CS 5950/6030 Network Security Class 5 (M, 9/12/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides prepared.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CS 5950/6030 Network Security Class 7 (F, 9/16/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides prepared.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CS 5950/6030 Network Security Class 4 (F, 9/9/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides prepared.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CS 5950/6030 Network Security Class 6 (W, 9/14/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides prepared.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
CIS 725 Security. Cryptosystem Quintuple ( E, D, M, K, C ) M set of plaintexts K set of keys C set of ciphertexts E set of encryption functions e: M 
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Chapter 2 Basic Encryption and Decryption
CH15 –Security & Crypto.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CS 5950/6030 Network Security Class 5 (M, 9/12/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides prepared by: Prof. Aaron Striegel, U. of Notre Dame Prof. Barbara Endicott-Popovsky, U. Washington, and Prof. Deborah Frincke, U. Idaho Prof. Jussipekka Leiwo, VU, The Netherlands]

Survey of Students’ Background and Experience (1) Background Survey CS 5950/6030 Network Security - Fall 2005 Please print all your answers. First name: __________________________Last name: _____________________________ _____________________________________________________________________ Undergrad./Year ________ OR: Grad./Year or Status (e.g., Ph.D. student) ________________ Major_____________________________________________________________________ PART 1. Background and Experience 1-1)Please rate your knowledge in the following areas (0 = None, 5 = Excellent). UNIX/Linux/Solaris/etc. Experience (use, administration, etc.) Network Protocols (TCP, UDP, IP, etc.) Cryptography (basic ciphers, DES, RSA, PGP, etc.) Computer Security (access control, security fundamentals, etc.) Any new students who did not fill out the survey?

3 Section 2– Class 5 (1) 1.3. Introduction to Security... Class 4: Methods of Defense – PART Principles of Computer Security 2. Introduction to Cryptology 2A. Terminology and Background 2A.1. Threats to Messages 2A.2. Basic Terminology and Notation 2A.3. Requirements for Crypto Protocols

4 Section 2– Class 5 (1) Class 5: 2A.2-cont. - Basic Terminology and Notation Cryptanalysis Breakable Encryption 2A.4. Representing Characters 2B. Basic Types of Ciphers 2B.1. Substitution Ciphers a. The Ceasar Cipher b. Other Substitution Ciphers – PART 1

Methods of Defense Five basic approaches to defense of computing systems Prevent attack Block attack / Close vulnerability Deter attack Make attack harder (can’t make it impossible  ) Deflect attack Make another target more attractive than this target Detect attack During or after Recover from attack

6 A) Controls Castle in Middle Ages Location with natural obstacles Surrounding moat Drawbridge Heavy walls Arrow slits Crenellations Strong gate Tower Guards / passwords Computers Today Encryption Software controls Hardware controls Policies and procedures Physical controls

7 B) Effectiveness of Controls Awareness of problem People convined of the need for these controls Likelihood of use Too complex/intrusive security tools are often disabled Overlapping controls >1 control for a given vulnerability To provide layered defense – the next layer compensates for a failure of the previous layer Periodic reviews A given control usually becomess less effective with time Need to replace ineffective/inefficient controls with better ones

Principles of Computer Security Principle of Easiest Penetration (p.5) Principle of Adequate Protection (p.16) Principle of Effectiveness (p.26) Principle of Weakest Link (p.27)

9 Section 1 Summary 1.1. Course Overview Syllabus - Course Introduction 1.2. Survey of Students’ Background and Experience 1.3. Introduction to Security Examples – Security in Practice What is „Security?”

10 Section 2: Introduction to Cryptology 2A. Terminology and Background

11 2A.1. Threats to Messages Interception Interruption Blocking msgs Modification Fabrication “ A threat is blocked by control of a vulnerability” [Pfleeger & Pfleeger] [cf. B. Endicott-Popovsky, U. Washington]

12 2A.2. Basic Terminology & Notation Cryptology: cryptography + cryptanalysis Cryptography: art/science of keeping message secure Cryptanalys: art/science of breaking ciphertext Enigma in WW2 Read the real story – not fabrications!

