DIG 3563 – Information Management Cryptography Lecture 12 Based in part on a lecture by Sarah Adams (Olin College) and Gordon Prichett (Babson College)

Slides:



Advertisements
Similar presentations
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Digital Signatures. Anononymity and the Internet.

Section 3.8: More Modular Arithmetic and Public-Key Cryptography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Modern Cryptography.
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS110: Computers and the Internet Encryption and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Midterm Review Cryptography & Network Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
CSCI 5857: Encoding and Encryption
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography Dave Feinberg. Suppose I send an from to Who has access to that ? What if I want the.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
1 Simple and Unbreakable: The Mathematics of Internet Security Dr. Monica Nevins Department of Mathematics and Statistics University of Ottawa University.
Traditional Symmetric-Key Ciphers
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
CPS 290 Computer Security Network Tools Cryptography Basics CPS 290Page 1.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Encryption CS110: Computer Science and the Internet.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CS 150 – Computing: From Ada to the Web Cryptography.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Public-key Cryptography
Big Numbers: Mathematics and Internet Commerce
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
PART VII Security.
NET 311 Information Security
Modern Cryptography.
Presentation transcript:

DIG 3563 – Information Management Cryptography Lecture 12 Based in part on a lecture by Sarah Adams (Olin College) and Gordon Prichett (Babson College)

What will you be responsible for? Specific SKILLS will be called out and Marked with !! During the lecture notes.

Communication System SourceDestination Source Encoding Source Decoding EncryptionDecryption Error Control Encoding Error Control Decoding ModulationChannelDemodulation

Cryptology Cryptography  Inventing cipher systems; protecting communications and storage Cryptanalysis  Breaking cipher systems

Cryptography

Cryptanalysis

What is used in Cryptology? Cryptography:  Linear algebra, abstract algebra, number theory – efficient hiding of information Cryptanalysis:  Probability, statistics, combinatorics, computing – ways to find information

Caesar Cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ Key = 3 DEFGHIJKLMNOPQRSTUVWXYZABC Example  Plaintext: OLINCOLLEGE  Encryption: Shift by KEY = 3  Ciphertext: ROLQFROOHJH  Decryption: Shift backwards by KEY = 3

Caesar Cipher !! Use a +4 letter offset Caesar Cipher to encrypt (or decrypt) a message. Example: Attack Gaul tomorrow at dawn. step 0: Table: ABCDE FGHIJ KLMNO PQRST UVWXY Z DEFGH IJKLM NOPQR STUVW XYZAB C step 1: ATTACKGAULTOMORROWATDAWN step 2: A-> D, T-> W, etc. step 3: Break into 5 letter code groups Answer: DWWDF NJDXO WRPRU URZDW GDZQ

Cryptanalysis of Caesar Try all 26 possible shifts Frequency analysis Most frequent English Letters are e t a o i n s h r d l u, etc….

Frequency Analysis You need a good-sized body of cyphertext + knowledge (or guess) about which language it's in. Find most frequent letters in cyphertext Line up with most freq letters in language See if they match. (Short cyphertexts … bad news …) (Look for "e" in Caesar's message on Gaul.)

Substitution Cipher(Slightly stronger than Caesar Cypher) Permute A-Z randomly: A B C D E F G H I J K L M N O P… becomes H Q A W I N F T E B X S F O P C… Substitute H for A, Q for B, etc. Example  Plaintext: OLINCOLLEGE  Key: PSEOAPSSIFI

Cryptanalysis of Substitution Ciphers Try all 26! permutations – TOO MANY! Bigger than Avogadro's Number! Frequency analysis Crib analysis

What's a crib? A piece of known plaintext. Example: If we know that every morning's encrypted weather report begins with 'Weather Report", we can immediately crack w e a t h r p o from a substitution cypher, and detect if it's a Caesar cypher.

!! Use a crib to crack a code Assume that the phrase "Heil Hitler" is encrypted in the following text. Determine if (a) it's a substitution or Caesar cypher. (b) If Caesar, what's the offset? GDHKG HSKDQ

!! How to do it? GDHKG HSKDQ HE I L H I T LE R We see H->G and E->D and I->H and L->K So it's a Caesar Cypher with offset -1

If crib is not at beginning? You would have to try lots of combinations. You might even invent a COMPUTER to help you do it.

One-Time Pads Assign a number to each letter A B … M N … T U … Z 0 1 … … … 25 Plaintext: MATHISUSEFULANDFUN Key: NGUJKAMOCTLNYBCIAZ Encryption: “Add” key to message mod 26 Ciphertext: BGO….. Decryption: “Subtract” key from ciphertext mod 26

Modular Arithmetic What does "modular addition" mean? If the modulus is 10, then numbers go like this: In: Out: (start over at 0) So, 3 mod 10 = mod 10=3. 33 mod 10 = 3. For modulus 10, it's easy. Just keep last digit.

Modular Arithmetic If modulus is 4? In: Out: So, 3 mod 4 = 3. 5 mod 4 = 1 For n modulus 4, Divide & keep remainder. 5/4 = ¼ + 4/4so throw away the 4/4.

