Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.

Slides:



Advertisements
Similar presentations
Computer Science 101 Data Encryption And Computer Networks.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Cryptography The science of writing in secret code.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Attacks on Digital Signature Algorithm: RSA
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
Public Encryption: RSA
ICS 454: Principles of Cryptography
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Cryptography Introduction, continued. Sufficient key space principle If an encryption scheme has a key space that is too small, then it will be vulnerable.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
CS110: Computers and the Internet Encryption and Certificates.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Darci Miyashiro Math 480 April 29, 2013
CSC 386 – Computer Security Scott Heggen. Agenda Exploring that locked box thing from Friday?
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
East High School Math Week Jeff Kinne UW Computer Science.
CSC 386 – Computer Security Scott Heggen. Agenda Emmanuel Tachu will present his work from an independent study on Networking Cryptography Primer.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Cryptograpy By Roya Furmuly W C I H D F O P S L 7.
Traditional Symmetric-Key Ciphers
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
MAT 1000 Mathematics in Today's World Winter 2015.
Encryption CS110: Computer Science and the Internet.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
INCS 741: Cryptography Overview and Basic Concepts.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography.
CMSC 414 Computer (and Network) Security Lecture 3 Jonathan Katz.
Introduction CS 303 Algorithmic Number Theory and Cryptography
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
NET 311D Information Security
Cryptography and Network Security
Fun with Cryptography The Science of Secrecy.
Introduction to Cryptography I
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008

The Basic Secure Communication Scenario Bob wants to send Alice a message. Eve is evil and eavesdrops. Her goals:  Read the message  Determine the keys  Corrupt the message to Bob gets something different than what Alice sent Want to have dinner on Saturday night? AliceBob Eve What can you do?

2008 The Basic Secure Communication Scenario Want to have dinner on Saturday night? AliceBob ZDQW WR KDYH GLQQHU RQ VDWXUGDB QLJKW? Eve plaintext ciphertext Want to have dinner on Saturday night? Encrypt Decrypt

2008 Caesar Shift Cipher - Encrypt AliceBob Eve plaintext ciphertext Encrypt Decrypt VDWXUGDB Saturday D E F G H I J K L M N O P Q R S T U V W X Y Z A B C plaintext ciphertext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Shift key = 3

2008 Caesar Shift Cipher - Decrypt AliceBob Eve plaintext ciphertext Encrypt Decrypt VDWXUGDB Saturday How can Alice get the original message? D E F G H I J K L M N O P Q R S T U V W X Y Z A B C plaintext ciphertext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Shift key = 3

2008 Caesar Shift Cipher - Decrypt AliceBob Eve plaintext ciphertext Encrypt Decrypt VDWXUGDB Saturday How can Alice get the original message? D E F G H I J K L M N O P Q R S T U V W X Y Z A B C plaintext ciphertext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Shift key = 3 Shift back letters by 3

2008 Caesar Shift Cipher - Attack AliceBob Eve plaintext ciphertext Encrypt Decrypt VDWXUGDB Saturday What Eve can do? A B C D E F G H I J K L M N O P Q R S T U V W X Y Z plaintext ciphertext ? ? ? ? ? ? ? ? ? ? ? ? ?

2008 Caesar Shift Cipher - Attack AliceBob Eve plaintext ciphertext Encrypt Decrypt A B C D E F G H I J K L M N O P Q R S T U V W X Y Z plaintext ciphertext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z VDWXUGDB Saturday What Eve can do? B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C D E F G H I J K L M N O P Q R S T U V W X Y Z A B D E F G H I J K L M N O P Q R S T U V W X Y Z A B C vdwxugdb ucvwtfca saturday tbuvsebz

2008 What we plan to do today amber/caesar.html amber/caesar.html Let’s open the file “Readme” again and find out what it is!