13 Cryptosystems w.r.t. Keys Keyless cryptosystems exist (e.g., Caesar’s cipher - below) Less secure Symmetric cryptosystems: K E = K D (p.38) Classic Encipher and decipher using the same key Or one key is easily derived from other Asymmetric cryptosystems: K E ≠ K D (revious slide) Public key system Encipher and decipher using different keys Computationally infeasible to derive one from other [cf. B. Endicott-Popovsky, U. Washington]

14 2A.3. Requirements for Crypto Protocols Messages should get to destination Only the recipient should get it Only the recipient should see it Proof of the sender’s identity Message shouldn’t be corrupted in transit Message should be sent/received once Proofs that message was sent/received (non- repudiation) [cf. D. Frincke, U. of Idaho]

15 2A.2.-CONT- Basic Terminology and Notation (2A.2 addenda)  Cryptanalysis  Breakable Encryption

16 Cryptanalysis (1) (Continued: 2A.2. Basic Terminology and Notation - Cont.) Cryptanalysts goals: Break a single msg Recognize patterns in encrypted msgs, to be able to break the subsequent ones Infer meaning w/o breaking encryption Unusual volume of msgs between enemy troops may indicate a coming attack Busiest node may be enemy headquarters Deduce the key, to facilitate breaking subsequent msgs Find vulnerabilities in implementation or environment of an encryption algorithm Find a general weakness in an encryption algorithm

17 Cryptanalysis (2) (Continued: 2A.2. Basic Terminology and Notation - Cont.) Information for cryptanalysts: Intercepted encrypted msgs Known encryption algorithms Intercepted plaintext Data known or suspected to be ciphertext Math or statistical tools and techniques Properties of natural languages Esp. adversary’s natural language To confuse the enemy, Americans used Navajo language in WW2 Propertiers of computer systems Role of ingenuity / luck There are no rules!!!

18 Breakable Encryption (1) (Continued: 2A.2. Basic Terminology and Notation - Cont.) Breakable encryption Theoretically, it is possible to devise unbreakable cryptosystems Based on Shannon’s theory of information Practical cryptosystems almost always are breakable, given adequate time and computing power The trick is to make breaking a cryptosystem hard enough for the intruder [cf. J. Leiwo, VU, NL]

19 Breakable Encryption (2) (Continued: 2A.2. Basic Terminology and Notation - Cont.) Example: Breakability of an encryption algorithm Msg with just 25 characters  possible decryptions ~ decryptions  Only one is the right one  Brute force approach to find the right one:  At (10 bln) decr./sec => / = sec = 10 bln yrs !  Infeasible with current technology Be smarter – use ingenuity Could reduce to, say, decryptions to check At decr./sec => / = 10 5 sec = ~ 1 day

20 2A.4. Representing Characters Letters (uppercase only) represented by numbers 0-25 (modulo 26). A B C D... X Y Z Operations on letters: A + 2 = C X + 4 = B (circular!)...

21 2B. Basic Types of Ciphers Substitution ciphers Letters of P replaced with other letters by E Transposition (permutation) ciphers Order of letters in P rearranged by E Product ciphers E „=” E 1 „+” E 2 „+”... „+” E n Combine two or more ciphers to enhance the security of the cryptosystem

22 2B.1. Substitution Ciphers Substitution ciphers: Letters of P replaced with other letters by E Outline: a. The Caesar Cipher b. Other Substitution Ciphers c. One-Time Pads

23 a. The Caesar Cipher (1)  c i =E(p i )=p i +3 mod 26 (26 letters in the English alphabet) Change each letter to the third letter following it (circularly) A  D, B  E,... X  A, Y  B, Z  C  Can represent as a permutation  :  (i) = i+3 mod 26  (0)=3,  (1)=4,...,  (23)=26 mod 26=0,  (24)=1,  (25)=2  Key = 3, or key = ‘D’ (bec. D represents 3)

24 The Caesar Cipher (2)  Example [cf. B. Endicott-Popovsky]  P (plaintext):HELLO WORLD  C (ciphertext):khoor zruog  Caesar Cipher is a monoalphabetic substitution cipher (= simple substitution cipher)

25 Attacking a Substitution Cipher  Exhaustive search  If the key space is small enough, try all possible keys until you find the right one  Cæsar cipher has 26 possible keys from A to Z OR: from 0 to 25  Statistical analysis (attack)  Compare to so called 1-gram (unigram) model of English  It shows frequency of (single) characters in English [cf. Barbara Endicott-Popovsky, U. Washington]

26 1-grams for English a0.080h0.060n0.070t0.090 b0.015i0.065o0.080u0.030 c j0.005p0.020v0.010 d0.040k0.005q0.002w0.015 e0.130l0.035r0.065x0.005 f0.020m0.030s0.060y0.020 g0.015z0.002 [cf. Barbara Endicott-Popovsky, U. Washington]

