CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Classical Cryptography
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
CIS 725 Security. Cryptosystem Quintuple ( E, D, M, K, C ) M set of plaintexts K set of keys C set of ciphertexts E set of encryption functions e: M 
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Terminology and classical Cryptology
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Cryptography and Technical IS Security.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Section 2.3: Substitution Ciphers
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Chapter Two: Classic Cryptography
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
CIT 380: Securing Computer Systems
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 3:Cryptography (16M)
Transposition Ciphers
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography

CIT 380: Securing Computer SystemsSlide #2 What is Cryptography? Cryptography: The art and science of keeping messages secure. Cryptanalysis: the art and science of decrypting messages. Cryptology: cryptography + cryptanalysis

CIT 380: Securing Computer SystemsSlide #3 Terminology Plaintext: message to be encrypted. Also called cleartext. Encryption: altering a message to keep its contents secret. Ciphertext: encrypted message. Plaintext Ciphertext Encryption Procedure

History of Cryptography Cæsar cipher ~ 50 B.C.E. –Simple alphabetic substitution cipher. al-Kindi ~ 850 C.E. –Cryptanalysis using letter frequencies. CIT 380: Securing Computer SystemsSlide #4

CIT 380: Securing Computer SystemsSlide #5 Example: Cæsar cipher ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC Plaintext is HELLO WORLD Change each letter to the third letter following it (X goes to A, Y to B, Z to C) –Key is 3, usually written as letter ‘D’ Ciphertext is KHOOR ZRUOG

Example: Cæsar cipher key=3 ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC Decrypt: FRPSXWHU CIT 380: Securing Computer SystemsSlide #6

CIT 380: Securing Computer SystemsSlide #7 A Transposition Cipher Rearrange letters in plaintext. Example: Rail-Fence Cipher –Plaintext is HELLO WORLD –Rearrange as H L O O L E L W R D –Ciphertext is HLOOL ELWRD

CIT 380: Securing Computer SystemsSlide #8 Cryptosystem Security Dependencies 1.Quality of shared encryption algorithm E 2.Secrecy of key K

CIT 380: Securing Computer SystemsSlide #9 Cryptanalysis Goals –Decrypt a given message. –Recover encryption key. Adversarial models vary based on –Type of information available to adversary –Interaction with cryptosystem.

CIT 380: Securing Computer SystemsSlide #10 Cryptanalysis Adversarial Models 1.ciphertext only: adversary has only ciphertext; goal is to find plaintext, possibly key. 2.known plaintext: adversary has ciphertext, corresponding plaintext; goal is to find key. 3.chosen plaintext: adversary may supply plaintexts and obtain corresponding ciphertext; goal is to find key.

CIT 380: Securing Computer SystemsSlide #11 Classical Cryptography Sender & receiver share common key –Keys may be the same, or trivial to derive from one another. –Sometimes called symmetric cryptography.

CIT 380: Securing Computer SystemsSlide #12 Substitution Ciphers Substitute plaintext chars for ciphered chars. –Simple: Always use same substitution function. –Polyalphabetic: Use different substitution functions based on position in message.

CIT 380: Securing Computer SystemsSlide #13 Cryptanalysis of Cæsar Cipher Exhaustive search –If the key space is small enough, try all possible keys until you find the right one. –Cæsar cipher has 26 possible keys.

CIT 380: Securing Computer SystemsSlide #14 General Simple Substitution Cipher Key Space: All permutations of alphabet. Encryption: –Replace each plaintext letter x with K(x) Decryption: –Replace each ciphertext letter y with K -1 (y)

General Simple Substitution Cipher Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z K= F U B A R D H G J I L K N M P O S Q Z W X Y V T C E CRYPTO BQCOWP CIT 380: Securing Computer SystemsSlide #15

CIT 380: Securing Computer SystemsSlide #16 General Substitution Cryptanalysis Exhaustive search impossible –Key space size is 26! =~ 4 x 1026 –Historically thought to be unbreakable. –Yet people solve them as newspaper puzzles every day… Solution: frequency analysis. Lesson: A large key space is necessary but not sufficient for security of a cryptosystem.

CIT 380: Securing Computer SystemsSlide #17 Cryptanalysis: Frequency Analysis Languages have different frequencies of –letters –digrams (groups of 2 letters) –trigrams (groups of 3 letters) –etc. Simple substitution ciphers preserve frequency distributions.

CIT 380: Securing Computer SystemsSlide #18 English Letter Frequencies

Letter Frequency ieshttp://en.wikipedia.org/wiki/Letter_frequenc ies CIT 380: Securing Computer SystemsSlide #19

CIT 380: Securing Computer SystemsSlide #20 Additional Frequency Features 1.Digram frequencies –Common digraphs: EN, RE, ER, NT, TH 2.Trigram frequencies –Common trigrams: THE, ING, THA, ENT 3.Vowels other than E rarely followed by another vowel. 4.The letter Q is followed only by U. 5.Many others.

Bigram Frequency CIT 380: Securing Computer SystemsSlide #21