Chapter 12 Cryptography Explained. Search Problems Specified by an algorithm C Two inputs ◦ I is the instance. ◦ S is the solution. ◦ Must complete in.

Slides:



Advertisements
Similar presentations
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Advertisements

Reducibility Class of problems A can be reduced to the class of problems B Take any instance of problem A Show how you can construct an instance of problem.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
CSE 326: Data Structures NP Completeness Ben Lerner Summer 2007.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
Homework page 102 questions 1, 4, and 10 page 106 questions 4 and 5 page 111 question 1 page 119 question 9.
Ref: Pfleeger96, Ch.31 NP-Complete Problems Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Network Security Chapter
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
NP-Complete Problems CSC 331: Algorithm Analysis NP-Complete Problems.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 8: Complexity Theory.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Prabhas Chongstitvatana1 NP-complete proofs The circuit satisfiability proof of NP- completeness relies on a direct proof that L  p CIRCUIT-SAT for every.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography (Traditional Ciphers)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Chapter 3 Encryption Algorithms & Systems. csci5233 computer security & integrity (Chap. 3) 2 Outline NP-completeness & Encryption Symmetric (secret key)
Techniques for Proving NP-Completeness Show that a special case of the problem you are interested in is NP- complete. For example: The problem of finding.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Erdal Kose CC30.10 These slides are based of Prof. N. Yanofsky Lecture notes.
Chapter 3 Encryption Algorithms & Systems (Part D)
Hard Problems Some problems are hard to solve.  No polynomial time algorithm is known.  E.g., NP-hard problems such as machine scheduling, bin packing,
Lecture 23 Symmetric Encryption
CSE 421 Algorithms Richard Anderson Lecture 27 NP-Completeness and course wrap up.
Cracking the DES Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Complexity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CSC 413/513: Intro to Algorithms
Prof. Jk LEE/security1 Secure Encryption Systems 암호화복호화 공통비밀키 암호시스템.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Chapter 3 Brute Force Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Hard Problems Some problems are hard to solve.  No polynomial time algorithm is known.  E.g., NP-hard problems such as machine scheduling, bin packing,
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Brute Force A straightforward approach, usually based directly on the problem’s statement and definitions of the concepts involved Examples: Computing.
The NP class. NP-completeness
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Richard Anderson Lectures NP-Completeness
Richard Anderson Lecture 26 NP-Completeness
Richard Anderson Lecture 26 NP-Completeness
Chapter 3 Brute Force Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
P and NP CISC4080, Computer Algorithms CIS, Fordham Univ.
Chapter 3 Brute Force Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
3. Brute Force Selection sort Brute-Force string matching
Prabhas Chongstitvatana
3. Brute Force Selection sort Brute-Force string matching
3. Brute Force Selection sort Brute-Force string matching
Presentation transcript:

Chapter 12 Cryptography Explained

Search Problems Specified by an algorithm C Two inputs ◦ I is the instance. ◦ S is the solution. ◦ Must complete in polynomial time I. S is a solution to I if and only if C(I,S) is True.

NP-Complete Problems A class of search problems ◦ Traveling salesman problem  Time limited. ◦ Rudrata: Knight’s Tour on a chess board.  Cover all 64 squares? ◦ Euler: Graph Theory  Cross a bridge only once. ◦ Knapsack  Add maximum items below a limit.

Traveling Salesman Problem

Knight’s Tour

Knapsack Problem

Graph Theory

Goals Complexity ◦ Difficult to solve. ◦ Number of possible solutions large. ◦ Brute force solution expected to be infeasible. Satisfiable ◦ Assign values to a formula so that it is true. ◦ (V1) && (v2 || v3) && (!v3 || !v1) Solvable ◦ Simple approach to solve problem.

Figure 12-1 Clique Subgraphs in a Graph. Clique: every vertex connected to every other vertex. v1, v2, v7, v8 form clique size = 4.

Figure 12-2 Simulating Nondeterminism.

Figure 12-3 Hierarchies of Complexity Classes. Problem space. Some solvable in polynomial time (P). Some are beyond Polynomial time (EXP). Class NP between P and EXP.

Diffusion, Confusion, Substitution, Permutation Diffusion ◦ Spread the effect of a change to plaintext throughout the cipher text. Confusion ◦ Relationship between plain and cipher text should be as random and not apparent. Substitution (Confusion) S-Boxes ◦ Replace one character with another. Permutation (transposition) P-Boxes ◦ Provide confusion by rearranging the characters in the text.

Figure 12-4 Substitutions and Permutations. Substitutions Permutations

Figure 12-5 Key Distribution in Pieces.

Figure 12-6 Distribution Center for Encrypted Information. Key Clearinghouse, centralize key distribution.

Figure 12-7 Cycles of Substitution and Permutation DES: strength from repeating substitution and permutations.

Figure 12-8 Product Ciphers. Two weak but complementary ciphers can be made more secure by being applied together, the product of the two ciphers.

Figure 12-9 A Cycle in the DES.

Figure Types of Permutations.

Figure Details of a Cycle.

Figure Pattern of Expansion Permutation.

Figure Structure of the AES.

Figure Knapsack for Encryption.

Figure Example of Solving a Simple Knapsack.

Figure Graph of Change of Merkle–Hellman Knapsack Function.

Figure Coinciding Discontinuities.

Elliptical Curve Cryptography

Offers considerably greater security for a given key size The smaller key size also makes possible much more compact implementations for a given level of security, which means faster cryptographic operations, running on smaller chips or more compact software. This means less heat production and less power consumption — all of which is of particular advantage in constrained devices, but of some advantage anywhere. There are extremely efficient, compact hardware implementations available for ECC exponentiation operations, offering potential reductions in implementation footprint even beyond those due to the smaller key length alone.

Quantum Cryptography

Instead of depending on the computational difficulty of cracking one-way functions, quantum encryption creates uncrackable codes that employ the laws of physics to guarantee security. Different quantum states, such as photon polarization, can be used to represent 1s and 0s in a manner that cannot be observed without the receiver's discovering it. For instance, if hackers observe a polarized photon, then 50 percent of the time they will scramble the result, making it impossible to hide the eavesdropping attempt from the receiver.

Figure Transmission of Photons.

Figure Results Interpreted Through Filters.

Figure Filters Used.

Figure Correct Filters.

Figure Correct Results.