A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CSCE 790G: Computer Network Security
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Classical Encryption Techniques
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Fall 2006CS 395 Computer Security1 Cryptography Well, a gentle intro to cryptography.
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Cis 4930 Introduction to cryptography
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Conventional Cryptography Classical Encryption Techniques.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Section 2.5 Polyaphabetic Substitutions
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Conventional Encryption Message Confidentiality
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
Cryptography and Network Security
Polyalphabetic Ciphers
Outline Some Basic Terminology Symmetric Encryption
Conventional Encryption Message Confidentiality
Campbell R. Harvey Duke University and NBER
Cis 4930 Introduction to cryptography
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Cryptographic Algorithms and Protocols
Double Transpositions
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

A Technical Seminar Presentation - 2004 CLASSICAL CRYPTOGRAPHY Under the guidance of Dr. Partha S. Mallick Presented by Jyotishman Baishya Roll # EC200119320

Introduction Basic Concepts Key Cryptography Plaintext Cipher text Cipher Key Encipher (encode) Decipher (decode) Cryptanalysis Cryptology Code

Types of Ciphers Substitution Transposition Mono-alphabetic Scytale Poly-alphabetic Poly-graphic Transposition Scytale Reverse Rail Fence Geometric Row/Column

Mono-alphabetic Substitution Caesar Cipher 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher first attested use in military affairs (Gallic Wars) replace each letter by 3rd letter on, eg. L FDPH L VDZ L FRQTXHUHG is I CAME I SAW I CONQUERED can describe this mapping (or translation alphabet) as: Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: EFGHIJKLMNOPQRSTUVWXYZABC

General Mono-alphabetic Substitution rather than just shifting the alphabet could shuffle (jumble) the letters arbitrarily each plain text letter maps to a different random cipher text letter hence key is 26 letters long have a total of 26! ~ 4 x 1026 keys! but … can be cracked through frequency analysis

Poly-alphabetic Substitution Cipher Vigenère Cipher Blaise de Vigenère is generally credited as the inventor of the “polyalphabetic substitution cipher” To improve security use many monoalphabetic substitution alphabets Hence each letter can be replaced by many others Use a key to select which alphabet is used for each letter of the message ith letter of key specifies ith alphabet to use Use each alphabet in turn Repeat from start after end of key is reached

Vigenère Example Write the plaintext out and under it write the keyword repeated Then using each key letter in turn as a Caesar cipher key Encrypt the corresponding plaintext letter Plaintext THISPROCESSCANALSOBEEXPRESSED Keyword CIPHERCIPHERCIPHERCIPHERCIPHE Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH In this example the keyword is "CIPHER". Hence the following translation alphabets are mapped to the plaintext letters: C: - CDEFGHIJKLMNOPQRSTUVWXYZAB I: - IJKLMNOPQRSTUVWXYZABCDEFGH… … for ABCDEFGHIJKLMNOPQRSTUVWXYZ

Hill Cipher A multiple-letter encryption method – encrypts m letters of plaintext at each step The encryption key K is a m x m matrix of coefficients To encrypt – multiply the matrix K by a vector of m plaintext letters to receive a vector of m ciphertext letters. (Arithmetic is modulo the size of the alphabet.) The decryption key K-1 is the m x m matrix of coefficients that is the inverse of matrix K: K * K-1 = I To decrypt – multiply the matrix K-1 by the vector of m ciphertext letters to receive the vector of m plaintext letters. (Arithmetic is modulo the size of the alphabet.)

Transposition Ciphers Scytale cipher a strip of paper was wound round a staff message written along staff in rows, then paper removed leaving a strip of seemingly random letters not very secure as key was width of paper & staff Reverse cipher write the message backwards Rail Fence cipher write message with letters on alternate rows Geometric Cipher Write message following one pattern and read out with another.

Transposition Ciphers (contd…) Row Transposition ciphers in general write message in a number of columns and then use some rule to read off from these columns. key could be a series of number being the order to: read off the cipher; or write in the plaintext. Block (Columnar) Transposition ciphers the message is written in rows, but read off by columns in order given by key. for ease of recovery may insist matrix is filled.

Poly-alphabetic Cipher Machines Jefferson Wheel Rotor Based Machines

Conclusion Cryptography has undergone tremendous development since the days it had come into existence some 4000 years ago. The world of research and development continues to experiment with new concepts such as quantum cryptography, cellular automata, chaotic cryptosystems, elliptic curves based on cryptography and visual cryptography. Developments are also taking place in the area of most sophisticated methods of digital steganography. Simultaneously some challenging area of cryptanalysis, being the other side of development exercise will gain importance in view of the plethora applications demanding assured security.

Thank You.