a connection between language and mathematics

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
NUMBER THEORY Chapter 5: Cryptology. Era of Electronic Electronic communication Electronic Banking.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
CSCI 5857: Encoding and Encryption
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Traditional Symmetric-Key Ciphers
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
MAT 1000 Mathematics in Today's World Winter 2015.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Cryptography : from substitution cipher to RSA Alex Karassev.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Some of these PowerPoint pages were created by my friend Shawna Haider.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Cryptography and Network Security
Taehyung Kim HPC Lab. POSTECH
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Cryptography: from substitution cipher to RSA
Presentation transcript:

a connection between language and mathematics Cryptography a connection between language and mathematics

Introduction Cryptography: the procedures, processes, methods, etc., of making and using secret writing, as codes or ciphers crypto-: “hidden” or “secret”; -graphy: a process or form of drawing, writing, representing, recording, describing Cryptanalysis: the procedures, processes, methods, etc., used to translate or interpret secret writings, as codes and ciphers, for which the key is unknown Cryptology: the science that includes cryptography and cryptanalysis

Brief History First hint of cryptography Julius Caesar (100-44 B.C.) Egyptian (1900 B.C.) funeral incriptions Julius Caesar (100-44 B.C.) First military use of code? or was it the Greeks with the skytale. Francois Viete (1540-1603) Deciphered Spanish Code of more than 400 characters Mary, Queen of Scots (beheaded in 1587) Plotted to overthrow Queen Elizabeth I John Wallis (1616-1703) Deciphered code during English Civil War World War I British cryptologists deciphered the Zimmermann Telegram in 1917 World War II Cryptanalysis allows numerically inferior Amercian navy to defeat the Japanese at the Battle of the Ccoral Sea and in the Battle of Midway Island Zimmerman – alliance between germany and mexico against america

Side Note on Literature Sir Arthur Conan Doyle – Sherlock Holmes “The Adventure of the Gloria Scott Null Cipher “The Adventure of the Dancing Men” Substitution Cipher Edgar Allen Poe “The Gold Bug”

Some vocabulary Enciphering: the process of encoding a message Deciphering: the process of decoding a message Literal plain text: original message Numerical plain text: numerical equivalent of the literal plaintext Literal cipher text: encoded message in literal form Numerical plain text: encoded message in numerical form

A word about steganography… The practice of hiding messages, so that the presence of the message itself is hidden, often by writing them in places where they may not be found. stegano-: “covered” or “protected” Examples: Histaiaeus, a Greek general, would tattoo his servants’ shaved heads Romans would sew a message in the sole of a sandal Null Cipher Cardano Grille Girolamo cardono 1556

Two basic transformations Transposition: letters of the plain text are jumbled or disarranged Generally considered harder to break For example, take the phrase “Math history is super fun” which has 21 letters. That means there are 21! ways to rearrange the letters. Substitution: letters of the plain text are substituted by other letters, numbers, or symbols. Generally considered easier to use Transposition: letters retain their identities but lose their position; Substitution: letters retain their position but lose there identities.

Transpostition Examples: Greek Skytale Rail Fence Cipher Route Transposition Cipher Rail fence: civil war resembles a rail fence

Code or cipher? In general, “code” is distinguished from “cipher” A code consists of thousands of words, phrases, letters, and syllables with codewords or codenumbers that replace plain text. A cipher uses the basic unit length of one letter, sometimes a letter pair, but rarely larger groups of letters. Ciphers operate on plaintext units of regular length; codes operate on plaintext units of variable length A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 00 o1 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Transition to Math... Caeser Cipher Rot-n Cipher Shifting the alphabet 3 places Rot-n Cipher “rot” for “rotation” Let p (plaintext) be a unit of numerical plain text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Linear Cipher Let p be a two digit unit of numerical plain text, we can encipher using the key: The inverse transform of E(p) is the decryption key, where c is a two digit unit of numerical cipher text: Since there are 12 possible values of d and 26 possible values of e, there is 12*26=312 possible decryption keys Example: S=18, 7x+3, 7(18)+3=129==25 (mod 26) y=7x+3, y-3=7x … -3 (mod 26)=23 y+23=7x, (y+23)/7=x; 7*15 mod(26)=1 “Extended Euclidean Algorithm” 15(y+23)=15y+345; 345 (mod 26)=7 D(x)=15x+7 15(25)+7=382==18 (mod 26)

A word about Cryptanalysis… Exhaustive cryptanalysis: trying all possible decryption keys until the right one is found. Consider a character cipher consisting of a permutation of the alphabet. There would be 26! possible decryption keys. Frequency analysis: comparing the frequency of characters in a cipher to the relative frequency of letters used in the English language. Letters of the English language in order of relative frequency: E T A O I N S R H D L C U M F P G W Y B V K X J Q Z

Block or Matrix Ciphers A diagraph, or two character block cipher, might be encoded using the following encryption key: Designate M as the encryption matrix, then we need M-1 (mod 26) for decryption: Encription: C==MP (mod 26); Decryption: P==M^-1*C (mod 26)

One-time Pad and Polyalphabetic Cipher

Public-Key Encryption Allows the encryption key to be public. Relies on the computational infeasibility of factoring large numbers, which keeps the decryption key secret. Let n=pq, where p and q are prime numbers. Let j be an integer such that 2<j<(p-1)(q-1) and (j, (p- 1)(q-1))=1. Encryption key: Let k be the multiplicative inverse of j (mod (p-1)(q- 1)), that is Decryption key:

THE END! Any questions?