Kyle Johnson. Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication.

Slides:



Advertisements
Similar presentations
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Advertisements

Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Classical Encryption Techniques
Enigma Meghan Emilio Advisor: Professor Ralph Morelli April 2004.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Classical Encryption Techniques
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
8. Cryptography1 ISA 562 Information Security Theory & Practice Introduction to Cryptography.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
CIS 5371 Cryptography Introduction.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Classical Encryption Techniques CSE 651: Introduction to Network Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Cryptography Lynn Ackler Southern Oregon University.
Cryptography (Traditional Ciphers)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Web Tools for Classical Cryptology Tristan Beeble.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
Intro to Cryptography Lesson Introduction
Introduction to Cryptography Lecture 8. Polyalphabetic Substitutions Definition: Let be different substitution ciphers. Then to encrypt the message apply.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Chapter 2 Basic Encryption and Decryption
Asad Gondal Ali Haider Mansoor
Basic Encryption Methods
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Types of Cryptanalysis attacks
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Kyle Johnson

Cryptology Comprised of both Cryptography and Cryptanalysis Cryptography - which is the practice and study of techniques for secure communication in the presence of third parties Cryptanalysis - which is the art of defeating cryptographic security systems, and gaining access to the contents of encrypted messages or obtaining the key itself.

History Fialka Cipher machine Used by the Soviet in the cold war era. Uses 10 rotors each with 30 contacts and also makes use of a punch card mechanism.

Cryptanalysis Tools Scytale(rhymes with Italy) Ancient Greek device used to implement a cipher. Vigenere square used for the Vigenere Cipher.

Classical Ciphers Term given by William Friedman in 1920 First recorded explanation in the 9 th century by Al- Kindi A manuscript Blaise de Vigenere used a repeating key cipher

Significance in History Mary, Queen of Scots World War I, Zimmerman Telegram World War II, German Enigma Machine

Cryptanalysis Results (Breaks) Total Break Global deduction Instance (local) deduction Information Deduction Distinguishing algorithm

Types of Attacks Ciphertext-only Known-plaintext Chosen-plaintext Chosen-Ciphertext

Ciphertext-only Also known as the known-ciphertext attack Attacker only has a set of Ciphertexts Successful, plaintext or key obtained Used in Frequency Analysis

Known-plaintext Attacker has both the plaintext and ciphertext. Goal: get the key WWII: German Enigma Machine Length, patterns, frequency

Known-Plaintext Example Plaintext: “THIS IS AN EXAMPLE OF A CIPHER” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Try Caesar Cipher: word length pattern noticed. Shift-1 Plaintext: “UIJT JT BO FYBNQMF PG B DJQIFS” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Not the same. Repeat for all possible shifts(25 times) Shift -4 Plaintext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Ciphertext: “XLMW MW ER IBEQTPI SJ E GMTLIV” Same! Caesar cipher: key is shift of 4.

Chosen-Plaintext Choose Plaintext to get random ciphertext Goal: Weaken the security, get key Plaintext injections Types of chosen-plaintext Batch chosen-plaintext Adaptive chosen-plaintext

Batch Chosen-plaintext Attack Chooses all of the plaintexts before they are encrypted This is the means of an unqualified use of this type of attack on encrypted data.

Adaptive Chosen-plaintext Attack Attacker will make a series of interactive queries Choosing subsequent plaintexts based on the information from the previous encryptions

Chosen Ciphertext Choose ciphertext, decrypt unknown key Enter multiple ciphertexts May be both adaptive and non-adaptive Types of chosen-ciphertext Lunchtime Attack Adaptive chosen ciphertext

Lunchtime Attack Also known as the midnight or indifferent attack Attacker makes adaptive chosen-ciphertext queries up to a certain point Can attack computer while user at lunch.

