Cryptography. What is cryptography? kryptos – “hidden” grafo – “write” Keeping messages secret  Usually by making the message unintelligible to anyone.

Slides:



Advertisements
Similar presentations
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
Advertisements

Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
Modern Cryptography.
Classical Cryptography. What is cryptography? kryptos – “hidden” grafo – “write” Keeping messages secret  Usually by making the message unintelligible.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 651: Introduction to Network Security
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptanalysis. The Speaker  Chuck Easttom  
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS110: Computers and the Internet Encryption and Certificates.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Encryption Coursepak little bit in chap 10 of reed.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Network Security – Special Topic on Skype Security.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Encryption CS110: Computer Science and the Internet.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
CS 150 – Computing: From Ada to the Web Cryptography.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Cryptography – Test Review
Introduction to modern cryptography: principles and protocols
Privacy & Security.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
What is network security?
Public-key Cryptography
Lecture 3: Symmetric Key Encryption
Security through Encryption
PART VII Security.
Appendix 5: Cryptography p
NET 311 Information Security
Basic Network Encryption
Modern Cryptography.
Presentation transcript:

Cryptography

What is cryptography? kryptos – “hidden” grafo – “write” Keeping messages secret  Usually by making the message unintelligible to anyone that intercepts it

The Problem BobAlice Eve Private Message Eavesdropping

The Solution BobAlice Eve Scrambled Message Eavesdropping EncryptionDecryption Private Message

What do we need? Bob and Alice want to be able to encrypt/decrypt easily But no one else should be able to decrypt How do we do this?  Keys!

Using Keys Plaintext Ciphertext DecryptionEncryption Plaintext Nonsense

The Shift Cipher We “shift” each letter over by a certain amount ILYH UHG EDOORRQV five red balloons f + 3 = I i + 3 = L v + 3 = Y … Plaintext Ciphertext Encryption Key = 3

The Shift Cipher cont. To decrypt, we just subtract the key five red balloons I - 3 = f L - 3 = i Y - 3 = v … Plaintext Decryption Key = 3 ILYH UHG EDOORRQV Ciphertext

What’s wrong with the shift cipher? Not enough keys! If we shift a letter 26 times, we get the same letter back  A shift of 27 is the same as a shift of 1, etc.  So we only have 25 keys (1 to 25) Eve just tries every key until she finds the right one

The Substitution Cipher Rather than having a fixed shift, change every plaintext letter to an arbitrary ciphertext letter aG bX cN dS eD …… zQ PlaintextCiphertext

The Substitution Cipher cont. aG bX cN dS eD fA gF hV iL jM kC lO mE ALRD HDS XGOOYYBW five red balloons f = A i = L v = R … Plaintext Ciphertext Encryption Key = nB oY pZ qP rH sW tI uJ vR wU xK yT zQ

The Substitution Cipher cont. To decrypt we just look up the ciphertext letter in the table and then write down the matching plaintext letter How many keys do we have now?  A key is just a permutation of the letters of the alphabet  There are 26! permutations

Frequency Analysis In English (or any language) certain letters are used more often than others If we look at a ciphertext, certain ciphertext letters are going to appear more often than others It would be a good guess that the letters that occur most often in the ciphertext are actually the most common English letters

Letter Frequency This is the letter frequency for English The most common letter is ‘e’ by a large margin, followed by ‘t’, ‘a’, and ‘o’ ‘J’, ‘q’, ‘x’, and ‘z’ hardly occur at all

Frequency Analysis in Practice Suppose this is our ciphertext  dq lqwurgxfwlrq wr frpsxwlqj surylglqj d eurdg vxuyhb ri wkh glvflsolqh dqg dq lqwurgxfwlrq wr surjudpplqj. vxuyhb wrslfv zloo eh fkrvhq iurp: ruljlqv ri frpsxwhuv, gdwd uhsuhvhqwdwlrq dqg vwrudjh, errohdq dojheud, gljlwdo orjlf jdwhv, frpsxwhu dufklwhfwxuh, dvvhpeohuv dqg frpslohuv, rshudwlqj vbvwhpv, qhwzrunv dqg wkh lqwhuqhw, wkhrulhv ri frpsxwdwlrq, dqg duwlilfldo lqwhooljhqfh.

Ciphertext distributionEnglish distribution In our ciphertext we have one letter that occurs more often than any other (h), and 6 that occur a good deal more than any others (d, l, q, r, u, and w) There is a good chance that h corresponds to e, and d, l, q, r, u, and w correspond to the 6 next most common English letters

Frequency Analysis cont. If we replace ‘e’ with ‘h’ and the 6 next most common letters with their matches, the ciphertext becomes  an intro???tion to ?o?p?tin? pro?i?in? a ?roa? ??r?e? o? t?e ?i??ip?ine an? an intro???tion to pro?ra??in?. ??r?e? topi?? ?i?? ?e ??o?en ?ro?: ori?in? o? ?o?p?ter?, ?ata repre?entation an? ?tora?e, ?oo?ean a??e?ra, ?i?ita? ?o?i? ?ate?, ?o?p?ter ar??ite?t?re, a??e???er? an? ?o?pi?er?, operatin? ???te??, net?or?? an? t?e internet, t?eorie? o? ?o?p?tation, an? arti?i?ia? inte??i?en?e.

