Cryptography & Cryptanalysis

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
8. Cryptography1 ISA 562 Information Security Theory & Practice Introduction to Cryptography.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Lec. 5 : History of Cryptologic Research II
Introduction to Cryptography
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Cryptography. Methods of Encryption Transposition Switching the symbols within the plaintext Substitution Substituting different symbols for the symbols.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Security (CS4800)
Encryption. LEARNING OBJECTIVES: BY THE END OF THE LESSON YOU SHOULD KNOW. What encryption is and why it is important The basics of encryption techniques.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Outline Some Basic Terminology Symmetric Encryption
Campbell R. Harvey Duke University and NBER
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Presentation transcript:

Cryptography & Cryptanalysis Classics

The Evolution of Secret Writing 1. Steganography

2. Cryptography “The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption”

Transposition Cow cow, cwo, owc, ocw, wco, woc. Substitution c X o G w P cow XGP

“For example, consider this short sentence” has 50,000,000,000,000,000,000,000,000,000,000 rearrangements.

Rail Fence Transposition

Spartan Scytale

meet at midnight CUUZ VZ CGXSGIBZ Substitution Cipher meet at midnight CUUZ VZ CGXSGIBZ

CAESAR Shift Cipher

Kerckhoffs’ Principle: The security of a cryptosystem must not depend on keeping secret the cryptoalgorithm. The security depends only on keeping secret the key.

JULIUS CAESAR JULISCAER

Muslims Cryptanalysis Monoalphabetic Substitution Cipher a # b + The Science of Unscrambling a message without knowledge of the key.

“A Manuscript on Deciphering Cryptographic Messages” Frequency Analysis al-Kindı’s “A Manuscript on Deciphering Cryptographic Messages”

English

P is a consonant.

Combination OO appears twice, whereas XX does not appear at all. X and Y appear on their own in the ciphertext. (a and I are the only English word that consisit of a single letter) In the English language, the letter h frequently goes before the letter e (as in the, then, they, etc.), but rarely after e. h

O=e, X=a, Y=i, B=h. the most common three-letter words in English are the and and, and these are relatively easy to spot—Lhe, which appears six times, and aPV, which appears five times. P=n, V=d, L=t.

Every word has a vowel in it, so C in Cn is a vowel Every word has a vowel in it, so C in Cn is a vowel. The only vowels remaining are o and u. u does not fit so C = o. We also have the word Khe, which implies that K represents either t or s. But we already know that L = t, so it becomes clear that K = s. thoMsand and one niDhts thousand and one nights

A VOID BY GEORGES PEREC AVOIDBYGERSPC

1. Begin by counting up the frequencies of all the letters in the ciphertext. About five of the letters should have a frequency of less than 1 percent, and these probably represent j, k, q, x and z. One of the letters should have a frequency greater than 10 percent, and it probably represents e. If the cipher-text does not obey this distribution of frequencies, then con-sider the possibility that the original message was not written in English. 2. the most common repeated letters are ss, ee, tt, ff, ll, mm and oo. 3. The only one-letter words in English are a and I. The commonest two-letter words are of, to, in, it, is, be, as, at, so, we, he,by, or, on, do, if,me,my, up, an, go, no, us, am . The most common three-letter words are the and and.

Code One of the simplest improvements to the security of the monoalphabetic substitution cipher was the introduction of nulls, symbols or letters that were not substitutes for actual letters, merely blanks that represented nothing.

The Pigpen Cipher

New Ciphers Leon Battista Alberti hello AFPAD

L1-L2-L3-L4-L5

EMILY

THANK YOU!!