What is this? ODMCQZ DI/JCTO NARYB EFGHK LMPQS UVWXZ

 Monoalphabetic ciphers are easy to break (think cryptoquip) › Find most commonly used letters (E, T, A, O, N, I, R, S, H) › Find most commonly used digrams and trigrams (ex: the, st) › Then the most common trigrams, etc. › Spacing makes it even easier (so don’t carry over spaces)

 Polyalphabetic Cipher  How it works 1. Choose a key 2. Write the key for the length of the message 3. (p+k)mod26 COMPUTERSCIENCE DICTIONARYDICTI GXPJDISSKBMNWWN ABCDEFGHIJKLMNOPQRSTUVWXYZ

 Repetition was Vigenere’s undoing  How to use autokey 1. Write key once 2. Fill in the rest with either the plaintext or cipher text

 Rail Fence: stagger plaintext between X rows  Ex: Computer Science with rail fence 2 CMUESINE OPTRCEC

 A better method: 1. Create a matrix with a keyword across the top row. 2. Fill the Matrix from left to right with the message 3. Take the letters from top to bottom by alphabetic order of the keyword (do not take keyword)

ENCRYPT ILIKETO PLAYWIT HMATRIC ESZZZZZ IAAZIPHELLMSTIIZKYTZOTCZEWRZ I LIKE TO PLAY WITH MATRICES

 Uses a 6X6 matrix and a key to encrypt the message into the letters A,D,F,G,V, and X  Fill the matrix in with the keyword and then the rest of the alphabet in order, followed by the numbers 0-9 (no doubles)  Replace each cipher text letter with the two letters that mark its row and column

 Message: Computer Science, Key: Dictionary  AFAVFXGAGGAGDVGFAFADAVAXAFDV ADFGVX A DICTON D ARYBEF F GHJKLM G PQSUVW V XZ0123 X

 A stream cipher translates plaintext into cipher text symbol by symbol › Most of the methods discussed thus far are stream ciphers › Errors like skipping a symbol will corrupt the rest of the message  A block cipher encrypts plaintext by blocks › Reduces corruption and risk of code breaking

 Developed by IBM, based on an encryption algorithm called Lucifer  Proper name: Data Encryption Algorithm

 Cycles are repeated 16 times  Split the plaintext into 64bit blocks  Key is any 56-bit number with an extra 8 bits on the end  Some people are uncomfortable with only a 56-bit key › Double DES: run twice with 2 different keys › Triple DES: 3 keys. Encrypt, Decrypt, Encrypt

 January 1997-August 1999, Encryption “Contest”  Winner: Rijndael (RINE dahl)  Combination of the names of the creators: Vincent Rijmen and Joan Daemen

 Plaintext split into 128-bit blocks  Number of “rounds” based on key size › 10 for 128-bits, 12 for 192-bits, 14 for 256-bits  Four Steps per cycle › Byte Substitution: Using a substitution box, substitute each bit according to a table › Shift Row: for 128 and 192: (n-1)bit left, for 256: row 2 by 1 bit, row 3 by 3 bits, row 4 by 4 bits › Mix Column: XOR bits together › Add Subkey: portion of subkey XOR with result

 Sender and Receiver must both hold a copy of the key › What happens if there are 100 people who want to communicate secretly › Each person has to remember 99 keys and must keep each key from being discovered › Number of keys required: 4950

 Also called two-key  Each person has two keys › Public key for encrypting › Private key for decrypting › Keep your private key and give everyone else your public key

 Euler Totient:  (n) › The number of integers in the set of real numbers less than n that are relatively prime to n › For a prime number, p,  (p) = p-1 › For distinct primes p & q,  (pq) = (p-1)(q-1)  Examples ›  (8) = 4 {1,3,5,7} ›  (91) =  (13)*  (7) = 6*12 = 72

 Pick two large prime numbers (p & q)  Calculate  (n) where n= pq  Find e such that e is relatively prime to  (n) › gcd(e,  (n)) = 1  Find d such that ed ≡ 1 mod  (n) › d is the inverse of e mod  (n)  Public keys: e, n  Private Key: d

 Encryption: C = E n,e (M) = M e mod n  Decryption: M = D n,d (C) = C d mod n

 Method used is based on the amount of information  Brute Force: try all possibilities  Dictionary Attack: run through a dictionary of words trying to find the key or plaintext  Cipher text only  Chosen Plaintext: Have the ability to find the cipher text relating to an arbitrary plaintext  Chosen Cipher text: can choose an arbitrary cipher text and know the plaintext  Adaptive chosen plaintext: determine cipher text based on plaintext using iteration

 Is cryptology ethical? › “Technology has no intrinsic ethical nature”  Wiretapping: Should encryption of digital communication be stymied in order to accommodate this practice?  Proper usage of cryptology is all about individual responsibility  Cryptology should not be withheld

 Pell, Oliver. Cryptology.  Arup Guha’s class lectures 62/lectures/ 62/lectures/  Pfleeger, Charles P. Pfleeger, Shari Lawrence. Security in Computing. 4 th Edition. Pearson Education  Falk, Courtney. The Ethics of Cryptography. chive/ pdf