Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri

Slides:



Advertisements
Similar presentations
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
Chapter 5 Cryptography Protecting principals communication in systems.
CMSC 414 Computer and Network Security Lecture 4 Jonathan Katz.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Lecture 23 Symmetric Encryption
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Network Security Chapter
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Chapter 20 Symmetric Encryption and Message Confidentiality.
THE FAMILY OF BLOCK CIPHERS “SD-(n,k)” S. Markovski D. Gligoroski V. Dimitrova A. Mileva.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Lecture 3 1. TRANSPOSITION CIPHERS 2 Transposition Ciphers now consider classical transposition or permutation ciphers these hide the message by rearranging.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
CS480 Cryptography and Information Security
Row Transposition Ciphers
Asynchronous Cryptology: Implementations and Applications
Outline Desirable characteristics of ciphers Stream and block ciphers
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Block cipher and modes of encryptions
Symmetric-Key Encryption
Block vs Stream Ciphers
Block Ciphers: DES and AES
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri Pleinlaan 9, (Education) Johanes A. Buchmann. Introduction to Cryptography, Springer, Richard Mollin, Codes: The Guide to Secrecy From Ancient to Modern Times, Chapman & Hall, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone Alfred J. MenezesPaul C. van OorschotScott A. Vanstone Handbook of Applied Cryptography, CRC Press, 1996.Handbook of Applied Cryptography

INTRODUCTION Introduction 8/10/2015 | pag. 3

Cryptology Introduction 8/10/2015 | pag. 4 Cryptology + A form of communication which is primarily concerned with the secure transmission (through encryption) of a secret message over an insecure channel. Deals with attacks on encrypted intercepted messages to recover the secret message. = Cryptography Cryptanalysis

Cryptosystem Introduction 8/10/2015 | pag. 5

Example: Ceasar Cipher Cryptography 8/10/2015 | pag. 6

Example: Ceasar Cipher Introduction 8/10/2015 | pag. 7 Hence the number of keys should be large!

BASIC CONCEPTS Introduction 8/10/2015 | pag. 8

Symmetric vs Asymmetric Cryptosystems Introduction 8/10/2015 | pag. 9

Cryptanalysis Introduction 8/10/2015 | pag. 10 Kerckhoff’s principle

Attacks Introduction 8/10/2015 | pag. 11

Example: Attacks Introduction 8/10/2015 | pag. 12

Alphabet Introduction 8/10/2015 | pag. 13

Alphabet Introduction 8/10/2015 | pag. 14

Words Introduction 8/10/2015 | pag. 15

Permutations Introduction 8/10/2015 | pag. 16

Permutations Cryptography 8/10/2015 | pag. 17

SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 8/10/2015 | pag. 18

Block Ciphers Symmetric Cryptosystems 8/10/2015 | pag. 19

Block Ciphers Symmetric Cryptosystems 8/10/2015 | pag. 20

Block Ciphers: Permutation Cipher Symmetric Cryptosystems 8/10/2015 | pag. 21

Block Ciphers: Multiple Encryption Symmetric Cryptosystems 8/10/2015 | pag. 22

Block Ciphers: Modes of Use Cryptography 8/10/2015 | pag. 23 ECB: Electronic Codebook CBC: Cipherblock Chaining CFB: Cipher Feedback OFB: Output Feedback

Block Ciphers – ECB: Electronic Codebook Mode Cryptography 8/10/2015 | pag. 24

Block Ciphers – ECB: Electronic Codebook Mode Cryptography 8/10/2015 | pag. 25

Block Ciphers – ECB: Electronic Codebook Mode Cryptography 8/10/2015 | pag. 26

Example: Block Ciphers – ECB Cryptography 8/10/2015 | pag. 27

Drawback: Block Ciphers – ECB Cryptography 8/10/2015 | pag. 28

Example: Block Ciphers – ECB Cryptography 8/10/2015 | pag. 29

Block Ciphers – CBC: Cipherblock Chaining Mode Cryptography 8/10/2015 | pag. 30

Block Ciphers – CBC: XOR Cryptography 8/10/2015 | pag. 31

Block Ciphers – CBC: Cipherblock Chaining Mode Cryptography 8/10/2015 | pag. 32

Block Ciphers – CBC: Cipherblock Chaining Mode Cryptography 8/10/2015 | pag. 33

Block Ciphers – CBC: Cipherblock Chaining Mode Cryptography 8/10/2015 | pag. 34

Example: Block Ciphers – CBC Cryptography 8/10/2015 | pag. 35

Block Ciphers – CBC: Cipherblock Chaining Mode Cryptography 8/10/2015 | pag. 36

Example: Block Ciphers – CBC Cryptography 8/10/2015 | pag. 37

Drawback: Block Ciphers – CBC Cryptography 8/10/2015 | pag. 38

Block Ciphers – CFB: Cipher Feedback Mode Cryptography 8/10/2015 | pag. 39

Block Ciphers – CFB: Cipher Feedback Mode Cryptography 8/10/2015 | pag. 40

Block Ciphers – CFB: Cipher Feedback Mode Cryptography 8/10/2015 | pag. 41

Example: Block Ciphers – CFB Cryptography 8/10/2015 | pag. 42

Drawback: Block Ciphers – CFB Cryptography 8/10/2015 | pag. 43 The smaller the block length r, the shorter the ciphertext blocks. This means on the hand that transmission is faster, but on the other hand that the block encryption function must be applied more frequently. The optimal choice of r depends on a tradeoff between transmission and computation speed.

Block Ciphers – OFB: Output Feedback Mode Cryptography 8/10/2015 | pag. 44

Block Ciphers – OFB: Output Feedback Mode Cryptography 8/10/2015 | pag. 45

Block Ciphers – OFB: Output Feedback Mode Cryptography 8/10/2015 | pag. 46

Example: Block Ciphers – OFB Cryptography 8/10/2015 | pag. 47

Drawback: Block Ciphers – OFB Cryptography 8/10/2015 | pag. 48