Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography Ch-1 prepared by: Diwan.
Computer Science 101 Data Encryption And Computer Networks.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Digital Signatures. Anononymity and the Internet.

Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Shared Secrets Keeping secrets on the web. Encryption Goal : hidden in plain sight.
What is Elliptic Curve Cryptography?
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Changing Control.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Public Key Cryptography
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
MATH 224 – Discrete Mathematics
MAT 1000 Mathematics in Today's World Winter 2015.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Encryption Coursepak little bit in chap 10 of reed.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
MAT 1000 Mathematics in Today's World Winter 2015.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 More details and explanation …
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Public-key Cryptography
Cryptography.
Chapter 3:Cryptography (16M)
PART VII Security.
Rivest, Shamir and Adleman
Fundamentals of Data Representation
Fluency with Information Technology Lawrence Snyder
Encryption & Steganography: Amazing Things To Do with Bits
Presentation transcript:

Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange

 Encryption is the process of “scrambling” data so it is difficult (impossible?) to understand it  We encrypt data to keep it private  Every site that you use as is encrypted  Familiar example: Caesar cipher: C: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z E: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  What would Julius be encrypted to? 10/12/2015© 2011 Larry Snyder, CSE2

 Encryption is the process of “scrambling” data so it is difficult (impossible?) to understand it  We encrypt data to keep it private  Every site that you use as is encrypted  Familiar example: Caesar cipher: C: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z E: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  What would Julius be encrypted to? Mxolxv 10/12/2015© 2011 Larry Snyder, CSE3

 The fixed shift of an alphabet is easy to break Alternate:  Sender uses a key, k, to multiply clear byte sequences (recall they’re numbers) by k -- Send encrypted result – looks like gibberish --  Receiver divides by k to decrypt getting clear 10/12/2015© 2011 Larry Snyder, CSE4

 Let the clear be: 9” and k=13  Break clear text into 2-letter sequences:  ME ET b9  Interpret text as numbers   Multiply by key:  Send encrypted (6-digit) number  Receiver does the reverse process … 10/12/2015© 2011 Larry Snyder, CSE  13=  13=  13=  13=042341

 The problem with “private key” encryption: the two sides have to meet to agree on key  Public Key fixes this: The receiver publishes (on Web site, say) a (very very special) key, K  More importantly, the theory it uses means that NO practical amount of computing can break the code  Here’s what you do … 10/12/2015© 2011 Larry Snyder, CSE6

 Sender breaks up the message into blocks as before  Sender cubes each block – yup, raises to the 3 rd power – and mods it by K, i.e. ( 3 )%K  Transmit results  Receiver raises each remainder to a high power determined by prime numbers & known only to him  Receiver mods by K, too, which are – surprisingly – the original blocks!  The receiver assembles the message  Thanks to Euler and Diffie & Hellman 10/12/2015© 2011 Larry Snyder, CSE7 This Is Amazing!!!

 The process of hiding information  Two Greek roots meaning: “stego” == “roof” “stega” == “cover” 10/12/2015© 2011 Larry Snyder, CSE8

 Most common reason to hide information is to avoid being caught with it  Military and spy documents  Repressive governments restricting news/info  Avoid others “snooping” – privacy  Hiding is different than encryption … uses the fact that the searcher doesn’t know it’s there 10/12/2015© 2011 Larry Snyder, CSE9

 The Plan …  hide “subversive” protest picture in “calendar art” 10/12/2015© 2011 Larry Snyder, CSE10 Guest Image Host Image

 We don’t need all of the bits in RGB to get a decent picture 10/12/2015© 2011 Larry Snyder, CSE All bitsLeft 2 bits of each color

 Put guest bits into right 2 bits of host 10/12/2015© 2011 Larry Snyder, CSE

 10/12/2015© 2011 Larry Snyder, CSE13 fog.jpg stegFog.png Really? Just Do It! Really? Just Do It!

… and then we’ll see the details 10/12/2015© 2011 Larry Snyder, CSE14

 10/12/2015© 2011 Larry Snyder, CSE15 Encoding Code Code To Save Result on Click

 After the pictures are loaded Clear right 2 bits of host Extract left 2 bits of guest New combined color 10/12/2015© 2011 Larry Snyder, CSE16

 10/12/2015© 2011 Larry Snyder, CSE17

 Read in the file, and then on mouse click, pull out the bits and make a picture Remove right 2 bits Make them left 2 bits for each color New color 10/12/2015© 2011 Larry Snyder, CSE18

 Run A Test … 10/12/2015© 2011 Larry Snyder, CSE19 The Original

 10/12/2015© 2011 Larry Snyder, CSE20 Steganized