A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Computer Science 101 Data Encryption And Computer Networks.
Cryptography and Network Security Chapter 3
Public Key Encryption Algorithm
Announcement Homework 1 out, due 1/18 11:59pm If you purchased the textbooks, but it hasn’t arrived, please see TA for copies of the questions, Project.
Review Overview of Cryptography Classical Symmetric Cipher
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Simplified DES CS-480b Network Security Dick Steflik.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Cryptography & Number Theory
ICS 454: Principles of Cryptography
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Dr. Khalid A. Kaabneh Amman Arab University
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Chapter 3 Encryption Algorithms & Systems (Part D)
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Data Encryption Standard
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
SYMMETRIC KEY ALGORITHMS
PART VII Security.
ICS 454: Principles of Cryptography
SYMMETRIC KEY ALGORITHMS
Presentation transcript:

A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009

Outline Overview and Objectives Graphic User Interface Transmission of Password Secret Key Cryptography Public Key Cryptography Conclusion

Overview and Objectives Meet the ever-increasing demand for well- trained information security professionals Help students to understand and use cryptography algorithms

GUI The GUI should be user friendly It includes Help, Encryption, Demonstration In the First Screen of GUIs a user can select Transmission of Password Secret key cryptography Public key cryptography

Transmission of Password The Transmission of Password demonstrates the concepts of classical encryption. It includes: Change case algorithm Substitution cipher

Transmission of Password Change case algorithm Change case algorithm changes an input capital letter into an output low case and an input low case into an output capital letter. Example: Input Yu Output yU The student keys in encrypted user name and password. If the input is not correct the student can try again.

Transmission of Password Substitution Cipher A substitution cipher substitutes characters in the input plaintext according to the rules to produce the ciphertext. Transmission password and user ID is one of applications. The convert table provides substitution rules Character: a b c d e f g h i j k l Substitution code: Example: Input jab Output: 1012

Secret Key Cryptography 1. Introduce secret key cryptography 2. Explain functions of the key 3. Explain how the secret key cryptography works

Secret Key Cryptography DES uses Data Encryption Algorithm (DEA), a secret key block-cipher. It uses a 56-bit key operating on 64-bit blocks. The 56-bit key is divided into eight 7-bit blocks and an 8th odd parity bit is added to each block (i.e., a "0" or "1" is added to the block so that there are an odd number of 1 bits in each 8-bit block). By using the 8 parity bits for rudimentary error detection, a DES key is actually 64 bits in length.

Secret Key Cryptography-SDES SDES uses an 8-bit key operating on an 8- bit block of plaintext. It invokes 2 rounds of permutations, swaps, and substitutes.

Secret Key Cryptography-SDES Generating SDES Keys

Secret Key Cryptography-SDES The initial permutation function The 10-bit key input will be transformed into two 8-bit sub keys that are K1 and K2. The permutation function P10 yields a 10-bit output from a 10- bit input key by permuting the bits of the input block. P10 = {3, 5, 2, 7, 4, 10, 1, 9, 8, 6} The distinct selection function P8 P8 = {6, 3, 7, 4, 8, 5, 10, 9} An example of generating keys that are K1 and K2 Step 1 10-bit key input: Step 2 Execute the permutation using P10: Output P10: Step 3 Execute left most shift 1 bit (LS-1) Divide Output P10 into left 5 bits ( ) and right 5 bits ( ) Execute left most shift 1 bit separately Output left LS-1: Output right LS-1: LS-1 output:

Secret Key Cryptography-SDES Step 4 Generate K1 Use the distinct selection function P8 to select bits from LS-1 output K1 = Step 5 Execute left most shift 2 bits Execute left most shift 2-bits for Output left LS-1: Execute left most shift 2-bits for Output right LS-1: LS-2 output: Step 6 Generate K2 Use the distinct selection function P8 to select bits from LS-2 output K2 =

Secret Key Cryptography-SDES SDES encryption

Secret Key Cryptography-SDES The First Round Step 1.1. Input an 8-bit block of plaintext: Step 1.2. Execute an initial permutation (IP). Initial Permutation (IP) = { 2, 6, 3, 1, 4, 8, 5, 7}Output IP: Step 1.3. Execute expansion/permutation (E/P) Apply E/P to the right 4 bits of Output IP and generate 8 bits from 4 bits. Extension/Permutation (E/P) = {4, 1, 2, 3, 2, 3, 4, 1} E/P output: Step 1.4. Perform binary XOR operation with K 1 EP output XOR K 1, i.e XOR E/P Output : Step 1.5. Determine a row and a column in S i table from E/P output Table S 0 : C0 C1 C2 C3 R R R R For a row combine bits 1 and 4, convert it to decimal, i.e. bits 1 & 4 -> 11 -> 3 For a column combine bits 2&3, convert it to decimal, i.e. bits 2&3 -> 00 -> 0 Value of row 3 and column 0 in table S 0 is 3. Convert 3 into binary 11. S 0 output: 11

