BITS Pilani Crypto Make-Up #1 Regular Session #2.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Computer Science 101 Data Encryption And Computer Networks.
1 Lect. 3 : Basic Terms Lots of new terminologies in every new fields…
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
The Evolution of Secret Writing 楊子陞 B 李柏勳 B 馬天祥 B 陳孟彙 B
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Network Management and Security
Steganography Rayan Ghamri.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Section 3.6: An Introduction to Cryptography
Steganography Ben Lee III Long Truong ECE Spring 2002.
The Evolution of Secret Writing 郭謹瑋 b 黃聖德 b 葉人豪 b 謝東頤 b
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Information Systems Security
Cryptography, Authentication and Digital Signatures
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Instructor: Dania Alomar
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
COMENIUS 8th APRIL TRASFORMATION + SECRECY Encryption Grafien = writing Cryptos = hidden, secret.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
Secure communication Informatics for economists II Jan Přichystal
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Network Security Unit-1
Classical Polygraphic Ciphers
Cryptography and Network Security
A (Very) Brief History of Pre-Computer Cryptography
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Chapter 3:Cryptography (16M)
DISSERTATION ON CRYPTOGRAPHY.
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

BITS Pilani Crypto Make-Up #1 Regular Session #2

Prereqs Mathematics Back-ground Groups, Rings and Fields Primitive Boolean Operations Discrete Mathematics Probability / Number Theory Almost all of Computer Networks !!

History Evolution of Secret Writing For thousands of years, Kings, queens and generals have relied on efficient communication in order to govern their countries and command their armies. At the same time, they have all been aware of the consequences of their messages falling in the wrong hands. Some of the earliest accounts of secret writing date back to Herodotus, ‘the father of history’ according to the Roman philosopher and statesman Cicero. Greece and Persia 5 th Century BC.

Other Techniques Shaving the head of a messenger, writing on his scalp and then waiting for the hair to re-grow. Tiny balls of wax, invisible ink ( sap of the thithymalus plant ), organic fluids A mixture of one ounce of alum and a pint of vinegar on a hard-boiled egg. STEGANOGRAPHY Steganos meaning ‘covered’ and graphein meaning ‘to write’

The longevity of steganography illustrates that it certainly offers a means of security, but it suffers from a fundamental weakness. ??? If the messenger is searched and the message discovered, the contents of the intended secret communication are revealed at once. Interception of the message immediately compromises all security. A thorough guard might routinely search any person crossing the border, scraping any wax tablets, heating blank sheets of paper, shelling boiled eggs, shaving people’s heads,  and so on, and inevitably there will be occasions where message is uncovered.    That’s where CRYPTOGRAPHY came into picture

Cryptography Derived from the Greek word “kryptos” meaning “hidden” and “graphien” meaning “to write”. Idea and advantage ???? Cryptography + Steganography !!! Microdot !!!! The first Microdot to be spotted was in 1941 by the FBI, following a tip-off that the Americans should look for a tiny gleam from the surface of a letter.

SECRET WRITING STEGANOGRAPHY CRTPTOGRAPHY Substitution Transposition Cipher Code

Assassinate = D general = 3 immediately = 08 Blackmail= p king today =73 Capture = j minister = # tonight = 28 Protect = Z prince = !!! Tomorrow=43 Plain message= assassinate the king tonight Encoded message= Technically a code is defined as a substitution at the level of words or phrases, whereas a cipher is the substitution at the level of letters.

Goals of cryptography Privacy ( Confidentiality) Integrity Authentication Non-Repudiations !!!

Authentication deals with whom you are talking to before revealing sensitive info Integrity Control…..no manipulation in data { message received == message sent } Non Repudiations… no Impersonification ( seeming sender == actual sender, No denial) Privacy has to do with keeping your info out of unauthorized hands

Terminology ( sender, receiver, plain text etc)

P = Plain text C = Cipher text E = Encryption Algorithm D = Decryption Algorithm C = E(P) P = D(C) P = D ( E ( P ))

An Encryption process involves an algorithm and a key C = E k ( P ) P = D k ( C ) P = D k ( E k ( P )) CRYPTANALYSIS The Process of breaking the encryption when key is not known in an attempt to : - Discover the Plain text Discover the Key

Terminology Contd … Unconditionally Secure If the cipher text generated does not contain enough information to get the plain text, no matter how much cipher text is available. Computationally Secure If the cost of breaking the Cipher text exceeded the value of encrypted information. The time required to break the cipher exceeds the useful information life-time.. Period !!!

Some Other Ciphers Caesar Square Cipher Rail Fence Cipher Ottendorf Cipher AtBash Cipher Play-Fair Cipher Hill Cipher

The first recorded description of the Playfair cipher was in a document signed by Wheatstone on 26 March However, the scheme eventually came to be known by the name of Wheatstone's friend Lord Playfair, who popularized it26 March1854Lord Playfair The Playfair cipher uses a 5 by 5 table containing a keyword or phrase. To generate the key table, one would first fill in the spaces in the table with the letters of the keyword (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (usually omitting "Q" to reduce the alphabet to fit, other versions put both "I" and "J" in the same space).

Rules:- Break message into digraphs If both letters are the same (or only one letter is left), add a "X" after the first letter. Encrypt the new pair and continue. If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively If the letters appear on the same column of your table, replace them with the letters immediately below. If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair.

P L A Y F I R E X M B C D G H J K N O S T U V W Z Hide the Gold in the tree stump HI DE TH EG OL DI NT HE TR EX ES TU MP

HI -> BM DE -> ND Th -> ZB EG -> XD OL -> KY DI -> BE NT -> JV HE –> DM TR -> UI EX -> XM ES -> MN TU -> UV MP -> IF

Security Revisited !!! What is a Secure Cryptographic Algorithm ???

Some other Finer points !!!!

ANY QUESTIONS ?????