Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.

Slides:



Advertisements
Similar presentations
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Announcements: 1. Term project groups and topics due tomorrow midnight Waiting for posts from most of you. Questions? This week: Primality testing, factoring.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Chapter 5 Cryptography Protecting principals communication in systems.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Announcements: Quizzes returned at end of class Quizzes returned at end of class This week: Mon-Thurs: Data Encryption Standard (DES) Mon-Thurs: Data Encryption.
Announcements: Pass in Assignment 1 now Pass in Assignment 1 now Meet my assistant Kevin Reed Meet my assistant Kevin Reed Assignment 2 (tentative) posted.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
An Introduction to Hill Ciphers Using Linear Algebra Brian Worthington University of North Texas MATH /10/2010.
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
CSCI 5857: Encoding and Encryption
symmetric key cryptography
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Computer System Security CSE 5339/7339
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Systems of Equations as Matrices and Hill Cipher.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Stream Ciphers Making the one-time pad practical.
13. BETTER SYMMETRIC CIPHER STREAM CIPHERS 1. SOME TRICKS FOR SUBSTITUTION CIPHER There are some tricks to make substitution cipher safer: Nulls: insert.
Introduction to Cryptography Techniques How secure is that banking network traffic?
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Announcements: Matlab tutorial linked to in syllabus Matlab tutorial linked to in syllabusQuestions?Today: Block ciphers, especially Hill Ciphers Modular.
Introduction to Modern Symmetric-key Ciphers
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
@Yuan Xue Quick Review.
Classical Polygraphic Ciphers
PART VII Security.
STREAM CIPHERS by Jennifer Seberry.
Block Ciphers (Crypto 2)
Presentation transcript:

Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time pads and LFSR DTTF/NB479: DszquphsbqizDay 7

Hill Ciphers Lester Hill, Not used much, but first time linear algebra used in crypto Use an n x n matrix M. Encrypt by breaking plaintext into blocks of length n (padding with x’s if needed) and multiplying each by M. Example: Encrypt “ Example: Encrypt “ hereissomeonetoencrypt” using M her eis som eon eto enc ryp txx ( 7, 4, 17) (4, 8, 18) … (19, 23, 23) (2, 5, 25) (0, 2, 22) … (0, 22, 15) cfz acw yga vns ave anc sdd awp “CFZACWYGAVNSAVEANCSDDAWP”

Hill Cipher Demo Encryption Easy to do in Matlab. Easy to do in Matlab. (Otherwise, you’ll need to find/write a matrix library for language X.) (Otherwise, you’ll need to find/write a matrix library for language X.)Decryption Uses matrix inverse. Uses matrix inverse. How do we determine if a matrix is invertible mod 26? How do we determine if a matrix is invertible mod 26? Does this cipher exhibit diffusion?

Next: one time pads Back to Vigenere: if the codeword were really long, say 25% as long as the entire plaintext, how many characters would contribute to each dot product? ____ What does this say about our ability to do a frequency analysis? What does this say about our ability to do a frequency analysis? Now consider the extreme case, the one- time pad…

One-time pads Represent the plaintext in binary, length n Works for text (from ASCII), images, music, etc Works for text (from ASCII), images, music, etc The key is a random vector of length n Ciphertext = plaintext XOR key Do message = , key = message = , key = Cipher = ??? Cipher = ??? ciphertext XOR key = ???

Unbreakable? Yes, for ciphertext only… Ciphertext:EOFMCKSSDKIVPSSAD Could be: thephoneisringingmeetmeinthegarage… I need the whole key to decrypt. What’s the downside to using a one-time pad? Variation: Maurer, Rabin, Ding et al’s satellite method If I’m willing to compromise some security…

Linear Feedback Shift Register (LFSR) Sequences Name comes from hardware implementation b 1 b 2 b 3 b 4 … b m-1 b m Feedback function Shift register Generated bit stream Need initial conditions (bits in register) and a function to generate more terms. Example: x 1 = 0, x 2 = 1, x 3 = 0, x 4 = 0, x 5 = 0; x n+5 = x n + x n+2 (mod 2) What does this remind you of in math? To encrypt plaintext of length n, generate an n- bit sequence and XOR with the plaintext.

Linear Feedback Shift Register (LFSR) Sequences A recurrence relation! Specify initial conditions and coefficients, for example: Specify initial conditions and coefficients, for example: x 1 = 0, x 2 = 1, x 3 = 0, x 4 = 0, x 5 = 0; x n+5 = x n + x n+2 (mod 2) Another way to write is x n+5 = 1x n + 0x n+1 + 1x n+2 +0x n+3 + 0x n+4 (mod 2) In general, Generate some more terms How long until it repeats? (the period of the sequence) 10 bits generates ____ bits Demo

Long periods LFSR can generate sequences with long periods Like Vigenere with long key: hard to decrypt! Like Vigenere with long key: hard to decrypt! Lots of “bang for the buck”! Lots of “bang for the buck”! But it depends on the key But it depends on the key Good example:x n+31 =x n + x n+3 (mod 2) How many bits do we need to represent this recurrence? 62 bits 62 bits How long is the period? Over 2 billion! Why? Over 2 billion! Why? There exist (2 31 – 1) 31-bit words There exist (2 31 – 1) 31-bit words Why “-1”? If it cycles through all of these, it’s maximal. Related to Mersenne primes See for a list of maximal- period generators Can you devise a bad example (one with period << 2 n -1)?

Linear Feedback Shift Register (LFSR) Sequences Downside: very vulnerable to known plaintext attack. Why? Discuss with a partner Discuss with a partner If time, my example If time, my example