Network Security Lecture 12 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography and Network Security Chapter 3
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptography and Network Security Chapter 2. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts.
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
CSCE 790G: Computer Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Review What is security: history and definition Security policy, mechanisms and services Security models.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Overview of Cryptographic Techniques Hector M Lugo-Cordero CIS 4361 Secure Operating System Administration 1.
Chapter 2 – Classical Encryption Techniques
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Classical Encryption Techniques
Cryptography. Secret (crypto) Writing (graphy) –[Greek word] Practice and study of hiding information Concerned with developing algorithms for: –Conceal.
Cryptography Cryptography is the technique of secret writing.
Dr. Lo’ai Tawalbeh 2007 Chapter 2: Classical Encryption Techniques Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Chapter 2 Classical Encryption Techniques. Symmetric Encryption n conventional / private-key / single-key n sender and recipient share a common key n.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Rather than just shifting the alphabet Could shuffle (jumble) the letters arbitrarily Each plaintext letter maps to a different random cipher text letter.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
CSCI 5857: Encoding and Encryption
CSCI-100 Introduction to Computing Privacy & Security Part II.
Computer and Network Security Rabie A. Ramadan Lecture 2.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Information Systems Security 3. Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves,
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Chapter 2 – Classical Encryption Techniques. Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all.
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Chapter 2 – Classical Encryption Techniques Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
An Introduction to Cryptology
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecturer in Mogadishu University and University of Somalia
Introduction to Cryptography and Secure Communications  What is cryptography?  Encryption  Decryption.
Code Making/Breaking. What methods have you seen for encoding secret messages?
An NCTM Illuminations Lesson. Please cut out the two circles on the Caesar Shifter Activity Sheet in your packet.
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Cryptography and Network Security
Part 1 By Dr. Shadi Masadeh
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
Computer and Network Security
Information Security IT423
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Network Security Lecture 12 Presented by: Dr. Munam Ali Shah

Part 2 (b) Cryptography as a Network Security Tool

Summary of the previous lecture We had overviewed the 3-dimensions of a cryptographic system, i.e., type of operation to transform the plain text into cipher text, number of keys used and the way in which plain text is processed We also discussed unconditional and computational security. One example of unconditional security is OTP The difference between Cryptanalysis and Brute Force attacks, were also discussed. And lastly, we practically perform cryptography through the Shift Cipher

Outlines of today’s lecture We will: Explore a couple of more examples of Shift Cipher Continue the discussion on Mono-alphabetic Cipher with an example will also be discussed Perform a cryptanalysis on a cipher text to reveal the plain text.

Objectives You would be able to present an overview of more cryptographic schemes and you will understand the limitation of each scheme. You would be able to break the code (ideally..)

Concepts A private key cipher is composed of two algorithms encryption algorithm E decryption algorithm D The same key K is used for encryption & decryption K has to be distributed beforehand

Caesar Cipher If each letter is assigned a number (a=0, z=25), Encryption/Decryption defined as: C = E(p) = (P + 3) mod (26) P = D(c) = (C – 3) mod (26) Example: meet me after the toga party phhw ph diwhu wkh wrjd sduwb

Caesar Cipher: Encryption Example K = 7 P = Rome is the greatest empire C = yvtl pz aol nylhalza ltwpyl

Caesar Cipher: Decryption Example K = 7 C = yvtl dhz uva ibpsa pu h khf P = Rome was not built in a day

Caesar Cipher: Decryption with Unknown Key C=tfnriujuzvdrepkzdvjsvwfivkyvziuvrkyjkyvmrczrekevmvikrjkvfwuvrkyslkfetv tfnriuj uzv drep kzdvj svwfiv kyvzi uvrkyj; kyv mrczrek evmvi krjkv fw uvrky slk fetv  P = Cowards die many times before their deaths; the valiant never taste of death but once. (K = 17) Julius Caesar by William Shakespeare

Cryptanalysis of Caesar Cipher Only have 26 possible ciphers A maps to A,B,..Z Could simply try each in turn A brute force search Given ciphertext, just try all shifts of letters Do need to recognize when have plaintext

Monoalphabetic Cipher Instead of substituting each letter in a sequential order (shift), substitute the letters arbitrarily Each plaintext letter maps to a unique ciphertext letter Hence key is 26 letters long

Monoalphabetic Cipher Security How many total keys are there? 26! = 4 x keys With so many keys, is it secure? No It is secure against brute force attack but problem lies in language characteristics Called frequency analysis attack

Language Redundancy and Cryptanalysis Human languages are redundant Thats why we can compress text files Letters are not equally commonly used Which is the most common letter? E Which is the least common letter? Z

English Letter Frequencies

Language Redundancy and Cryptanalysis Have tables of single, double & triple letter frequencies for various languages Which is the most common digram? TH Which is the most common trigram? THE

Use in Cryptanalysis Key concept – mono-alphabetic substitution ciphers do not change relative letter frequencies Each occurrence of a particular plaintext letter maps to the same ciphertext letter So attack is easy: Calculate letter frequencies for ciphertext Compare counts/plots against known values

Example Cryptanalysis Given ciphertext uzqsovuohxmopvgpozpevsgzwszopfpesxudbmetsxaiz vuephzhzshzowsfpappdtsvpquzwymxuzuhsxepyepopd zszufpombzwpfupzhmdjudtmohmq Frequency Analysis P 13.33H 5.83F 3.33B 1.67C 0.00 Z 11.67D 5.00W 3.33G 1.67K 0.00 S 8.33E 5.00Q 2.50Y 1.67L 0.00 U 8.33V 4.17T 2.50I 0.83N 0.00 O 7.50X 4.17A 1.67J 0.83R 0.00 M 6.67

Example Cryptanalysis Guess P & Z are E and T, respectively utqsovuohxmoevgeoteevsgtwstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt wymxutuhsxeeyeeoedtstufeombtwefuethm djudtmohmq

Example Cryptanalysis Among digrams starting with Z, ZW has the highest occurrence (3 times) Guess ZW is TH n Utqsovuohxmoevgeoteevsgthstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt hymxutuhsxeeyeeoedtstufeombthefuethm djudtmohmq Hence ZWP is THE

Example Cryptanalysis n Utqsovuohxmoevgeoteevsgthstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt hymxutuhsxeeyeeoedtstufeombthefuethm djudtmohmq Guess S is A n Utqaovuohxmoevgeoteevagthatoefeeaxud bmetaxaitvueehthtahtowafeaeedtavequt hymxutuhaxeeyeeoedtatufeombthefuethm djudtmohmq

Example Cryptanalysis U, V and M may correspond to O, I and N Continuing with trial and error, we finally get the following plaintext It was disclosed yesterday that several informal but direct contacts have been made with political representatives of the Viet Cong in Moscow

Summary of today’s lecture We discussed more examples of Shift/Ceaser Cipher We also discussed examples of mono-alphabetic cipher and poly-alphabetic cipher

Next lecture topics Our discussion on more cryptographic schemes will continue. We will explore One Time Pad and OTP An example of Vigenere Cipher will also be discussed with its limitations. Transposition Cipher with an example of Rail Fence Cipher will form part of our next lecture.

The End