Cryptography & Classical Ciphers

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security Chapter 1
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Sri Lanka Institute of Information Technology
Cryptography and Network Security Chapter 1
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Principles of Information Security, 2nd edition1 Cryptography.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Steganography Ben Lee III Long Truong ECE Spring 2002.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Cryptography, Authentication and Digital Signatures
Midterm Review Cryptography & Network Security
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Cryptography Lynn Ackler Southern Oregon University.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Textbook  Cryptography and Network Security: Principles and Practice (second/third edition) by William Stalling  密码学与网络安全:原理与实践(第 3 版) -- 刘玉珍 等译 电子工业出版社.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Computer Security (CS4800)
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Cryptography and Network Security
Practical Questions Theoretical Questions
Information Security.
Classical Techniques: Substitution
Encryption
Information and Network Security
Steganography & Digital Watermarfking
Cryptography and Network Security Chapter 1
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security
Cryptography : Introduction
Cryptography and Network Security Chapter 1
Introduction to Cryptography
Computer Security Chapter Two
Security Attacks, Mechanisms, and Services
Cryptography and Network Security
Presentation transcript:

Cryptography & Classical Ciphers Ammar Karim NUST-SEECS

Introduction Computer Security - generic name for the collection of tools designed to protect data and to prevent hackers. Network Security - measures to protect data during their transmission. Internet Security - measures to protect data during their transmission over a collection of interconnected networks. 2

Security Attack “Any action that compromises the security of information owned by an organization” Information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems Generic types of attacks passive active 3

Security Attacks

Passive Attacks 5

Passive Attacks “Passive attacks” attempt to learn or make use of information from the system but does not affect system resources. By eavesdropping on, or monitoring of, transmissions to: obtain message contents or monitor traffic flows Are difficult to detect because they do not involve any alteration of the data.

Active Attacks 7

Active Attacks “Active attacks” attempt to alter system resources or affect their operation. Passive attacks are relatively easier to detect. Measures are available to prevent their success. On the contrary, it is quite difficult to prevent active attacks because of the wide variety of potential physical, software, and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.

Security Service A processing or communication service that enhances the security of the data processing systems and the information transfer for an organization. The services are intended to defy security attacks, and they make use of one or more security mechanisms to serve the purpose. 9

Security Services (X.800) Authentication Access Control Assurance that the communicating entity is the one claimed Access Control Prevention of the unauthorized use of a resource Data Confidentiality Protection of data from unauthorized disclosure Data Integrity Assurance that the contents of the data received are the same as sent by an authorized entity Non-Repudiation Protection against denial by one of the parties in a communication 10

Security Mechanisms Feature designed to detect, prevent, or recover from a security attack. There is no single mechanism to provide security of the data to be transmitted. However the element that underlies most of the security mechanisms is the use of cryptographic techniques. Cryptography is the art of secret writing, is the process of converting information, such as this slide, that can be read by most, into a secret code, that can only be read by those who are party to the secret.

Terminologies

Security Mechanisms

Cryptography vs. Steganography Overt writing: Evident that there is a secret message. Enemy can intercept the message Enemy can decrypt the message Steganography Covert writing: Its not evident that there is a secret message.

Steganography Change the LSB of pixels in a random walk. Change the LSB of subsets of pixels (i.e. around edges). Increment/Decrement the pixel value instead of flipping the LSB.

Steganography- Example News Eight Weather: Tonight increasing snow. Unexpected precipitation Smothers Eastern towns. Be extremely cautious and use snow-tires especially heading east. The highways are knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday. First letter of each word yields: Newt is upset because he thinks he is President.

Steganography- Example From WWII German spy (Kahn): Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suet and vegetable Oils. Second letter of each word yields: Pershing sails from NY June 1.

Cryptography-- Cæsar Cipher

Conventional Encryption

Classification of Cryptographic Systems

Classification of Cryptographic Systems

Classification of Cryptographic Systems

Classification of Cryptographic Systems

Symmetric Case Ek (M) = C Dk (C) = M Dk (Ek (M)) = M

Asymmetric Case Ek1 (M) = C Dk2 (C) = M Dk2 (Ek1 (M)) = M

Kerchoff’s Principle The security of cryptosystem must not depend on keeping secret the crypto- algorithm. It must depend on keeping secret the key. Reasons: Details of the crypto-algorithm can be captured or reverse-engineered. Even if so, frequently changing the key maintains the security.

Note: In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

Note: In symmetric-key cryptography, the same key is used in both directions.

Class Exercise

Polyalphabetic Substitution: Vigen`ere Cipher

Example: Vigen`ere Cipher

Example: Vigen`ere Cipher

Example: Vigen`ere Cipher

Note: In monoalphabetic substitution, the relationship between a character in the plaintext to the character in the ciphertext is always one-to-one.

Note: In polyalphabetic substitution, the relationship between a character in the plaintext and a character in the ciphertext is one-to-many.

Rotor Encryption

Rotor Encryption

Rotor Encryption

Rotor Machine

Transposition: The Grille

Transposition: The Grille

Transposition: The Grille

Transposition: The Grille

Transposition: The Grille

Transposition: The Grille

Hill Cipher To Encipher: To Decipher C = KM mod n To Decipher K-1C mod n = K-1KM mod n = M Where C, K and M are dx1, dxd, dx1 matrices respectively. K should be invertible modulo 26

Hill Cipher To Encipher: To Decipher C = KM mod n To Decipher K-1C mod n = K-1KM mod n = M Where C, K and M are dx1, dxd, dx1 matrices respectively. Recall the concepts of Linear Algebra 

Linear Algebra Revision For the matrices A, B, C, D: AB != BA in general AC = AD does not necessarily imply C = D A(BC) = (AB)C k(AB) = (kA)B = A(kB) (A+B)C = AC+BC AI = IA = A det (A) = ad - bc

Linear Algebra Revision Also recall the third order determinants. Inverse of a matrix A is possible iff: det (A) != 0 A-1 = adj (A) / det (A) A-1A = AA-1 = I

Linear Algebra Revision

Linear Algebra Revision

Back to……….Hill Cipher

Stream Ciphers

Stream Ciphers

Stream Ciphers

Stream Ciphers

One Time Pad

One Time Pad

One Time Pad-- Example

Simple Block Cipher

Playfair Cipher

Playfair Cipher

Playfair Example

Playfair Example

Playfair Example

Playfair Example

Class Quiz You have intercepted a message encrypted with a cipher of the form:- C = aM+b where M is the plaintext and C is the ciphertext (both integers modulo 26). The ciphertext starts with BBDJ. The plaintext starts with OOPS. Find the key.