Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography Introduction Last Updated: Aug 20, 2013.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
1 Foundations The problem of providing secret communication over insecure media is the most traditional and basic problem of cryptography.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
Applied Cryptography Chapter 1 Foundations Jaewon Lee.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Public Key Model 8. Cryptography part 2.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Cryptanalysis. The Speaker  Chuck Easttom  
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Akademska in raziskovalna mreža Slovenije 1 Cryptography Overview Gorazd Božič Academic and Research Network of Slovenia
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography – Test Review
Chapter 2 Basic Encryption and Decryption
Security through Encryption
PART VII Security.
Presentation transcript:

Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar

Terminology Sender and Receiver Messages and Encryption –Encryption and decryption –Plaintext and ciphertext –Cryptography and cryptographers –Cryptanalysis and cryptanalysts –Cryptology and cryptologists

Encryption and Decryption Notations –Message, M –Plaintext, P –Ciphertext, C –Encryption function, E E(M) = C –Decryption function, D D(C) = M Identity: D(E(M)) = M EncryptionDecryption Plaintext Ciphertext Original Plaintext

Authentication, Integrity, and Nonrepudiation In addition to providing confidentiality (privacy), other cryptographic services are: –Authentication Ascertaining a message’s true origin –Integrity Verifying that a message has not been modified in transit –Nonrepudiation A sender should not be able to falsely deny later that he sent a message

Algorithms and Keys Cryptographic algorithm –Also called cipher –Mathematical function for encryption and decryption Restricted algorithm –Secret algorithm, popular for low security applications, no standard Modern cryptography –Key, K –Keyspace Range of possible values of the key

Key-Based Cryptography Key-based encryption and decryption –E k (M) = C –D k (C) = M Identity –D k (E k (M)) = M EncryptionDecryption Plaintext Ciphertext Original Plaintext Key

Different Keys for Encryption and Decryption Encryption key, K 1 Decryption key, K 2 E k1 (M) = C D k2 (C) = M D k2 (E k1 (M)) = M EncryptionDecryption Plaintext Ciphertext Original Plaintext Encryption Key Decryption Key

Cryptosystem An algorithm, plus all possible plaintexts, ciphertexts, and keys

Symmetric Algorithms Same key for encryption and decryption Also called, secret-key algorithms, one-key algorithms, single-key algorithms E k (M) = C D k (C) = M Two categories –Stream algorithms or stream ciphers (operate on a single bit or sometimes bytes) –Block algorithms or block ciphers (a typical block size is 64 bits for modern computer algorithms)

Public-Key Algorithms Key used for encryption is different from key used for decryption Encryption key is often called the public key Decryption key is often called the private key Decryption key cannot be calculated from encryption key in any reasonable amount of time Also called asymmetric algorithms E k1 (M) = C D k2 (C) = M For digital signatures, messages are encrypted with the private key and decrypted with the public key

Cryptanalysis Science of recovering plaintext of a message without access to the key An attempted cryptanalysis is called an attack Kerckhoffs’ assumptions in cryptanalysis –Cryptographic algorithm and implementation known –Secrecy resides only in the key

Cryptanalytic Attacks Ciphertext-only attack –Given ciphertext of several messages, recover plaintext, key(s), or algorithm –Formally Given: C 1 = E k (P 1 ), C 2 = E k (P 2 ),..., C i = E k (P i ) Deduce: Either P 1, P 2,... P i ; k; or an algorithm to infer P i+1 from C i+1 = E k (P i+1 ) Known-plaintext attack –Given ciphertext and corresponding plaintext of several messages, deduce the key(s) or algorithm –Formally Given: (P 1, C 1 ), (P 2, C 2 ),..., (P i, C i ) where C i = E k (P i ) Deduce: Either k, or an algorithm to infer P i+1 from C i+1 = E k (P i+1 )