Adaptive chosen-ciphertext Attack in which ciphertexts may be chosen adaptively and after a challenge ciphertext is given to the attacker Ciphertext can’t be used itself Stronger attack than lunchtime but few practical attacks are of this form

Tests and Analysis Frequency Analysis Index of Coincidence Kasiski Test

Frequency Analysis Frequency of letters Used to solve classical ciphers Substitution Caesar Natural Langauge properties and patterns

Example of Frequency Analysis Consider this ciphertext : “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”

Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI” A: 0 B: 2 C: 1 So on down the alphabet…

Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”

Example of Frequency Analysis “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI”

Example of Frequency Analysis “XEJE WI RN EDCQLSE MO R OJEKGENYB RNRSBIWI”

Example of Frequency Analysis Encrypted: “XZJZ WI RN ZDCQLSZ MO R OJZKGZNYB RNRSBIWI” Decrypted: “HERE IS AN EXAMPLE OF A FREQUENCY ANALYSIS”

Kasiski Test Method of attacking polyalphabetic substitution ciphers Deduce length of Keyword ‘m’ number of rows Identical Segments of Ciphertext, length >= 3

Kasiski Test Consider the following text: KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST

Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV

Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV : differences (δ) = 18, 138, 54, 12

Kasiski Test KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDK OTFMBPVGEGLTGCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKY VXCHKFTPONCQQRHJVAJUWETMCMSPKQDYHJVDAHCTRLSVSK CGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJUMVGKMITZHF PDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVY CGAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACN VRWBBIREPBBVFEXOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJ VNPIST Trigram HJV : differences (δ) = 18, 138, 54, 12 Greatest common denominator: m = 6, length of the keyword is 6.

Index of Coincidence Comparing 2 partials of same ciphertext Ciphertext coincidences same in Plain Text Used to help solve Vigenere cipher. Check if two texts are in the same language, dialect

Index of Coincidence Consider the text from the Kasiski Test: KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDKOTFMBPVGEGLT GCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKYVXCHKFTPONCQQRHJVAJUWET MCMSPKQDYHJVDAHCTRLSVSKCGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJ UMVGKMITZHFPDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVYC GAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACNVRWBBIREPBBVFE XOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJVNPIST And the length of the keyword m = 6

Index of Coincidence KCCPKBGUFDPHQTYAVINRRTMVGRKDNBVFDETDGILTXRGUDDKOTFMBPVGEGLT GCKQRACQCWDNAWCRXIZAKFTLEWRPTYCQKYVXCHKFTPONCQQRHJVAJUWET MCMSPKQDYHJVDAHCTRLSVSKCGCZQQDZXGSFRLSWCWSJTBHAFSIASPRJAHKJRJ UMVGKMITZHFPDISPZLVLGWTFPLKKEBDPGCEBSHCTJRWXBAFSPEZQNRWXCVYC GAONWDDKACKAWBBIKFTIOVKCGGHJVLNHIFFSQESVYCLACNVRWBBIREPBBVFE XOSCDYGZWPFDTKFQIYCWHJVLNHIQIBTKHJVNPIST And the length of the keyword m = 6 Index of coincidence requires one to break the ciphertext up into the m number of rows. Each with as similar number of letters as possible.

Index of Coincidence

Smaller example: IoC

Index of Coincidence For English text the index of coincidences is approximately.o66 The index of coincidence for the previous example: m = 1: m = 2: 0.038, m = 3: 0.056, 0.048, m = 4: 0.037, 0.042, 0.037, m = 5: 0.043, 0.043, 0.031, 0.035, m = 6: 0.063, 0.084, 0.049, 0.065, 0.042, m = 7: 0.031, 0.044, 0.043, 0.038, 0.044, 0.044, Since the values are closest to.066 where m = 6 it is the appropriate choice for the keyword length.

Other attacks Brute-Force Attack Boomerang Attack Linear cryptanalysis Brute-Force Attack Boomerang Attack Linear cryptanalysis

Attack runtimes

Today’s Cryptanalysis The NSA has developed, due to an enormous breakthrough, the ability to cryptanalyze unfathomably complex encryption systems This includes those developed by other governments but as well as average computer users in the US The NSA is known for its mathematical breakthroughs in cryptanalysis especially differential cryptanalysis

Questions?