National Security and Cryptography Jude Vanover and Justin Gross.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Code Breaking during the Second World War An Introduction By Gary J Becea.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Security & Encryption Thomas Fenske & Joseph Minter.
Enigma? Several Images from Wikipedia (an online encyclopedia)
Secure communication Informatics for economists II Jan Přichystal
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Inner Workings of the German Enigma. History of the Enigma The concept was invented by a German named Albert Scherbius in 1918 Scherbius tried to take.
Overview of Digital Stenography
A Glimpse of the History of Cryptography
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Enigma 1 Enigma Enigma 2 Enigma  Developed and patented (in 1918) by Arthur Scherbius  Many variations on basic design  Eventually adopted by Germany.
Chapter 2 – Classical Encryption Techniques
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Alan Turing and Code Breaking
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Linux Networking and Security Chapter 8 Making Data Secure.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
The Turing machine Olena Lastivka. Definition Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Cryptography, Authentication and Digital Signatures
Lec. 5 : History of Cryptologic Research II
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Enigma Plymstock School History Department. The Battle of the Atlantic The Battle of the Atlantic Since the evacuation of the British Army from the beaches.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Chapter 3 Encryption Algorithms & Systems (Part D)
The Storyboard stage. Mention what will be your animation medium: 2D or 3D Mention the software to be used for animation development: JAVA, Flash, Blender,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS 150 – Computing: From Ada to the Web Cryptography.
The Enigma Machine Eric Roberts CS 106A February 3, 2016.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Millions of electronic pulses move through your computer every second. Computers are capable of processing thousands of functions in the time it takes.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Secure communication Informatics for economists II Jan Přichystal
Cryptography – Test Review
BITS & BYTES.
Wiretapping and Encryption
History of Cryptography
Enigma Machine.
Visit for more Learning Resources
BITS & BYTES.
Enigma Cipher Machine By: Amber Churchwell.
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

National Security and Cryptography Jude Vanover and Justin Gross

Overview WWII and the use of machine ciphers and its following mathematical encryption techniques WWII and the use of machine ciphers and its following mathematical encryption techniques Development of NSA Development of NSA Current issues in National Security Current issues in National Security Terrorist cryptography Terrorist cryptography Concluding Remarks Concluding Remarks

WWII Cryptography From the Allied Point of View cryptosystems were divided into two stages From the Allied Point of View cryptosystems were divided into two stages I. European (aka. German) II. Pacific (aka. Japan)  Each Stage Provided different challenges to national security  The beginning of modern day cryptosystems and National Security techniques

Pacific Stage for WWII Crypt.. Japan used many systems including Orange, Red, and Purple Machines. Japan used many systems including Orange, Red, and Purple Machines. These machines were complicated and difficult to crack These machines were complicated and difficult to crack All were eventually cracked by allied forces All were eventually cracked by allied forces Pearl Harbor was a result of inability to decipher Purple code at the time Pearl Harbor was a result of inability to decipher Purple code at the time After Pearl Harbor and the decipher of Purple, Japan switched to JN25 After Pearl Harbor and the decipher of Purple, Japan switched to JN25 Eventually JN25 was broken which aid greatly in the victory at Midway Eventually JN25 was broken which aid greatly in the victory at Midway

European Stage for WWII Cryptography Nazi Germany and its machine cipher the Enigma Nazi Germany and its machine cipher the Enigma The entire German Army, Navy, and Airforce based its communication on the device The entire German Army, Navy, and Airforce based its communication on the device

Technical Details on the Enigma I A complex Machine Cipher A complex Machine Cipher Revised many times to make it more secure Revised many times to make it more secure Based on the linguistic technique of transliteration in which each letter entered corresponded to a different letter of the of the alphabet when encoded Based on the linguistic technique of transliteration in which each letter entered corresponded to a different letter of the of the alphabet when encoded Easily solved by letter frequency, however…… Easily solved by letter frequency, however……

Technical Details on the Enigma II Changed the correspondence between each letter by means of a series of rotating gears called rotors Changed the correspondence between each letter by means of a series of rotating gears called rotors The Germans made the machine more complicated by adding more rotors, 5 by the wars end. The Germans made the machine more complicated by adding more rotors, 5 by the wars end. Looked a great deal like a typewriter Looked a great deal like a typewriter Allowed for Encryption and Decryption on the same machine settings because the final rotor in the series was reciprocal or reflective Allowed for Encryption and Decryption on the same machine settings because the final rotor in the series was reciprocal or reflective  Thus if E is the Encryption function then E(x) = cipher text, then E(cipher) = x…or E(E(x)) = x 26 contacts per side of each rotor and each key entered stepped the rightmost rotor to the left one step. For that rotor out, the stepping was exactly like a car odometer. 26 contacts per side of each rotor and each key entered stepped the rightmost rotor to the left one step. For that rotor out, the stepping was exactly like a car odometer. Each Day began with a specified starting position to the rotors Each Day began with a specified starting position to the rotors