!! Modular Arithmetic Compute 15 mod 7

!! Modular Arithmetic Compute 15 mod 7 Answer: divide 15 by 7. Throw away the result, keep the remainder

One-Time Pads They used actual printed 'pads' of paper Unconditionally secure (if pad is random) Problem: Exchanging the pads ("key") There are some clever ways to exchange the key

For instance … New York Telephone Directory (must agree on which edition!) Start on page 42, take every 8 th numeral and use it as the next offset. Or: Take "Hamlet" by Shakespeare From page 3, every 3 rd letter.

BUT: Neither the phone book nor Shakespeare are truly random. Good statistical analysis (and cribs) will eventually detect ANY regularity in such a code.

History's most famous cryptanalysis: Enigma Germans believed it to be uncrackable. Press a key, a letter lights up. Each "rotor" contained wires implementing a Substitution cypher. Five rotors – each shifts after every letter So you need to know: (a) Rotor wiring, (b) Initial setting on a given day.

Cracking Enigma Polish mathematicians developed ideas, Based on a weakness (A->R and also R->A). (!!It's really a complex substitution cypher.!!) British captured an Enigma from a sinking sub off Scotland Alan Turing's team at Bletchley Park developed the "Bombe" computers to seek the daily settings, based on cribs.

The replica (working!) Bombe at Bletchley Park, north of London

Enigma and ULTRA Over 200 Bombes were operating Churchill, Roosevelt could read Nazi traffic The tragedy of Coventry Oneexwidow.blogspot.com

Enigma and ULTRA Over 200 Bombes were operating Churchill, Roosevelt could read Nazi traffic The tragedy of Coventry * The triumph: Battle of the Atlantic

Modern Cryptology First principle: Assume that your SYSTEM is known The only security is in protecting the KEYS "Security by obscurity" does not work! (which leads to the Second Principle: Human beings are almost always the weak link.)

!! Security through Obscurity "My URL is not linked from anywhere." "They'll never think to look HERE for the key to my apartment! "Nobody would think of me spelling my pet's name BACKWARDS for a password!" Key attribute of the STO fallacy: Assuming That other people are as stupid as you are….

Public-Key Cryptography Diffie & Hellman (1976) Uses one-way (asymmetric) functions, public keys, and private keys

Public Key Algorithms Based on hard mathematical problems –Factoring large integers

35 The RSA Public Key Encryption System: Key idea: "Trapdoor function": Easy in, difficult out. Encryption and SSL: Key Concepts Data Encryption Anybody can Encrypt and send A message to Bob Bob’s Mailbox

36 The RSA Public Key Encryption System: Key idea 1: "Trapdoor function": Easy in, difficult out. Encryption and SSL: Key Concepts Data Encryption Decryption Bob’s Mailbox Only Bob has the Key to his mailbox.

37 The RSA Public Key Encryption System: Key idea 2: "Symmetry": two keys are created: Key 1, Key 2. If you ENCRYPT with Key 1, you can DECRYPT with K2 If you ENCRYPT with Key 2, you can DECRYPT with K1 How does it work? You don't want to know the math.. It involves prime numbers and factorization. Encryption and SSL: Key Concepts

38 Bob wants private data from Alice. Bob creates a Key pair (two big, special numbers) Bob posts one (the public key) on his website Bob keeps the private key in a secret place (Private Key) Public Key Encryption and SSL: Key Concepts Alice in Atlanta Bob in Boston

39 Bob wants private data from Alice. Bob creates a Key pair (two big, special numbers) Bob posts one (the public key) on his website Bob keeps the private key in a secret place (Private Key) Alice grabs a copy of the Public Key public key Public Key Encryption and SSL: Key Concepts Alice in Atlanta Bob in Boston

40 Alice uses the public key, encrypts data ('plaintext'), sends it to Bob. Chris the Criminal grabs a copy as it goes by. key plaintext ---> Encrypted public key ---> message public key attempt to Chris gets decipher ?? garbage Encryption and SSL: Key Concepts Alice in Atlanta Bob in Boston Chris the crook

41 Bob uses the private key to recover Alice's plaintext. private key plaintext ---> Encryptedde- public key ---> messagecypher plaintext Encryption and SSL: Key Concepts Alice in Atlanta Bob in Boston Chris the Crook

42 Another essential usage: Proving who you are. Alice reads bob.com, wants to do business. But she's worried to send ccard information. So she sends him a test-text: "ertfqgjmnit43ff...." and says: encrypt this with your private key. I already know your public key. If your reply decrypts properly by the public key, then I know you had the private key! Digital Signatures

43 Alice sends test message Bob encrypts and returns Alice decrypts and believes Digital Signatures

44 Alice sends test message Bob encrypts and returns Alice decrypts and believes Like the Dutch Resistance in World War 2 You're Dutch? Then say "Schevenengen" German cannot pronounce it, even if he tries Dutch person hangs up phone Digital Signatures

SSL and the Internet Uses a public key encryption technique to exchange keys with your browser. (PKE is too slow for all of the traffic.) Relies on a "Chain of Authority" to verify That security certificates (public keys) Actually belong to who they say.

Chain of Authority How it works? My business has a security certificate. You don't trust it, so you check with its issuing authority (Thawte, Inc.) * Who is Thawte? Check with THEIR issuing authority … back to a trusted source. Your browser has a list of trusted authorities. (The police-verification story.)

Are we there yet? Is PKE encryption (with big keys) ultimately secure? Don't bet on it! Quantum computers (if they can be made to work) can explore ALL POSSIBILITIES AT ONCE (for a given key size) … so the game is still afoot (as Sherlock Holmes said.)