CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Lec. 5 : History of Cryptologic Research II
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Introduction to Basic Crypto Schemes
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
INCS 741: Cryptography Overview and Basic Concepts.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CIT 380: Securing Computer Systems
CSCI-235 Micro-Computer Applications
PART VII Security.
Basic of Modern Cryptography
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers

Announcements Join class mailing list: CS426Fall 2010/Lecture 22

CS426Fall 2010/Lecture 23 Security Goals Confidentiality (secrecy, privacy) –only those who are authorized to know can know Integrity –only modified by authorized parties and in authorized ways Availability –those authorized to access can get access

CS426Fall 2010/Lecture 24 Tools for Information Security Cryptography Access control Hardware/software architecture for separation Processes and tools for developing more secure software Monitoring and analysis Recovery and response

CS426Fall 2010/Lecture 25 Goals of Cryptography The most fundamental problem cryptography addresses: ensure security of communication over insecure medium What does secure communication mean? –confidentiality (privacy, secrecy) only the intended recipient can see the communication –integrity (authenticity) the communication is generated by the alleged sender What does insecure medium mean? –the adversary can eavesdrop –the adversary has full control over the communications

CS426Fall 2010/Lecture 26 Approaches to Secure Communication Steganography –“covered writing” –hides the existence of a message –depends on secrecy of method Cryptography –“hidden writing” –hide the meaning of a message –depends on secrecy of a short key, not method

Cryptography, cryptanalysis, and cryptology Cryptography, –Traditionally, designing algorithms/protocols –Nowadays, often synonym with cryptology Cryptanalysis –Breaking cryptography Cryptology: both cryptography & cryptanalysis –Becoming less common, CS426Fall 2010/Lecture 27

CS426Fall 2010/Lecture 28 History of Cryptography years An ongoing battle between codemakers and codebreakers Driven by communication & computation technology –paper and ink –cryptographic engine & telegram, radio –modern cryptography: computers & digital communication

CS426Fall 2010/Lecture 29 Basic Terminology Plaintext original message Ciphertext transformed message Key secret used in transformation Encryption Decryption Cipher algorithm for encryption/decryption

CS426Fall 2010/Lecture 210 Shift Cipher The Key Space: –[1.. 25] Encryption given a key K: –each letter in the plaintext P is replaced with the K’th letter following corresponding number (shift right) Decryption given K: –shift left History: K = 3, Caesar ’ s cipher

CS426Fall 2010/Lecture 211 Shift Cipher: Cryptanalysis Can an attacker find K? –YES: by a bruteorce attack through exhaustive key search, –key space is small (<= 26 possible keys). Once K is found, very easy to decrypt

CS426Fall 2010/Lecture 212 General Mono-alphabetic Substitution Cipher The key space: all permutations of  = {A, B, C, …, Z} Encryption given a key  : –each letter X in the plaintext P is replaced with  (X) Decryption given a key  : –each letter Y in the cipherext P is replaced with  -1 (Y) Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  = B A D C Z H W Y G O Q X S V T R N M L K J I P F E U BECAUSE  AZDBJSZ

CS426Fall 2010/Lecture 213 Strength of the General Substitution Cipher Exhaustive search is difficult –key space size is 26!  4×10 26 Dominates the art of secret writing throughout the first millennium A.D. Thought to be unbreakable by many back then

CS426Fall 2010/Lecture 214 Cryptanalysis of Substitution Ciphers: Frequency Analysis Basic ideas: –Each language has certain features: frequency of letters, or of groups of two or more letters. –Substitution ciphers preserve the language features. –Substitution ciphers are vulnerable to frequency analysis attacks.

CS426Fall 2010/Lecture 215 Frequency of Letters in English

CS426Fall 2010/Lecture 216 Security Principles Security by obscurity doesn’t work Should assume that the adversary knows the algorithm; the only secret the adversary is assumed to not know is the key

CS426Fall 2010/Lecture 217 Readings for This Lecture Required readings: –Cryptography on WikipediaCryptography on Wikipedia Optional Readings: –Security in Computing Chapter 2: Basic Encryption and Decryption Interesting reading –The Code Book by Simon SinghThe Code Book

CS426Fall 2010/Lecture 218 Coming Attractions … Cryptography: One-time Pad, Informational Theoretical Security, Stream Ciphers