CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.

Slides:



Advertisements
Similar presentations
Section 3.8: More Modular Arithmetic and Public-Key Cryptography
Advertisements

BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography Bryan Pearsaul. Outline What is Cryptology? Symmetric Ciphers Asymmetric Ciphers Diffie-Hellman RSA (Rivest/Shamir/Adleman) Moral.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 12 Cryptography (slides edited by Erin Chambers)
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
RSA Ramki Thurimella.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Encryption Coursepak little bit in chap 10 of reed.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
The Secrets of Keeping Secrets Gary J Porter Senior Network Analyst MindWorks, Inc. of Kentucky
Midterm Review Cryptography & Network Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Darci Miyashiro Math 480 April 29, 2013
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Multimedia Data Security and Cryptographic Algorithms Dr Sandra I. Woolley Electronic, Electrical.
Lecture 2: Introduction to Cryptography
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
By Hani AlQaffas.  Cryptography is a technique used to hide the meaning of a message and is derived from the Greek word kryptos (hidden).  This is different.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
James C. Bradas, Ph.D. Engineering & Analysis Operation 18 June 2009 Public Key Encryption.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Diffie-Hellman Key Exchange Color Mixing Example Rick Stroud 21 September 2015 CSCE 522.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography Gerard Klonarides. What is cryptography? Symmetric Encryption Symmetric Encryption Asymmetric Encryption Asymmetric Encryption Other cryptography.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Digital Signatures.
Privacy & Security.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Public-key Cryptography
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Some basic terminology
Modular Arithmetic and RSA Encryption
PART VII Security.
Appendix 5: Cryptography p
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
NET 311 Information Security
Cryptography a Presentation Prepared by Vytautas Kondratas.
Diffie-Hellman Key Exchange
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

CRYPTOGRAPHY Modern techniques

Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster at enciphering and deciphering Computers scramble numbers instead of letters: each letter is represented by a 7 digit binary number, e.g. a= , != etc. encryption then proceeds by substitution and transposition.

Bit encryption example 1 Substitution and transposition are still the ingredients for encipherment. HELLO = The simplest transposition cipher involves reversing every 2 digits: Note that the transposition occurs within letters!

Bit encryption example 2 Substitution and transposition are still the ingredients for encipherment. HELLO = A simple substitution cipher uses the word DAVID and adds the digits of DAVID to the digits of HELLO: HELLO DAVID enciphered

Computer encryption In the 1960s, computers became more powerful and more available. Many businesses had them and had a need to send encrypted messages. The National Bureau of Standards had to find a standard encryption One candidate was Lucifer. Developed by Horst Feistel. The NSA was not happy about his research in ciphers. They put pressure on his workplaces to make him stop. In the early 1970s, working at IBM, he managed to work out Lucifer.

Lucifer A message is fed in and converted to binary The string of digits is split into blocks of 64 digits, and encryption is performed separately on each block Each block is split into 2 32-digit blocks labeled left0 and right0

Lucifer The digits in right0 are put through a function which changes the digits by a complex substitution. The details of this substitution can vary. This substitution depends on the key, which is a number. Once the number is known by the sender and receiver, Lucifer can encipher and decipher

Lucifer The mangled right0 is added to left0 to create a new half-block called right1 The original right0 is relabeled left1 Now the process begins again starting with left1 and right1 and ending up with left2 and right2 After 16 rounds, the “kneaded” message is sent.

Lucifer Lucifer was very strong, it was a prime candidate for a standard encryption. The NSA didn’t like this. Rumor is that they wanted to weaken an aspect of Lucifer: the number of possible keys. The NSA wanted to limit the number of keys to 100,000,000,000,000,000 (known as 56 bits, because that’s how it appears in binary).

Lucifer The NSA felt that a 56 bit key would be large enough to be safe for the users, while still being small enough that the NSA’s powerful computers could crack it. The 56 bit version of Lucifer was adopted in 1976 and called Data Encryption Standard (DES)

So, how do you distribute the key?!

Whitfield Diffie & Martin Hellman The beginnings of the internet: The ARPAnet (1969) prompted Diffie to foresee the tremendous difficulties involved in key distribution. In 1974 he heard about Martin Hellman, and went to meet him. Key distribution is a catch-22 problem: how do you securely exchange the information to securely exchange the information?

Diffie & Hellman Classic problem: Alice and Bob wish to communicate securely, but Eve wants to listen in. If Alice and Bob can meet occasionally, they can exchange keys in person. But this is not convenient and may become impossible. Let’s say Alice wants to send something to Bob, but is afraid the postoffice will open it on the way. Alice can send it to Bob in a locked box, but then Bob can’t open it either.

Diffie & Hellman But if Alice puts it in a box and secures it with a lock and sends it to Bob And Bob adds his lock and sends it back (with 2 locks now) to Alice And Alice removes her lock and sends it back to Bob, still with Bob’s lock on Now Bob can open the box – But Eve can’t!

Diffie & Hellman This conceptually solves the problem of key distribution! The problem is that encryption is typically a “last on, first off” process (e.g. if they put a locked box inside a locked box this process would not work) If the order is incorrect, this won’t work. How can you make it work?!

