Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

CSE331: Introduction to Networks and Security Lecture 16 Fall 2002.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Scott CH Huang COM 5336 Cryptography Lecture 1 Scott CH Huang COM 5336 Cryptography Lecture 1 Introduction.
Classical Cryptography
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Cryptography What is cryptography? The study of message secrecy The art of writing or solving codes Heavy mathematics Information Theory Statistics Number.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Information Systems Security
Lec. 5 : History of Cryptologic Research II
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Terminology and classical Cryptology
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Substitution Ciphers.
Classical Techniques: Substitution
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Traditional Symmetric-Key Ciphers
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis

Cryptographic goals We want to achieve Confidentiality (keeping information secret) Integrity (preventing alterations) Authentication (preventing fraud) Non-repudiation (preventing denial of messages sent)

The Importance of Cryptograpy Cryptographic techniques are increasingly used to enhance security in Data storage and communication E-commerce Home banking Pay TV Mobile phones And a multitude of other applications

Course Objectives After this course you should be well oriented in basic cryptographic concepts and methods have a sound understanding of theory and implementation, as well as limitations and vulnerability. be familiar with a number of examples of the use of cryptographic tools in common software and hardware products. be aware of the engineering difficulties in building secure systems

Course Information Course code: CNS2-2 Lectures and problem sessions: Jens Damgaard Andersen Class hours (1. period): Wednesday and Friday Class hours (2. period): Friday Classroom: K (usually)

Course literature Textbook: Douglas R. Stinson: Cryptography – Theory and Practice, 3rd Edition. Chapham & Hall/CRC 2006 ISBN-10: ISBN-13: Additional useful resources, available on the net: Handbook of Applied cryptography, CRC Press 2002, 816 pages Selected papers: see course home page

Classical Cryptography: a gentle introduction Model of a Cryptosystem The Substitution cipher The Vigenère Cipher The Permutation Cipher Cryptanalysis Types of Attack Cryptanalysis of the Substitution Cipher Cryptanalysis of the Vigènere Cipher

Motivation from breaking classical ciphers Understanding and using redundancy and side information using statistics in the process of breaking ciphers Leading up to Shannon’s theory of perfect secrecy (next lecture) The notion of a one-time pad

Definition of a cryptosystem A cryptosystem consists of a finite set of possible plaintexts, ciphertexts, a keyspace (a set of possible keys) and for each key there is an encryption rule and a corresponding decryption rule such that is a plaintext is encrypted with a key it can be recovered by the same (or another) key by the decryption rule.

Block Cipher System The message is a string composed of plaintext symbols By encryption the string is converted into a string of ciphertext symbols The encrypton function is injective

The Shift Cipher The Shift Cipher uses modular arithmetic Each of the 26 English alphabetic characters is mapped into the integers modulo 26, i.e. A is mapped into 0, B into 1,...Z into 26 (see table on page 5). Encryption: A given integer is added to each value modulo 26 and the result is mapped back into characters. Exercise: Find key for example 1.

The Substitution Cipher The 26 English characters are mapped into some permutation of the 26 characters. The permutation is the key (see example on page 7) There are 26! possible permutations, i.e. 26! possible keys

Ciphers not considered here The Affine Cipher (page 8-12) The Hill Cipher (page 13-19) The Permutation Cipher (page 19-21) Stream Ciphers (page 21-25) These are outside the ”Core Curriculum”. A listing of the core curriculum will be prepared as the course proceeds.

Cryptanalysis Kerckhoffs’ principle: The adversary knows the cryptosystem being employed, so the entire security of the system resides on keeping the key secret.

Types of attacks Ciphertext only attack Known plaintext attack Chosen plaintext attack Chosen ciphertext attack

Attack models Ciphertext only attack: The opponent posseses a string of ciphertext y Known plaintext attack: The opponent posseses a string of plaintext x and the corresponding ciphertext y

Attack models Chosen plaintext attack: The opponent can choose a plaintext x and obtain the corresponding ciphertext y Chosen ciphertext attack: The opponent can choose a ciphertext y and obtain the corresponding plaintext x

Cryptanalysis using statistics Cryptanalysis can be done using statistical properties of the English language. Tabulate frequency of occurrence of single letters, digrams and trigrams. What is the most frequent letter in English plaintexts ? Most frequent digram, most frequent trigram ?

Cryptanalysis using statistics Cryptanalysis can be done using statistical properties of the English language. Tabulate frequency of occurrence of single letters, digrams and trigrams. See engstat.html on the homepage (when it is uploaded)

Useful English Language Statistics Order and Frequency of Single Letters E 12.31% L 4.03% B 1.62% T 9.59 D 3.65 G 1.61 A 8.05 C 3.20 V 0.93 O 7.94 U 3.10 K 0.52 N 7.19 P 2.29 Q 0.20 I 7.18 F 2.28 X 0.20 S 6.59 M 2.25 J 0.10 R 6.03 W 2.03 Z 0.09 H 5.14 Y 1.88

Letter Groups Percentages A E I O U 38.58% L N R S T 33.43% J K Q X Z 1.11% E T A O N 45.08% E T A O N I S R H 70.02%

Order and Frequency of Leading DIGRAMS TH 3.15% TO 1.11% SA 0.75% MA 0.56% HE 2.51 NT 1.10 HI 0.72 TA 0.56 AN 1.72 ED 1.07 LE 0.72 CE 0.55 IN 1.69 IS 1.06 SO 0.71 IC 0.55 ER 1.54 AR 1.01 AS 0.67 LL 0.55 RE 1.48 OU 0.96 NO 0.65 NA 0.54 ES 1.45 TE 0.94 NE 0.64 RO 0.54 ON 1.45 OF 0.94 EC 0.64 OT 0.53 EA 1.31 IT 0.88 IO 0.63 TT 0.53 TI 1.28 HA 0.84 RT 0.63 VE 0.53 AT 1.24 SE 0.84 CO 0.59 NS 0.51 ST 1.21 ET 0.80 BE 0.58 UR 0.49 EN 1.20 AL 0.77 DI 0.57 ME 0.48 ND 1.18 RI 0.77 LI 0.57 WH 0.48 OR 1.13 NG 0.75 RA 0.57 LY 0.47

Order of Leading TRIGRAMS THE AND THA ENT ION TIO FOR NDE HAS NCE EDT TIS OFT STH MEN