Computer System Security CSE 5339/7339

Slides:



Advertisements
Similar presentations
Lesson 2 - Encryption ITD2323 Lecture by: IZWAN SUHADAK ISHAK Assistant Lecturer Universiti Industri Selangor.
Advertisements

CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
22C:19 Discrete Structures Integers and Modular Arithmetic
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Session 4 Asymmetric ciphers.
1 Digital certificates One concern with the public key approach: must ensure that you are encrypting to the correct person’s public key  Otherwise, you.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Lecture 1 Overview.
Chapter 3 Encryption Algorithms & Systems (Part B)
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Prime Numbers Prime numbers only have divisors of 1 and self
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Section 2.2: Affine Ciphers; More Modular Arithmetic Practice HW (not to hand in) From Barr Textbook p. 80 # 2a, 3e, 3f, 4, 5a, 7, 8 9, 10 (Use affinecipherbreaker.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
Implementing RSA Encryption in Java
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Computer and Network Security Rabie A. Ramadan Lecture 2.
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
Merkle-Hellman Knapsack Cryptosystem
Public Key Systems 1 Merkle-Hellman Knapsack Public Key Systems 2 Merkle-Hellman Knapsack  One of first public key systems  Based on NP-complete problem.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Ref: Pfleeger96, Ch.31 Properties of Arithmetic Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
R R R CSE870: Advanced Software Engineering: Cheng1 Encryption A Brief Overview.
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Public Key Cryptosystem In Symmetric or Private Key cryptosystems the encryption and decryption keys are either the same or can be easily found from each.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 3. Mathematics of Cryptography.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Public Key Encryption.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Input: A={a1, a2, … an} – public key, S - ciphertext
PART VII Security.
Analysis of the RSA Encryption Algorithm
Presentation transcript:

Computer System Security CSE 5339/7339 Lecture 4 August 31, 2004

Substitution and Transposition Ciphers Contents Encryption Substitution and Transposition Ciphers Symmetric and Asymmetric Enciption Merkle-Hellman Knapsacks Murtaza’s Presentation Meetings of Pres. Bush and Pres. Fox have focused on a Common Development Agenda Partnership for prosperity was launched in 2002 and aims to build Mexico’s strong regional development efforts, increased macroeconomic stability, and gowing international trade and investment by developing new strategies to foster growth in less developed areas of Mexico En marzo de 2002, el Presidente Bush y el Presidente Fox anunciaron en Monterrey la Sociedad para la Prosperidad, un plan creado para promover el desarrollo económico de México. Él Presidente Bush dijo: "Los recursos naturales más importantes de una nación están en las mentes y las capacidades y el espíritu emprendedor de sus ciudadanos".

Exercise (Group work) Decrypt the following encrypted quotation: fqjcb rwjwj vnjax bnkhj whxcq nawjv nfxdu mbvnu ujbbf nnc

Non-Repeating Series of Numbers Encryption Decryption ciphertext plaintext Original plaintext

One-Time Pads Name  set of sheets of paper with keys, glued into a pad The sender would tear off enough number of pages The receiver needs a pad identical to the one used by the sender

One-Time Pads (cont.) The sender would write the keys one at a time above the letters of the plaintext. K1 k2 k3 k4 ... Kn p1 p2 p3 p4 ... pn The plaintext is enciphered using a pre-arranged chart (Vignere Tableau) – all 26 letters in each column in some scrambled order select the substitution in row pi, column Ki Problems: Unlimited number of keys & Absolute synchronization between sender and receiver

Vernam Cipher Plaintext V E R N A M C I P H E R 21 4 17 13 0 12 2 8 15 7 4 17 Random numbers 76 48 16 82 44 3 58 11 60 5 48 88 Sum 97 52 33 95 44 15 60 19 75 12 52 105 Sum mod 26 19 0 7 17 18 15 8 19 23 12 0 1 Ciphertext t a h r s p i t x m a b

Book Ciphers Both sender and receiver need access to identical objects Example: telephone book – xxx-xxx-xxxx (use xx mod 26 as a key) Problem – High frequency letters A, E, O, T  40% of all letters used in Standard English text A, E, O, T, N, I  50% of all letters used in Standard English text The probability that the key letter and plain text letter is in these 6 letters is 0.25

Transposition (Diffusion) The letters of the message are rearranged Columnar transposition Example: THIS IS A MESSAGE TO SHOW HOW A COLMUNAR TRANSPOSITION WORKS

S A M E S S A G E T O S H O W H O W A C O L M U N A R T R A N S P O S T H I S I S A M E S S A G E T O S H O W H O W A C O L M U N A R T R A N S P O S I T I O N W O R K S tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasna

Stream and Block Ciphers Stream  converts one symbol of plaintext into a symbol of ciphertex Block  encrypts a group of plaintext symbols as one block.

