Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Public Key Encryption Algorithm
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Announcements: Computer exam next class Computer exam next classQuestions? DTTF/NB479: DszquphsbqizDay 10.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
ICS 454: Principles of Cryptography
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-203 y8534 (It should now be obvious whether or.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 3 Encryption Algorithms & Systems (Part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
8.6. Knapsack Ciphers. The Concept At the core of the Knapsack cipher is the Knapsack problem: At the core of the Knapsack cipher is the Knapsack problem:
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
MAT 1000 Mathematics in Today's World Winter 2015.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
An Introduction to Cryptology
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Affine Cipher.
History and Background Part 4: Transposition Ciphers
Computer and Data Security 4th Class
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICS 454: Principles of Cryptography
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Symmetric Encryption or conventional / private-key / single-key
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Presentation transcript:

Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment 1 is posted, due next Tuesday in class. Assignment 1 is posted, due next Tuesday in class. Use the time to familiarize yourself with the Matlab/Maple/Mathematica tools. Use the time to familiarize yourself with the Matlab/Maple/Mathematica tools. You should have subscribed to Angel forums You should have subscribed to Angel forumsQuestions? Roll Call Today: shift ciphers DTTF/NB479: DszquphsbqizDay 2

Sherlock Holmes, The Adventure of the Dancing Men (1898) Who got it? In a letter: 2 weeks later: 2 mornings later: 3 days later: 4 days later:

Comments A simple substitution cipher Used knowledge of linguistics The letter E. The letter E. Used domain knowledge: Elsie Issue with ____________: Sherlock masqueraded as Elsie. Sherlock masqueraded as Elsie. Others are confidentiality, integrity, non-repudiation. Others are confidentiality, integrity, non-repudiation. There is a problem with original source: One symbol is used twice (for V and P). One symbol is used twice (for V and P). Perhaps needs error-correcting? Perhaps needs error-correcting? Read Section 2.5 in T&W for the solution

Non-secure channels AliceBob Eve EncryptDecrypt Trappe and Washington, p. 3 Encryption Key (+1) Decryption Key (-1) plaintextCIPHERTEXT DSZQUPHSBQIZ cryptographycryptography

Shift ciphers Attributed to Julius Caesar Letters represented as x  x + k (mod 26) Relatively weak cryptosystem. Consider 4 typical attacks to find the decryption key: Ciphertext only (the discussion forums) Ciphertext only (the discussion forums) Known plaintext Known plaintext Chosen plaintext Chosen plaintext Chosen ciphertext Chosen ciphertext

1. Ciphertext only Consider dszquphsbqiz dszquphsbqizetarvqitcrjafubswrjudskbgvctxskvetlchwduytlwfumdixevzumxgvnejyfwavnyhwofkzgxbwozixpglahycxpajyqhmbizdyqbkzrincjaezrclasjodkbfasdmbtkpelcgbtenculqfmdhcufodvmrgneidvgpewnshofjewhqfxotipgkfxirgypujqhlgyjshzqvkrimhzktiarwlsjnialujbsxmtkojbmvkctynulpkcnwlduzovmqldoxmevapwnrmepynfwbqxosnfqzogxcryptography

2. Known plaintext Say I know sample of plaintext and corresponding ciphertext. How long does the sample need to be to find the key?

3. Chosen plaintext Say I have access to the encryption machine and can choose a sample of plaintext to encode. How can I deduce the key? Just encode a. 4. Chosen ciphertext Say I can choose a sample of ciphertext to decode. Just decode A; that gives decryption key; the encryption key is the negative.

Affine ciphers Somewhat stronger since scale, then shift: x   x +  (mod 26) Say y = 5x + 3; x = ‘hellothere’; Then y = ‘mxggv…’

Affine ciphers: x   x + b (mod 26) Consider the 4 attacks: 1. How many possibilities must we consider in brute force attack?

Restrictions on  Consider y= 2x, y = 4x, or y = 13x The problem is that gcd( , 26) ~= 1. The function has no inverse.

Finding the decryption key What’s the inverse of y = 5x + 3? Remember this is “Integer mod 26 World”.

Affine ciphers: x  ax + b (mod 26) Consider the 4 attacks: 1. Ciphertext only: How long is brute force? How long is brute force? 2. Known plaintext How many characters do we need? How many characters do we need? 3. Chosen plaintext Wow, this is easy. Wow, this is easy. 4. Chosen ciphertext Could be even easier! Could be even easier!

Assignment 1 Enjoy using the Maple/Matlab tools! Have fun reading the posts if you get stuck See you Monday!