Chapter 2 Basic Encryption and Decryption (part B)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Lecture 23 Symmetric Encryption
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Lecture 23 Symmetric Encryption
Section 2.3: Substitution Ciphers
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Row Transposition Ciphers
History and Background Part 3: Polyalphabetic Ciphers
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Chapter 2 Basic Encryption and Decryption (part B)

csci5233 computer security & integrity Transpositions (Permutations) P.47 Transposition: an encryption in which the letters of the message are rearranged Also known as permutations Compare the goals: –Substitution  confusion –Transposition  diffusion

csci5233 computer security & integrity 3 Confusion vs Diffusion Confusion: making it difficult to determine how a message and key were transformed into ciphertext. Diffusion: spreading the information from the message or the key out widely across the ciphertext See p.59 for more discussions. Note: The definition of diffusion in the book seems to change depending on the context of discussion, leading to contradictory statements regarding whether ‘transposition’ methods have diffusion or not. See p.47 (1 st paragraph) and p.59 (last 2 nd paragraph).

csci5233 computer security & integrity 4 Columnar Transpositions A rearrangement of the plaintext characters into columns. The ciphertext is generated from the columns. Example: p.47

csci5233 computer security & integrity 5 Complexity of Columnar Transpositions Time: proportional to the length of the message, that is, O(n) or at the order of function n. Space: depends on the length of the message. Output cannot be produced until all characters of the message have been read. Initial delay varies, depending on the length of the message. C.f., constant initial delay in the previous (substitution) algorithms.

csci5233 computer security & integrity 6 Digrams, Trigrams, & Other Patterns Digrams: groups of two letters Trigrams: groups of three letters Table 2-8 (p.49): Frequencies of digrams Note: not counting digrams that consist of the last letter of one word and the first letter of the next word Exercise: What’s the frequency of digrams BE, RF, and WY?

csci5233 computer security & integrity 7 Cryptanalysis by Digram Analysis 1. To compute the letter frequencies oClue: The fact that all letters appear with their normal frequencies implies that a transposition has been performed. 2. To find where in the ciphertext a pair of adjacent columns lies (that is, to determine the width of a row in the original table used for encryption) oThe ‘moving window’ method: Fig. 2-9 (p.50)

csci5233 computer security & integrity 8 The ‘moving window’ method 1. Pick a window size, say n. 2. Compare every C i, 1  i  n,in the window to C i+n and determine if the two form a common digram by checking their frequency (table 2-8, p.49) 3. Do most of the digrams look reasonable? Compute their mean and std. deviation Example: Table 2-9, p.51

csci5233 computer security & integrity 9 Double transposition (P.51) Involves two columnar transpositions An example of product ciphers, in which one encryption is applied to the result of another C = E 2 (E 1 (P) ) Example: Table 2-10 and 2-11 Cryptanalysis P i  C column * ( (i-1) mod row ) + (i-1) div row + 1 Note: correction of the formula!

csci5233 computer security & integrity 10 Double transposition Example: p.52 1 st transposition: # of rows = 10, # of columns = 5 example 1: P 8  C 10*((8-1) mod 5) + (8-1) div = C 22 example 2: P 14  C 10*((14-1) mod 5) + (14-1) div = C 33 2 nd transposition: # of rows = 8, # of columns = 7 example 1: C 22  C’ 8*((22-1) mod 7) + (22-1) div = C’ 4 example 2: C 33  C’ 8*((33-1) mod 7) + (33-1) div = C’ 37 So, P 8  C’ 4 and P 14  C’ 37

csci5233 computer security & integrity 11 Analysis of double transposition ciphers 1. Locating pairs of ciphertext letters that probably appear together in the plaintext (chosen plaintext attack, probable plaintext attack)  p Inferring a mathematical relationship from those pairs of letters 3. Verifying the relationship on other ciphertext letters to see if they produce probable digrams

csci5233 computer security & integrity 12 Fractionated Morse A keyed monoalphabetic cipher Uses Morse code (Table 2-12, p.53) as its base Double encodings (P  Morse code  P’) 3 steps: 1.Convert P to Morse code, using separator(s) between letters and words. 2.Divide the Morse code messages into blocks of 3 symbols. 3.Each block of symbols is encoded as the letter corresponding to that 3-symbol pattern (see Table 2-13, p.55).

csci5233 computer security & integrity 13 Stream versus Block Ciphers Stream ciphers: The plaintext characters are encoded by the sender letter-by-letter as sent to the receiver. –Example: substitution ciphers Block ciphers: Blocks of plaintext are encoded into ciphertext before being sent. –Example: columnar transposition

csci5233 computer security & integrity 14 Stream Ciphers + Fast + Little storage space + Low error propagation, meaning that encoding errors affect just one character in the ciphertext - low diffusion, meaning that individual characters in the ciphertext can be analyzed using frequency distribution, digram analysis, IC and the Kasiski method - Susceptibility to malicious insertions and modifications

csci5233 computer security & integrity 15 Block Ciphers - Slow - Require more storage space - Error propagation + High diffusion + High immunity to insertions

csci5233 computer security & integrity 16 4 cryptanalysis cases & 5 approaches 1.Ciphertext only  Ciphertext-only attack 2.Full or partial plaintext  Known plaintext attack  Probable plaintext analysis 3.Ciphertext of any plaintext  Chosen plaintext attack 4.Algorithm + Ciphertext  Chosen ciphertext attack

csci5233 computer security & integrity 17 Summary Two basic methods of encryption: substitutions and transposition Common cryptanalytic tools: Frequency distribution, Digram/trigram study, IC, Repeated patterns, Probable letters Four cryptanalysis cases & 5 approaches: Next: Pf, Ch 3 (Cryptosystems)