Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

CAP Cryptographic Analysis Program
CAP Cryptographic Analysis Program
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
 Introduction › What is Cryptology › Confusion and Diffusion › History  Methods › Single Key › Public Key  Cryptanalysis Overview  Ethics.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Announcements: Subscribe to Angel forums Subscribe to Angel forumsQuestions? Roll Call Today: affine ciphers DTTF/NB479: DszquphsbqizDay 2.
Announcements: Please use pencil on quizzes if possible Please use pencil on quizzes if possible Knuth quotes, part 1 Knuth quotes, part 1Questions?Today:
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
FEAL FEAL 1.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptanalysis of the Playfair Cipher Using an Evolutionary Algorithm By: Benjamin Rhew.
Chapter 2 Basic Encryption and Decryption (part B)
Announcements: Assignment 1 due tomorrow in class. Assignment 1 due tomorrow in class.Questions? Roll Call Today: Vigenere ciphers Pronunciation? DTTF/NB479:
Classical Encryption Techniques
Section 2.4 Transposition Ciphers Definition: A Transposition Cipher is a cipher in which the plaintext message is rearranged by some means agreed upon.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Section 3.6: An Introduction to Cryptography
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Introduction to cryptography by konrad. Introduction to cryptography Cryptography is the process of encrypting/decrypting data streams using some E(M)/D(M)
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Traditional Symmetric-Key Ciphers
Announcements: Matlab tutorial linked to in syllabus Matlab tutorial linked to in syllabusQuestions?Today: Block ciphers, especially Hill Ciphers Modular.
Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Instructor: Dania Alomar
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Group 04: Yiyang Zhongyang Tan Xiao
Part 2 By Dr. Shadi Masadeh
Classical Polygraphic Ciphers
Cryptography and Network Security
CS4780 Cryptography and Information Security
Substitution Ciphers.
Outline Some Basic Terminology Symmetric Encryption
Information Security IT423
Traditional Symmetric-Key Ciphers
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Announcements: Homework 1 coming Monday… Homework 1 coming Monday… Practical quiz during week 4 on putting your code to work Practical quiz during week 4 on putting your code to workQuestions?Today: Wrap up LFSR ciphers Wrap up LFSR ciphers Substitution, Playfair, and ADFGX ciphers Substitution, Playfair, and ADFGX ciphers DTTF/NB479: DszquphsbqizDay 8

LFSR Demo Determine key length by computing determinants Use the key length to solve for the recurrence. Verify your solution by using the solution to generate the whole key

Substitution ciphers Each letter in the alphabet is replaced by another one. Which ciphers have we seen are substitution ciphers? Which ciphers have we seen are substitution ciphers? Which aren’t and why? Which aren’t and why? Breaking ciphertext only uses linguistic structure. Frequencies of: Single letters Single letters Digrams (2-letter combinations) Digrams (2-letter combinations) Trigrams Trigrams Where do T&W get their rules like “80% of letters preceding n are vowels”? (p. 26) Where do T&W get their rules like “80% of letters preceding n are vowels”? (p. 26) See Lots of trial and error when done by hand. Could automate with a dictionary.

Playfair ciphers Matrix-based block cipher used in WWI In a 5x5 matrix, write the letters of the word “playfair” (for example) without dups, and fill in with other letters of the alphabet, except I,J used interchangeably.

Playfair encryption 1.Break plaintext into letter pairs If a pair would contain double letters, split with x Pad end with x hellothere becomes… he lx lo th er ex 2.For each pair, If they are in the same row, replace each with the letter to its right (mod 5) he  KG If they are in the same column, replace each with the letter below it (mod 5) lo  RV Otherwise, replace each with letter we’d get if we swapped their column indices lx  YV He lx lo th er ex KG YV RV QM GI KU To decrypt, just reverse!

Weaknesses P is unknown, but structure of its bottom is predictable Can break using digram frequencies Example: If a digram and its reverse both appear often, it’s probably ER and RE. Each plaintext letter maps to how many possible ciphertext letters? He lx lo th er ex KG YV RV QM GI KU

Playfair ciphers Used in Dorothy L. Sayers’ 1932 mystery novel Have His Carcase Marketing beats technology? Invented by Charles Wheatstone Invented by Charles Wheatstone Lyon Playfair, a Scottish Baron, promoted it Lyon Playfair, a Scottish Baron, promoted it Who got the glory? Who got the glory?

ADFGX ciphers Why ADFGX? Morse code for these are very different Combined cryptography with error-correction Matrix 1: 25 letters (i and j merged again) randomly placed Each plaintext letter replaced by its row and column labels hello there  XA FA AA AA FF DG XA FA DF FA ADFGX Alkpbq Dmvrtz Fefodg Gxciyn Xhuwas

ADFGX ciphers (2) XA FA AA AA FF DG XA FA DF FA Matrix 2: pick a random keyword and write the previous result under it in scanline order. Shuffle the columns into alphabetical order Then read down the columns CRYPTU XAFAAA AAFFDG XAFADF FA

ADFGX ciphers (3) XA FA AA AA DG FF XA FA DF FA Matrix 2: pick a random keyword and write the previous result under it in scanline order. Shuffle the columns into alphabetical order Then read down the columns to get ciphertext: XAXFAFAAAAAADDAGFFFF CPRTUY XAAAAF AFADGF XAADFF FA

ADFGX Decryption easy… …if you know the original matrix and the keyword. Example? Example? Read about decryption ideas in text Variation: ADFGVX cipher allows 26 letters + 10 digits