3 Rotor Enigma Example

Other details on Enigma Theoretically impossible to crack with 150,000,000,000,000 starting states that move as messages are encoded and decoded Theoretically impossible to crack with 150,000,000,000,000 starting states that move as messages are encoded and decoded Problems arose because the starting positions were transmitted twice at the beginning of each repetition. This narrowed starting positions down. Problems arose because the starting positions were transmitted twice at the beginning of each repetition. This narrowed starting positions down. Eventually Enigma machines were obtained from U-Boats and other sources, analyzed, and cracked using Bombe. Eventually Enigma machines were obtained from U-Boats and other sources, analyzed, and cracked using Bombe. Bombe was a machine that iterated through the possible starting positions of the Enigma in order to find the correct position to decode. Bombe was a machine that iterated through the possible starting positions of the Enigma in order to find the correct position to decode.

WWII Cryptography Knowing information means saving lives, keeping information may cost lives. This is the core principle of National Security Knowing information means saving lives, keeping information may cost lives. This is the core principle of National Security Core principle of crytography Core principle of crytography Development of N.S.A. Development of N.S.A.

National Security Agency Coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence Coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence Signals Intelligence (SIGINT)- believed to have directly contributed to shortening WWII by one year Signals Intelligence (SIGINT)- believed to have directly contributed to shortening WWII by one year

National Security Agency Interest in cryptanalytic research led to first large-scale computer and first solid state computer Interest in cryptanalytic research led to first large-scale computer and first solid state computer Pioneered efforts in flexible storage which led to development of tape cassette Pioneered efforts in flexible storage which led to development of tape cassette Largest employer of mathematicians in the U.S. and perhaps the world Largest employer of mathematicians in the U.S. and perhaps the world

Current issues in National Security Unbreakable encryption may not be good for everyone Unbreakable encryption may not be good for everyone  Criminal Opportunists  Compromising national security or protecting individual freedoms?

Current issues in National Security British Solution to information monitoring British Solution to information monitoring The Clipper Chip and Key Escrow The Clipper Chip and Key Escrow

The Clipper Chip This is an public encryption technique using chips in communication devices This is an public encryption technique using chips in communication devices Uses the SKIPJACK algorithm Uses the SKIPJACK algorithm Proposed in 1993 by the US Govt Proposed in 1993 by the US Govt Basically a wire tap in all communication devices - telephones, computers, et.. Basically a wire tap in all communication devices - telephones, computers, et.. It allows the Govt to decode information at anytime time it deems necessary because they have all the keys (key escrow) It allows the Govt to decode information at anytime time it deems necessary because they have all the keys (key escrow) Provides a basis for the Govt to monitor criminal activities especially terrorism Provides a basis for the Govt to monitor criminal activities especially terrorism

Key Escrow: The Master Key EES – Escrowed Encryption System is a cryptosystem developed by the NSA that is certified secure and is willing to share with the public EES – Escrowed Encryption System is a cryptosystem developed by the NSA that is certified secure and is willing to share with the public Using things such as Clipper chip it gives the Govt access to all encoded information to prevent misuse Using things such as Clipper chip it gives the Govt access to all encoded information to prevent misuse Basically a huge library of everyone’s public and private keys Basically a huge library of everyone’s public and private keys Know as Public Key Infrastructure (PKI) or Certification Authority (CA) Know as Public Key Infrastructure (PKI) or Certification Authority (CA) Very large Privacy Issues Very large Privacy Issues

Current issues in National Security Laws and regulations protecting U.S. citizens Laws and regulations protecting U.S. citizens Bending the Rules Bending the Rules A “K” example A “K” example

Terrorist Cryptography Steganography- Hiding information in pictures Steganography- Hiding information in pictures Using encryption downloaded from the net, developed by people trying to protect civil liberties Using encryption downloaded from the net, developed by people trying to protect civil liberties

Steganography Steganography is the art and science of hiding the fact that communication is taking place Steganography is the art and science of hiding the fact that communication is taking place Digital files like photographs or music files can be slightly and still look or sound the same Digital files like photographs or music files can be slightly and still look or sound the same

Steganography How it works: How it works:  A picture is created by a series of dots  Inside each dot is a string of letters and numbers that computers read to create the image  A coded message or another image can be hidden in those letters and numbers

Steganography How to detect a hidden image or text in a picture How to detect a hidden image or text in a picture  Modification of redundant bits replace with message change the statistical properties of the cover medium  Statistical analysis may reveal hidden content, check to see if image deviates from the norm

Tough to Break Encrypted files found on Ramzi Yousef’s computer took over one year to decrypt Encrypted files found on Ramzi Yousef’s computer took over one year to decrypt

Concluding Remarks Keeping information secure is vital both in the private sector and the government sector Keeping information secure is vital both in the private sector and the government sector

Concluding Remarks Mixed Feelings on Clipper Chip and Key Escrow Mixed Feelings on Clipper Chip and Key Escrow  Makes encryption expensive for criminals  Makes encryption cheap and safe for private sector  Integrating “Big Brother” ?