Announcements: Matlab: tutorial available at Matlab: tutorial available at

Slides:



Advertisements
Similar presentations
Computer Security Set of slides 4 Dr Alexei Vernitski.
Advertisements

Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Stream Ciphers.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
Announcements: 1. Term project groups and topics due tomorrow midnight Waiting for posts from most of you. Questions? This week: Primality testing, factoring.
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the orderQuestions? Review.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Announcements: 1. Short “pop” quiz on Ch 3 (not today) 2. Term project groups and topics due tomorrow midnight Waiting for posts from 22 of you. 3. HW6:
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
RC4 1 RC4 RC4 2 RC4  Invented by Ron Rivest o “RC” is “Ron’s Code” or “Rivest Cipher”  A stream cipher  Generate keystream byte at a step o Efficient.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
Announcements: Pass in Assignment 1 now Pass in Assignment 1 now Meet my assistant Kevin Reed Meet my assistant Kevin Reed Assignment 2 (tentative) posted.
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
symmetric key cryptography
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Network Security Section 1: Introduction to security.
Stream Ciphers Making the one-time pad practical.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Announcements: Matlab tutorial linked to in syllabus Matlab tutorial linked to in syllabusQuestions?Today: Block ciphers, especially Hill Ciphers Modular.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption CS110: Computer Science and the Internet.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Lecture 4 DECIPHERING CLASSICAL CIPHER SYSTEMS By: NOOR DHIA AL- SHAKARCHY
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
@Yuan Xue Quick Review.
PART VII Security.
Rivest, Shamir and Adleman
STREAM CIPHERS by Jennifer Seberry.
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Information and Computer Security CPIS 312 Lab 4 & 5
Presentation transcript:

Announcements: Matlab: tutorial available at Matlab: tutorial available at Questions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time pads and LFSR Schedule change: skip Playfair cipher, start ch 3 tomorrow DTTF/NB479: DszquphsbqizDay 5

Next: one time pads Back to Vigenere: if the codeword were really long, say 25% as long as the entire plaintext, how many characters would contribute to each dot product? ____ What does this say about our ability to do a frequency analysis? What does this say about our ability to do a frequency analysis? Now consider the extreme case, the one- time pad…

One-time pads Represent the plaintext in binary, length n Works for text (from ASCII), images, music, etc Works for text (from ASCII), images, music, etc The key is a random vector of length n Ciphertext = plaintext XOR key Do message = , key = message = , key = Cipher = ??? Cipher = ??? ciphertext XOR key = ???

Unbreakable? Yes, for ciphertext only… Ciphertext:EOFMCKSSDKIVPSSAD Could be: thephoneisringingmeetmeinthegarage… I need the whole key to decrypt. What’s the downside to using a one-time pad? Variation: Maurer, Rabin, Ding et al’s satellite method If I’m willing to compromise some security…

Linear Feedback Shift Register (LFSR) Sequences Name comes from hardware implementation b 1 b 2 b 3 b 4 … b m-1 b m Feedback function Shift register Generated bit stream Need initial conditions (bits in register) and a function to generate more terms. Example: x 1 = 0, x 2 = 1, x 3 = 0, x 4 = 0, x 5 = 0; x n+5 = x n + x n+2 (mod 2) What does this remind you of in math? To encrypt plaintext of length n, generate an n- bit sequence and XOR with the plaintext.

Linear Feedback Shift Register (LFSR) Sequences A recurrence relation! Specify initial conditions and coefficients, for example: Specify initial conditions and coefficients, for example: x 1 = 0, x 2 = 1, x 3 = 0, x 4 = 0, x 5 = 0; x n+5 = x n + x n+2 (mod 2) Another way to write is x n+5 = 1x n + 0x n+1 + 1x n+2 +0x n+3 + 0x n+4 (mod 2) In general, Generate some more terms How long until it repeats? (the period of the sequence) 10 bits ( ) generates ____ bits Demo

Long periods LFSR can generate sequences with long periods Like Vigenere with long key: hard to decrypt! Like Vigenere with long key: hard to decrypt! Lots of “bang for the buck”! Lots of “bang for the buck”! But it depends on the key But it depends on the key Good example:x n+31 =x n + x n+3 (mod 2) How many bits do we need to represent this recurrence? 62 bits 62 bits How long is the period? Over 2 billion! Why? Over 2 billion! Why? There exist (2 31 – 1) 31-bit words There exist (2 31 – 1) 31-bit words Why “-1”? If it cycles through all of these, it’s maximal. Related to Mersenne primes See for a list of maximal- period generators Can you devise a bad example (one with period << 2 n -1)?

LFSR Demo Downside: very vulnerable to known plaintext attacks. Determine key length by computing determinants Theorem: If N is the length of the shortest recurrence that generates the sequence, then det(M N ) = 1 (mod 2) and det(M n )=0 (mod 2) for all n > N. Theorem: If N is the length of the shortest recurrence that generates the sequence, then det(M N ) = 1 (mod 2) and det(M n )=0 (mod 2) for all n > N …  length = …  length = 5 Use the key length to solve for the recurrence. Verify your solution by using the solution to generate the whole key