Symmetric Encryption Systems (Secret Key) Both sender and receiver share one key Encryption and decryptions algorithms are closely related N * (N-1) /2 keys are needed for N users to communicate in pairs Key must be kept secret

Asymmetric Encryption Systems (public Key) One key must be kept secret, the other can be freely exposed – private key and public key Only the corresponding private key can decrypt what has been encrypted using the private key

Merkle-Hellman Knapsacks (Chapter 10) Algorithms is based on the knapsack problem What is the knapsack problem? General Knapsacks Superincreasing knapsacks

General Knapsacks (Hard) Given a sequence of integers a1, a2, …, an and a target sum T, the problem is to find a vector of 0s and 1s such that the sum of the integers associated with 1s equals T S = [17, 38, 73, 4, 11, 1] T = 53 Solution: (0,1,0,1,1,0)

Superincreasing Knapsacks (Easy) We place an additional restriction on the problem: The integers of S must form an superincresaing Sequence. (I.e. each integer is greater than the sum of all preceding integers) S = [1, 4, 11, 17, 38, 73] Algorithm? (Students participation)

Group Work S = [1, 4, 11, 17, 38, 73] Algorithm? Try it with T = 96 & T = 95

Knapsack Problem as a Public Key Algorithm Public Key: Set of integers of a knapsack problem Private Key: Corresponding superincreasing knapsack

Math Background Identity i is identity for op if i op x = x op i = x Inverse b is inverse of a if a op b = b op a = i Prime Number Any number greater than 1 that is divisible only by itself and 1 2 divides 10 10 is divisible by 2 Composite vs. prime

Math Background (cont.) Greatest Common Divisor – gcd(a,b) The largest integer that divides both a and b gcd(15,10) = 5 If p is a prime number gcd(p.q) = 1 for any q < p If x divides a and b  x also divides a – (k*b)

Modular Arithmetic Reminder after division a mod n = b  a = c*n + b (11 mod 3 = 2, 5 mod 3 = 2) Confine results to a particular range [0 – n-1] Operations +, -, * can be applied before or after mod is taken x and y are equivalent under mod n iff x mod n = y mod n x and y are equivalent under mod n iff x – y = k*n

Modular Arithmetic (cont) Multiplicative inverse of a  a-1 * 1 2 3 4 Product – mod 5 a = 2, a-1 = 3

x = ap-2 mod p Fermat’s Theorem For any prime p and any element a < p ap mod p = a Or ap-1 mod p = 1 The inverse of a is x such that a*x mod p = 1 = ap-1 mod p x = ap-2 mod p

Example Compute the inverse of 3 mod 5 x = 35-2 mod 5 x = 27 mod 5 = 2

Merkle- Hellman Knapsack (again) Idea  is to encode a binary message as a solution to a knapsack problem, reducing the ciphertext to the target sum obtained by adding terms corresponding to 1s in the plain text. Public Key: Set of integers of a knapsack problem Private Key: Corresponding superincreasing knapsack Technique for converting a superincreasing knapsack into regular one!

Merkle- Hellman Knapsack (cont) Normal arithmetic  + or * preserve superincreasing sets Modular arithmetic  may destroy superincreasing sets Modular arithmetic  sensitive to common factors Consider w * x mod n If w and n share common factors  not all values [0-n-1] Otherwise (relatively prime)  all values (If w and n are relatively prime, w has multiplicative inverse mod n)

Example x 3 * x mod 5 3 * x mod 6 1 3 2 4 5

Breaking the superincreasing nature of integer Multiple by w and take mod n n and w are relatively prime. Select S Select w and n, n > summation of si Obtain H (hi = w * si mod n)

Example (Encryption) S = [1, 2, 4, 9] w = 15, n = 17 H = [15, 13, 9, 16] P  0100 1011 1010 0101 C  13 40 24 29