Classical to Modern Cryptography Classical cryptography  Everything up until around WWII  Encryption/decryption done by hand Modern cryptography  Computers to encrypt and decrypt  Same principles, but automation allows ciphers to become much more complex

The Enigma Machine German encryption and decryption machine used in WWII Essentially a complex, automated substitution cipher

How did Enigma work? Rotors have different wiring connecting input to output Rotors move after each keypress The key is the initial position of the three rotors

Breaking the Enigma Britain set up its cryptanalysis team in Bletchley Park They consistently broke German codes throughout the war  Provided the intelligence codenamed ULTRA Important location in the history of computing  Alan Turing  COLOSSUS

Cryptography in the Computer Age Working with binary instead of letters We can do things many, many times  Think of an Enigma machine that has pairs of symbols on each rotor, and 20 rotors Other than that, the basic principles are the same as classical cryptography

Modern Ciphers We design one relatively simple scrambling method (called a round) and repeat it many times  Think of each round as a rotor on the Enigma  One round may be easy to break, but when you put them all together it becomes very hard Almost all ciphers follow one of two structures  SPN (Substitution Permutation Network)  Feistel Network  These describe the basic structure of a round

Modern Ciphers in Practice Follow SPN/Feistel structure in general, but with added twists for security There are two important ciphers in the history of modern cryptography  DES (Data Encryption Standard)  AES (Advanced Encryption Standard)

DES U.S. Government recognized the need to have a standardized cipher for secret documents DES was developed by IBM in 1976 Analysis of DES was the beginning of modern cryptographic research

Controversy Surrounding DES Development process was hidden from public  Suspicions that the government had put in a “backdoor” Government attempted to shut down research in cryptography

Breaking DES The key length of DES was too short  If a key is 56 bits long, that means there are 2 56 possible keys  “DES Cracker” machines were designed to simply try all possible keys

Breaking DES cont. DES was further weakened by the discovery of differential cryptanalysis  Biham and Shamir in 1990  The most significant advance in cryptanalysis since frequency analysis Ideally a ciphertext should be completely random, there should be no connection to its matching plaintext  Differential analysis exploits the fact that this is never actually the case  Uses patterns between plaintext and ciphertext to discover the key There is evidence that IBM knew about differential cryptanalysis back when they were designing DES in 1976

Developing the AES With DES effectively broken, a new standard was needed U.S. Government made it an open application/review process this time, and received many submissions In 2001, after five years, the Rijndael cipher was selected to become the Advanced Encryption Standard

The Problem of Symmetric Key Cryptography Up until now we’ve been talking about symmetric key cryptography  Alice and Bob are using the same key to encrypt/decrypt Problem: How does Bob get the key to Alice when Eve is eavesdropping? Up until 1976 the only solution was to physically give Alice the key in a secure environment

Public Key Cryptography Diffie and Hellman published a paper in 1976 providing a solution We use one key for encryption (the public key), and a different key for decryption (the private key) Everyone knows Alice’s public key, so they can encrypt messages and send them to her  But only Alice has the key to decrypt those messages No one can figure out Alice’s private key even if they know her public key

Using Public Keys Plaintext Ciphertext DecryptionEncryption Plaintext Nonsense

Public Key Cryptography in Practice The problem is that public key algorithms are too slow to encrypt large messages  Instead Bob uses a public key algorithm to send Alice the symmetric key, and then uses a symmetric key algorithm to send the message The best of both worlds!  Security of public key cryptography  Speed of symmetric key cryptography

Sending a Message What’s your public key? Bob picks a symmetric key and encrypts it using Alice’s public key Alice decrypts the symmetric key using her private key Bob encrypts his message using the symmetric key Then sends the key to Alice Then sends the message to Alice Alice decrypts the message using the symmetric key hi

The RSA Public Key Cipher The most popular public key cipher is RSA, developed in 1977  Named after its creators: Rivest, Shamir, and Adleman Uses the idea that it is really hard to factor large numbers  Create public and private keys using two large prime numbers  Then forget about the prime numbers and just tell people their product  Anyone can encrypt using the product, but they can’t decrypt unless they know the factors  If Eve could factor the large number efficiently she could get the private key, but there is no known way to do this

Are we all secure now? Unfortunately not, there are still many problems that need to be dealt with  How does Bob know that he’s really talking to Alice?  How does Alice know that the message she receives hasn’t been tampered with?  How does Alice know the message was sent by Bob? These are questions addressed by other areas of cryptography

The End