Cryptanalytic Attacks (cont’d) Chosen-plaintext attack Given: (P 1, C 1 ), (P 2, C 2 ),..., (P i, C i ) where the cryptanalyst gets to choose P 1, P 2,..., P i Deduce: Either k, or an algorithm to infer P i+1 from C i+1 = E k (P i+1 ) Adaptive-chosen-plaintext attack –A special case of chosen-plaintext attack –Cryptanalyst modifies his or her choice of plaintext based on the results of previous encryption Chosen-ciphertext attack –Given: C 1, P 1 = D k (C 1 ), C 2, P 2 = D k (C 2 ),..., C i, P i = D k (C i ) –Deduce: k –Primarily applicable to public-key algorithms –Sometimes effective against a symmetric algorithm as well

Cryptanalytic Attacks (cont’d) Chosen-key attack –Cryptanalyst has some knowledge about the relationship between different keys –Not very practical Rubber-hose cryptanalysis –Cryptanalyst threatens, blackmails, or tortures someone to get the key Purchase-key attack –Bribe someone to get the key Author’s Comments –The best cryptographic algorithms are the ones that have been made public, have been attacked by the world’s best cryptographers for years, and are still unbreakable –Those who claim to have an unbreakable cipher simply because they cannot break are either geniuses or fools –Good cryptographers rely on peer review to separate the good algorithms from the bad

Security of Algorithms Different algorithms offer different degrees of security Cost of breaking must be greater than the value of encrypted data Value of most data decreases over time An algorithm is unconditionally secure if, no matter how much ciphertext a cryptanalyst has, there is not enough information to recover the plaintext (ex: one-time pad) Cryptography is concerned with cryptosystems that are computationally infeasible to break An algorithm is considered computationally secure (also called strong) if it cannot be broken with available resources, either current or future.

Complexity Measures of An Attack Data complexity –Amount of data needed as input to the attack Processing complexity (also called work factor) –Time needed to perform the attack Storage requirements –Amount of memory needed to do the attack As a rule of thumb, the complexity of an attack is taken to be the minimum of the three factors Some attacks involve trading off the three complexities

Steganography Existence of a secret message is concealed by hiding it in other messages Example –Hiding secret messages in graphic images

Substitution Ciphers and Transposition Ciphers Substitution Ciphers –Classical cryptography –Each character in the plaintext is substituted for another character in the ciphertext. Ex: Caesar Cipher Transposition Ciphers –Plaintext remains the same, but the order of characters is shuffled around. Ex: columnar transposition cipher Rotor Machines –Enigma machine –Used by the Germans during World War II –A team of Polish cryptographers broke the first German Enigma

Simple XOR A symmetric algorithm –Plaintext is XORed with a keyword to generate ciphertext Not secured at all; trivial to break How to break –Discover the length of the key by a procedure known as counting coincidences –Shift the ciphertext by that length and XOR it with itself

One-Time Pads Perfect encryption scheme, primarily used for ultra-secure low bandwidth channels Invented by Major Joseph Mauborgne and AT&T’s Gilbert Vernam in 1917 Start by representing the message as a sequence of 0s and1s Key is a random sequence of 0s and 1s of the same length as the message Add the key to the message mod 2, bit by bit (Actually XOR operation) Discard the key, once used and never use again (plaintext) (key) (ciphertext)

A Variation of One-Time Pads Consider plaintext as a sequence of letters Key is a random sequence of shifts, each one between 0 and 25 Decryption uses the same key, but subtracts instead of adding the shifts This encryption is completely unbreakable for a ciphertext only attack Example: Assume A  1, B  2,..., Z  0 Plaintext: ONETIMEPADkey:TBFRGFARFM Ciphertext: IPKLPSFHGQ How? O+T mod 26 = I N + B mod 26 = P etc. Caveats: –key letters have to be generated randomly. Using pseudo-random number generator is not useful. –No authenticity.

Computer Algorithms Thee most common cryptographic algorithms –DES (Data Encryption Standard) Most popular symmetric key algorithm 3DES –AES (Advanced Encryption Standard) –RSA (Rivest, Shamir, and Adleman) Most popular public-key algorithm Can be used for both encryption and digital signatures –DSA (Digital Signature Algorithm) A public-key algorithm; cannot be used for encryption, but only for digital signatures