Diffie & Hellman Diffie and Hellman looked at mathematical functions for which the order does not matter, e.g.f(g(x))=g(f(x)) This is simple, most straightforward functions will do this. But most straightforward functions can be easily undone (2 way functions), and we want a function that is hard to undo (1 way function). Such a function, for example the cracking of an egg... One way functions are sometimes called humpty- dumpty functions.

Diffie & Hellman Modular arithmetic is rich in 1-way functions: Pick a number x=2 Raise 3 to the power x = 9 Now calculate 9 = 1 (mod 2) Now what if you don’t know x, but you know that 3 x = 1 (mod 7) you can never tell if you are going in the right direction with successive guesses! How can you solve this? Make a table of all the possible values, and see what happens. This is very reasonable for this function...

Diffie Hellman Merkle But what if the problem you are trying to solve is 453 x (mod 21997)? This is a one-way function. It takes seconds to generate but days to solve! In terms of a key, this is how it works:

Alice and Bob agree that they will use the function 7 x (mod 11) Alice chooses a number A (e.g. 3) and keeps it secret Alice puts A into the one way function and gets 343 (mod 11)= 2 Alice calls this a=2 and sends it to Bob Alice takes Bob’s answer and takes b A (mod 11) = 64 (mod 11) = 9 Bob chooses a number B (e.g. 6) and keeps it secret Bob puts B into the one-way function and gets (mod 11) = 4 Bob calls this b=4 and sends to Alice Bob takes Alice’s answer a=2 and takes a B (mod 11)= 64 (mod 11) = 9 Bob and Alice have ended up with the same key. But Eve does not have the needed information to deduce it!

Alice and Bob agree that they will use the function 7 x (mod 11) Alice chooses a number A (e.g. 3) and keeps it secret Alice puts A into the one way function and gets 343 (mod 11)= 2 Alice calls this a=2 and sends it to Bob Alice takes Bob’s answer and takes b A (mod 11) = 64 (mod 11) = 9 Bob chooses a number B (e.g. 6) and keeps it secret Bob puts B into the one-way function and gets (mod 11) = 4 Bob calls this b=4 and sends to Alice Bob takes Alice’s answer a=2 and takes a B (mod 11)= 64 (mod 11) = 9 Bob and Alice have ended up with the same key. But Eve does not have the needed information to deduce it!

A KEY CAN BE SECURELY SHARED WITHOUT MEETING. BUT, THIS PROCESS IS NOT CONVENIENT, EVERYONE HAS TO BE AVAILABLE AT THE SAME TIME.

Diffie had another idea: what about an asymmetric cipher? In an asymmetric cipher, the encryption key and the decryption key are not the same. So Alice has a public key, which everyone uses to encrypt messages to her, but she also has a private key, which is necessary for decrypting the message.

The concept is simple: The process of locking the lock is not the same process as unlocking it!

This idea completely avoids the key distribution problem! You don’t need the private key to encode, only to decode, so the private key is never shared. But Diffie could not come up with an enciphering function that worked this way. The concept was his, but someone needed to find an asymmetric cipher function

RSA Ron Rivest, Adi Shamir, and Leonard Adleman started looking into this in 1977 They came up with an asymmetric cipher function.

RSA Alice picks 2 primes p and q and keeps them secret Alice finds N=pq and picks a number e (which should be relatively prime to (p-1)(q-1)) Alice publishes N and e. N should be unique to Alice, but many people may use e The message is converted into a binary string or some other number M, which is encrypted by the formula C= M e (mod N) Alice calculates her private key using the formulas e d = 1 (mod (p-1)(q-1)) To decrypt the message, Alice uses the formula M=C d (mod N)

RSA example Alice picks p=17 and q=11 and keeps them secret Alice finds N=pq= 187 and picks a e =7 & publishes Bob’s message X is converted into a binary string M= = 88 in decimal M=88 is encrypted C= 88 7 (mod 187) =11 Alice calculates her private key using the formulas e d = 1 (mod (p-1)(q-1))or 7d = 1 mod(160) so that d=23 (there’s an algorithm that helps) To decrypt the message M=C d (mod N) = (mod 187) = 88

RSA The catch here is that knowing N it is very difficult to compute p and q, but knowing p and q it is easy to calculate N Multiplication is easy, factoring is hard.

The secret history of public key cryptography James Ellis, a British cryptographer working for the government, together with Clifford Cocks, did this earlier. But it was top secret. This became public in 1997.

Pretty Good Privacy htech/philspgp.htm dex4a.html

Philip R. Zimmermann is the creator of Pretty Good Privacy, an encryption software package. Originally designed as a human rights tool, PGP was published for free on the Internet in This made Zimmermann the target of a three-year criminal investigation, because the government held that US export restrictions for cryptographic software were violated when PGP spread worldwide. Despite the lack of funding, the lack of any paid staff, the lack of a company to stand behind it, and despite government persecution, PGP nonetheless became the most widely used encryption software in the world. After the government dropped its case in early 1996, Zimmermann founded PGP Inc. That company was acquired by Network Associates Inc (NAI) in December 1997, where he stayed on for three years as Senior Fellow. In August 2002 PGP was acquired from NAI by a new company called PGP Corporation, where Zimmermann now serves as special advisor and consultant. Zimmermann currently is consulting for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School's Center for Internet and Society.dropped its casePGP CorporationconsultingStanford Law School's Center for Internet and Society