I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography Ch-1 prepared by: Diwan.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography & Encryption Secret Codes & The Advance of Technology Copyright © 2008 by Helene G. Kershner.
Security & Encryption Thomas Fenske & Joseph Minter.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
An Introduction to Cryptography TEA fellows February 9, 2012 Dr. Kristen Abernathy.
Principles of Information Security, 2nd edition1 Cryptography.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Overview of Digital Stenography
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
Cryptography & Encryption Secret Codes & The Advance of Technology.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Lec. 5 : History of Cryptologic Research II
Cryptography By, Anthony Lonigro & Valentine Mbah.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography  Goal of this art: how do you cipher your message securely?  This is an ancient art: For example, You can conceal the message (e.g. invisible.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSCI-235 Micro-Computers in Science Privacy & Security.
Computer Security (CS4800)
Some of these PowerPoint pages were created by my friend Shawna Haider.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
(Principles of Informatioan security)
Introduction to Steganography
Security Using Armstrong Numbers and Authentication using Colors
Identity Theft uses of Cryptography
Chapter-2 Classical Encryption Techniques.
Cryptography.
CSCI-235 Micro-Computer Applications
Chapter 3:Cryptography (16M)
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Types of Cryptanalysis attacks
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption

W HAT IS C RYPTOGRAPHY / C RYPTOLOGY The art of protecting information by transforming it ( encrypting it) into an unreadable format, called cipher text. encryptingcipher text Only those who possess a secret key can decipher (or decrypt ) the message into plain text. decryptplain text Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. ETPRO 2010

H OW DO YOU THINK THIS CODE WAS ENCRYPTED ? ETPRO 2010

T HIS IS C IPHER TEXT Cipher text Text that has been transformed into an unreadable format. Code In cryptology, code means substituting a meaningful word or phrase with another word or phrase to change or hide meaning ETPRO 2010

H OW C OULD YOU SOLVE THIS C IPHER ? ETPRO 2010

D ID YOU KNOW THAT SOME LETTERS IN THE ALPHABET OCCUR MORE FREQUENTLY IN THE E NGLISH LANGUAGE ? ETPRO 2010

S OLVE THE C IPHER ETPRO 2010

S OLUTION : W HAT IS THE KEY ? A key is symbols, characters, or letters required by the algorithm to encrypt or decrypt a message = today = you = will = learn = about = codes (and ciphers) ETPRO 2010

M ETHODS OF C RYPTOGRAPHY Substitution Replacing each letter with a different letter or symbol b=J, c=2 so that “a cat” = Transposition Rearranging the order of letters of the words of a message. (example: “the letters in each word get moved around = eth ttseelr ni ceah drow etg veodm uarndo”) Steganography Hiding a message (example: invisible inks, Herodotus tattooed messages on a shaved slave’s head and waited for the hair to re-grow to hide his messages) Mathematical Uses advanced formulas to encrypt text Computer or Mechanically Assisted Using complex algorithms and any single or combination of the mathematical, transposition, substitution and steganography to encrypt plain text. ETPRO 2010

T HE E NIGMA M ACHINE The most famous mechanical encryption device in history. ETPRO 2010

W HO THINKS UP THIS STUFF ? Cryptanalyst: Job Description The scientist responsible for creating algorithms for transforming plain text into unreadable information (cipher text), or for decrypting encrypted information AKA Cryptographer, Cryptologic Technician, Cryptologic Linguist, Symbolist, Decipherer, Information Security Expert, Intelligence Agent or Officer, Information Security Engineer Salary Range  $55,000 - $130,000 and more! Education Required  Entry level: Undergraduate: Math, Computer Science, foreign languages, engineering, telecommunications, computer programming languages, political science and/or relations  Mid and High Level Jobs: Graduate: Masters’ or PHD in Cryptology, Mathematics  National Security Agency provides internships  Additional Skills L INGUISTICS, S UBJECT KNOWLEDGE, R ESEARCH (R ESOURCE : HTTP :// CAREERSTHATDONTSUCK. COM /2007/02/24/ C AREER - PROFILE - CRYPTOLOGIST /) HTTP :// CAREERSTHATDONTSUCK. COM /2007/02/24/ C AREER - PROFILE - CRYPTOLOGIST / ETPRO 2010

W HY DO WE NEED C RYPTANALYSTS Copyright Protection Security of communications for Personal Businesses Government Military Credit Card Processing Password Protection RSA tokens: for business and games (like Warcraft) ETPRO 2010

L EGAL P ROBLEMS FOR C RYPTANALYSTS Digital Millennium Copyright Act (1998) Intended to provide law enforcement with a tool to go after piracy and file sharing (media like music, movies, and software) Made it illegal to use cryptanalytic techniques to get around the copyright protection methods (called Digital Rights Management ) Unintended result was to limit research and research sharing in the Cryptanalyst field for fear that their work might violate this law. Cryptanalyst argue that the algorithms should be published so that they can be improved and used. Only the keys should remain a secret. The first arrest was Dmitry Sklyarov, whose dissertation work and subsequent work with a Russian book reader company identified weaknesses in the protection of PDF files. ETPRO 2010

Y OU ARE THE C RYPTANALYST ! Create your own algorithm for encrypting a message! Substitution Replacing each letter with a different letter or symbol b=J, c=2 so that “a cat” = Transposition Rearranging the order of letters of the words of a message. (example: “the letters in each word get moved around = eth ttseelr ni ceah drow etg veodm uarndo”) Steganography Hiding a message (example: invisible inks, Herodotus tattooed messages on a shaved slave’s head and waited for the hair to re-grow to hide his messages) Mathematical Uses advanced formulas to encrypt text Computer or Mechanically Assisted Using complex algorithms and any single or combination of the mathematical, transposition, substitution and steganography to encrypt plain text. ETPRO 2010