History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CSCI 5857: Encoding and Encryption
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Attacks on Public Key Encryption Algorithms
Chapter 2 Basic Encryption and Decryption
History and Background Part 4: Transposition Ciphers
Computer and Data Security 4th Class
History and Background Part 3: Polyalphabetic Ciphers
Lecture 3: Symmetric Key Encryption
PART VII Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption

Outline Simple encryption with the Caesar cipher Exhausitive search and computational security Monoalphabetic substitution Frequency analysis and cryptanalysis attacks Known and chosen plaintext attacks

Why is History Important? Most modern encryption algorithms based on concepts hundreds/thousands of years old –Monoalphabetic substitution –Polyalphabetic substitution –Transposition Most attacks on encryption also very old –Exhaustive search –Cryptographic analysis –Known/chosen plaintext

4 Encryption Mathematical Notation: p – plaintext message (readable) c – ciphertext (not readable!) k – key (only known by authorized persons) E – encryption functionc = E(p, k) D – decryption functionp = D(c, k)

Substitution Algorithms Mapping of plaintext to ciphertext Can be single character mapping (historical) A  G Can map entire blocks of plaintext (modern block ciphers) 

Substitution Algorithms Mapping must be unique for decryption to work! Encryption: A  G B  G Decryption: G  A or B ? Side Point

Substitution Algorithms Mapping often involves translating characters to numeric values Encryption/decryption functions in terms of mathematical functions Side Point

Caesar Cipher Key k: number between 1 and 25 Example: k = 3, p = RUNAWAY E( RUNAWAY )  UXQDZDB D( UXQDZDB )  RUNAWAY

Exhaustive Key Search Testing all possible keys Algorithm: Given ciphertext c For all keys k i –Compute p i = D(c, k i ) –If p i is recognizable plaintext, then k i is plausible Time proportional to number of possible keys k i

Defining “Secure” Encryption Computationally Secure Cost of breaking cipher > value of encrypted information Time required to break cipher > useful lifetime of encrypted information Cipher is “practically” unbreakable Generally only assurance we have

Defining “Secure” Encryption Problem: impossible to permanently quantify! Computers get faster every day Moore’s law: speed doubles every 1.5 years Example: DES cipher with 56 bit key –Computationally secure (1142 years) at 1 test/microsecond –Not secure (10 hours) at 100,000 tests/microsecond

Caesar Cipher and Exhaustive Search Only 26 possible keys to test! Ciphertext: UXQDZDB Key:Resulting Plaintext: 1 TWPCYCA 2 SVOBXBZ 3 RUNAWAY  recognizable plaintext Clearly not computationally secure!

Monoalphabetic Substitution Each plaintext character has corresponding ciphertext character No pattern (unlike Caesar cipher) Example: “ runaway ”  “ HJGNPNS ”

Monoalphabetic Substitution Key = substitution table itself Number of possible keys = 26!  400,000,000,000,000,000,000,000,000 Computationally secure to exhaustive search (at least without a computer)

Cryptanalysis Attacks Based on knowledge –Properties of the encryption algorithm –Properties of the likely plaintext Often combined with exhaustive search –Knowledge eliminates most possible keys –Search now feasible for few remaining keys All possible keys Remaining keys Eliminated by cryptanalysis Search feasible

Frequency-based Analysis Some letters much more common than others

Frequency-based Analysis Example ciphertext: “ PCRZFNICRAYJHVRYICJQNZRSRZIV ” Letter frequencies: A1 B0 C3 D0 E0 F1 G0 H1 I3 J2 K0 L0 M0 N2 O0 P1 Q1 R5 S1 T0 U0 V2 W0 X0 Y2 Z3 Hypothesis: “e”  “R”

Frequency-based Analysis Some combinations of letters much more common than others Example: “e” often followed by “n” Example ciphertext (after “e” substituted for “R”): “ PCeZFNICeAYJHVeYICJQNZeSeZIV ” “Z” second most common letter Follows “e” twice Hypothesis: “n”  “Z” “ PCenFNICeAYJHVeYICJQNneSenIV ”

Frequency-based Analysis Knowing part of key in monoalphabetic substitution makes it easier to guess the rest of the key Very bad property of an encryption algorithm! Side Point “I can only see part of the key, but it is easy to guess the rest!”

Frequency-based Analysis Success of frequency-based analysis increases with more text –Single long ciphertext –Multiple ciphertexts encoded with same key General property of cryptanalysis Should change key as often as possible! Side Point ciphertexts

Known Plaintext Attack Adversary has access to a number of: –plaintext messages –corresponding ciphertext messages Searches for relationship between plaintext and ciphertext that might reveal key plaintexts ciphertexts

Known Plaintext Example Darth get gets data entry job at organization Observes how encrypted database changes as new records entered E pc

Known Plaintext Attack Inevitable that adversary will acquire known plaintexts Security defined in terms of number of known plaintexts needed to guess key Single known plaintext sufficient to break simple substitution algorithm!

Chosen Plaintext Attack Adversary has hypothesis about key k hypothesis Adversary chooses plaintext p to test hypothesis If resulting ciphertext c matches what would be result of encryption with k hypothesis, then k hypothesis is correct E p hypothetical key E compare actual (unknown) key

Chosen Plaintext Example World War II Hypothesis: Japanese code for “Midway Island” = “ AF ” Test: Plaintext message transmitted that “Midway Island running short of water” Result: Increased message traffic containing “ AF ” -- Hypothesis confirmed!

Defining Security Quality of encryption system defined by attacks it is vulnerable to –Types of attacks: exhaustive, cryptographic, etc. –Knowledge attacker has: known plaintext, chosen plaintext, etc. Key idea: Must always think like an attacker! –“What could I do to break the system?”