Secret Key Cryptography-SDES Table S 1 : C0 C1 C2 C3 R R R R For a row combine bits 5&8, convert it to decimal, i.e. bits 5 & 8 -> 10 -> 2 For a column combine bits 6&7, convert it to decimal, i.e. bits 6&7 -> 00 -> 0 Value of row 2 and column 0 in table S 1 is 3. Convert 3 into binary 11. S 1 output: 11 S 0 S 1 output: Step 1.6. Execute permutation 4 Permutation 4 = { 2, 4, 3, 1}Output P4: Step 1.7. Execute XOR with left 4 bits of Output IP Output P4 XOR left 4 bits of Output IP xor Output: Step 1.8. Generate new 8-bits Replace left 4-bits of Output IP by the above result, copy right 4-bits of Output IP GN output: Step 1.9. Swap the two 4-bit halves of GN outputSW Output:

Secret Key Cryptography-SDES The second Round Step 2.1. Execute expansion/permutation (E/P) Apply E/P to the right 4 bits of SW Output and generate 8 bits from 4 bits. Extension/Permutation (E/P) = {4, 1, 2, 3, 2, 3, 4, 1} E/P output: Step 2.2. Perform binary XOR operation with K 2 EP output XOR K 2, i.e XOR E/P Output : Step 2.3. Determine a row and a column in S i table from E/P output For a row combine bits 1 and 4, convert it to decimal, i.e. bits 1 & 4 -> 10 -> 2 For a column combine bits 2&3, convert it to decimal, i.e. bits 2&3 -> 10 -> 2 Value of row 2 and column 2 in table S 0 is 1. Convert 1 into binary 0 1 S 0 output: 01 For a row combine bits 5&8, convert it to decimal, i.e. bits 5 & 8 -> 0 1 -> 1 For a column combine bits 6&7, convert it to decimal, i.e. bits 6&7 -> 0 0 -> 0 Value of row 1 and column 0 in table S 1 is 2. Convert 3 into binary 10. S 1 output: 1 0 S 0 S 1 output:

Secret Key Cryptography-SDES Step 2.4. Execute permutation 4 Permutation 4 = { 2, 4, 3, 1}Output P4: Step 2.5. Execute XOR with left 4 bit of SW Output Output P4 XOR left 4 bit of SW Output XOR Output: Step 2.6. Generate new 8-bits Replace left 4-bits of SW Output by the above result copy right 4-bits of SW Output GN2 output: Step 2.7. Execute reverse of initial permutation IP -1 IP -1 = {4, 1, 3, 5, 7, 2, 8, 6} Encrypted the 8-bit block:

Public Key Cryptography 1. Introduce public key cryptography 2. Explain functions of a public key and a private key 3. Explain how the public key cryptography works

Public Key Cryptography Public key cryptography is referred to as asymmetric cryptography. A user has a pair of mathematically related keys that are public key and a private key. A public key can be published. A private key can never leave the possession of its owner. A user sends a secret message simply encipher the message with the recipient’s public key. The recipient can decipher it using his private key.

Public Key Cryptography-RSA RSA uses a variable size encryption block and a variable size key. It can be used for key exchange, digital signatures, or encryption of small blocks of data.

Public Key Cryptography-RSA Key generation algorithm Step 1. Select two primes p and q Step 2. Calculate n = p * q Step 3. Calculate φ(n) = (p-1)(q-1). Step 4. Choose an integer e, and 1 < e < φ(n) Step 5. Determine d, 1 < d < φ(n), such that e*d mod φ(n) = 1. The public key is (n, e) and the private key is (n, d). Example: Select primes p=11, q=3 n = p*q = 11*3 = 33 φ(n) = (p-1)*(q-1) = 10*2 = 20 Choose e=3 Determine d such as d * e mod 20 = 1 and d < 20 d = 7, (3*7 = 21 = 2 * ) Generated keys are: Public key (33, 3), Private key (33, 7)

Encryption Input the message-decimal number m = 7 Encrypted output: c = m ^e mod n = 7 ^3 mod 33 = 343 mod 33 = 13 Encrypted message c = 13 Decryption m' = c ^d mod n = 13 ^7 mod 33 = 7 Public Key Cryptography-RSA

Thank You … Q & A Follows Thank you for your attention … Q & A follows