27 Statistical Attack – Step 1  Compute frequency f(c) of each letter c in ciphertext  Example: c = ‘khoor zruog’  10 characters: 3 * ‘o’, 2 * ‘r’, 1 * {k, h, z, u, g}  f(c): f(g)=0.1f(h)=0.1f(k)=0.1f(o)=0.3f(r)= 0.2 f(u)=0.1f(z)=0.1 f(c i ) = 0 for any other c i  Apply 1-gram model of English  Frequency of (single) characters in English  1-grams on previous slide [cf. Barbara Endicott-Popovsky, U. Washington]

28 Statistical Analysis – Step 2   (i) - correlation of frequency of letters in ciphertext with frequency of corresponding letters in English —for key i  For key i:  (i) =  0 ≤ c ≤ 25 f(c) * p(c – i)  c representation of character (a-0,..., z-25)  f(c) is frequency of letter c in ciphertext C  p(x) is frequency of character x in English  Intuition: sum of probabilities for words in P, if i were the key  Example: C = ‘khoor zruog’ (P = ‘HELLO WORLD’) f(c): f(g)=0.1, f(h)=0.1, f(k)=0.1, f(o)=0.3, f(r)=0.2, f(u)=0.1, f(z)=0.1 c: g - 6, h - 7, k - 10, o - 14, r - 17, u - 20, z - 25  (i) = 0.1p(6 – i) + 0.1p(7 – i) + 0.1p(10 – i) p(14 – i) + 0.2p(17 – i) + 0.1p(20 – i) p(25 – i) [cf. Barbara Endicott-Popovsky, U. Washington]

29 Calculations – Step 2a i (i)(i) i (i)(i) i (i)(i) i (i)(i) [cf. Barbara Endicott-Popovsky, U. Washington]  Correlation  (i) for 0≤ i ≤25

30 The Result – Step 3  Most probable keys (largest  (i) values): –i = 6,  (i) = plaintext EBIIL TLOLA –i = 10,  (i) = plaintext AXEEH PHKEW –i = 3,  (i) = plaintext HELLO WORLD –i = 14,  (i) = plaintext WTAAD LDGAS  Only English phrase is for i = 3 –That’s the key (3 or ‘D’) – code broken [cf. Barbara Endicott-Popovsky, U. Washington]

31 Cæsar’s Problem  Conclusion: Key is too short  1-char key – monoalphabetic substitution  Can be found by exhaustive search  Statistical frequencies not concealed well by short key  They look too much like ‘regular’ English letters  Solution: Make the key longer  n-char key (n  2) – polyalphabetic substitution  Makes exhaustive search much more difficult  Statistical frequencies concealed much better  Makes cryptanalysis harder [cf. Barbara Endicott-Popovsky, U. Washington]

32 b. Other Substitution Ciphers n-char key Polyalphabetic substitution ciphers Vigenere Tableaux cipher

33 Polyalphabetic Substitution - Examples Flatten (difuse) somewhat the frequency distribution of letters by combining high and low distributions Example – 2-key substitution: A B C D E F G H I J K L M Key1: a d g j m p s v y b e h k Key2: n s x c h m r w b g l q v N O P Q R S T U V W X Y Z Key1: n q t w z c f i l o r u x Key2: a f k p u z e j o t y d i [cf. J. Leiwo, VU, NL] Question: How Key1 and Key2 were defined?

34... Example: A B C D E F G H I J K L M Key1: a d g j m p s v y b e h k Key2: n s x c h m r w b g l q v N O P Q R S T U V W X Y Z Key1: n q t w z c f i l o r u x Key2: a f k p u z e j o t y d i [cf. J. Leiwo, VU, NL] Answer: Key1 – start with ‘a’, skip 2, take next, skip 2, take next letter,... (circular) Key2 - start with ‘n’ (2nd half of alphabet), skip 4, take next, skip 4, take next,... (circular)

35 Example: A B C D E F G H I J K L M Key1: a d g j m p s v y b e h k Key2: n s x c h m r w b g l q v N O P Q R S T U V W X Y Z Key1: n q t w z c f i l o r u x Key2: a f k p u z e j o t y d i Plaintext: TOUGH STUFF Ciphertext: ffirv zfjpm use n (=2) keys in turn for consecutive P chars in P Note: Different chars mapped into the same one: T, O  f Same char mapped into different ones: F  p, m ‘ f ’ most frequent in C (0.30); in English: f( f ) = 0.02 << f( e ) = 0.13 [cf. J. Leiwo, VU, NL]

36 Vigenere Tableaux (1) P [cf. J. Leiwo, VU, NL] Note:Row A – shift 0 (a->a) Row B – shift 1 (a->b) Row C – shift 2 (a->c)... Row Z – shift 25 (a->z)

37 Continued - Class 6