ITMS – 3153 Information Systems Security

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Lesson 2 - Encryption ITD2323 Lecture by: IZWAN SUHADAK ISHAK Assistant Lecturer Universiti Industri Selangor.
Making “Good” Encryption Algorithms
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Network Management and Security
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Week 2 - Wednesday.  What did we talk about last time?  Encryption  Shift ciphers  Transposition ciphers.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Chapter-2 Classical Encryption Techniques.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
EEC 688/788 Secure and Dependable Computing
Cryptography II Jagdish S. Gangolly School of Business
Basic of Modern Cryptography
Presentation transcript:

ITMS – 3153 Information Systems Security Chapter 2 – Elementary Cryptography SHIRAJ MOHAMED M | MIS UNIT

Coverage Areas Concepts of encryption Cryptanalysis Symmetric (secret key) Encryption Asymmetric (public key) Encryption Key exchange protocols and certificates Digital Signatures Cryptographic hash functions SHIRAJ MOHAMED M | MIS UNIT

SHIRAJ MOHAMED M | MIS UNIT

Terminology & Background Sender (S), Recipient (R), Transmission media (T) Interceptor / intruder (O) (availability) O might block message from reaching R O might intercept message (confidentiality) O might modify message (integrity) O might fabricate an authentic-looking message (integrity) SHIRAJ MOHAMED M | MIS UNIT

Terminology & Background Encryption – process of encoding a message Decryption – transforming encoded message back to normal Encrypt – encode , encipher Decrypt – decode, decipher Cryptosystem – system for encryption and decryption Plaintext – original form of message Ciphertext – encoded form of message SHIRAJ MOHAMED M | MIS UNIT

Terminology & Background Algorithms – rules for encryption and decryption Key – value used to encrypt message C = E(K, P) where P=plaintext, K = key, E = encryption algorithms, and C = ciphertext Symmetric encryption P = D(K, E(K,P)) Asymmetric encryption P = D(KD, E(KE,P)) Keyless cipher Cryptography (hidden writing) – uses encryption to hide message Cryptanalysis – attempts to find meanings in encrypted messages Cryptology – study of encryption and decryption SHIRAJ MOHAMED M | MIS UNIT

P = D (K, E (K, P)) Symmetric Sometimes the encryption and decryption keys are the same P = D (K, E (K, P)) where P=plaintext, K = key, E = encryption algorithms, and C = ciphertext SHIRAJ MOHAMED M | MIS UNIT

P = D (KD, E (KE, P)) Asymmetric At other times, encryption and decryption keys come in pairs Decryption key, KD Encryption key KE P = D (KD, E (KE, P)) where P=plaintext, K = key, E = encryption algorithms, and C = ciphertext SHIRAJ MOHAMED M | MIS UNIT

Cryptography Cryptography (secret writing) is the strongest tool for controlling against many kinds of security threats. Well-disguised data cannot be read, modified, or fabricated easily. Cryptography is rooted in higher mathematics: group and field theory, computational complexity, and even real analysis, not to mention probability and statistics. Fortunately, it is not necessary to understand the underlying mathematics to be able to use cryptography. SHIRAJ MOHAMED M | MIS UNIT

Cryptanalysis Attempt to break a single message Attempt to recognize patterns in encrypted messages Attempt to infer some meaning without breaking the encryption Attempt to realize the key Attempt to find weaknesses in the implementation or environment of use of encryption Attempt to find general weaknesses in an encryption algorithm SHIRAJ MOHAMED M | MIS UNIT

Cryptographer v Cryptanalyst A cryptographer works on behalf of a legitimate sender or receiver Cryptanalyst A cryptanalyst works on behalf of an unauthorized interceptor SHIRAJ MOHAMED M | MIS UNIT

Encryption SHIRAJ MOHAMED M | MIS UNIT

Encryption with Keys SHIRAJ MOHAMED M | MIS UNIT

Breakable Encryption An encryption algorithm is called breakable when, given enough time and data, an analyst can determine the algorithm May be impractical A 25-character message of just uppercase letters has 2625 (1035) possible decipherments. A computer performing 1010 operations/sec would take 1011 years SHIRAJ MOHAMED M | MIS UNIT

Representing Characters we use the convention; plaintext is written in UPPERCASE letters, and ciphertext is in lowercase letters LASANTHA 11018131970 SHIRAJ MOHAMED M | MIS UNIT

Arithmetic on the characters A + 3 = D N - 1 = ? C+10 = ? S + 9 = ? X + 4 = ? SHIRAJ MOHAMED M | MIS UNIT

Types of Encryption Substitution – one or more characters are replaced with another Transpositions (permutations) – order of characters is rearranged Hybrid – combinations of the two types SHIRAJ MOHAMED M | MIS UNIT

Substitution Ciphers This technique is called a monoalphabetic cipher or simple substitution A substitution is an acceptable way of encrypting text SHIRAJ MOHAMED M | MIS UNIT

Caesar Cipher Each letter is translated a fixed number of positions in the alphabet Ci = E(pi) = pi + 3 (Caesar used a shift of 3) Easy to perform; easy to break Look for double letters and then use common words with double letters SHIRAJ MOHAMED M | MIS UNIT

Other Substitution Ciphers Use a key to scramble the letters A B C D E F G H I J K L M N O … c i p h e r s a b d f g j k l … Rearrange using a fixed distance between letters (e.g. every 3rd) a d g j m p s v y b e h k n r … SHIRAJ MOHAMED M | MIS UNIT

Complexity of Substitution Encryption and Decryption Substitution encryption algorithms can be performed by direct lookup in tables. An important issue in using any cryptosystem is the time it takes to turn plaintext into ciphertext, and vice versa. SHIRAJ MOHAMED M | MIS UNIT

Cryptanalysis of Substitution Ciphers The techniques described for breaking the Caesar cipher can also be used on other substitution ciphers Look for short words, words with repeated patterns, common first and last letters Can use our knowledge of language Look at frequency distributions Could reduce time to hours Nature and context of the text being analyzed SHIRAJ MOHAMED M | MIS UNIT

One-Time Pads The pad consists of a large number of pages where each page contains a non- repeating key The sender would write the keys above the message (e.g. a 300 character message would require 30 pages of 10 character keys) The message is scrambled using a Vigenere tableau built from the message and key Problem is synchronizing the receiver’s pad with the senders pad SHIRAJ MOHAMED M | MIS UNIT

Vigenere tableau SHIRAJ MOHAMED M | MIS UNIT

How to use Vigenere tableau I am, I exist, that is certain. uaopm kmkvt unhbl jmed SHIRAJ MOHAMED M | MIS UNIT

Vernam Cipher One-time pad consists of an arbitrary long non-repeating sequence of numbers that are combined with the plaintext Each plaintext character is represented by its numeric equivalent and is added to one of the random numbers. The ciphertext character is computed from the sum mod 26 Repeated characters are typically represented by different ciphertext characters SHIRAJ MOHAMED M | MIS UNIT

Vernum Cipher SHIRAJ MOHAMED M | MIS UNIT

Book Ciphers Uses a passage from a book to form the letters at the top of a Vigenere Tableau Computes ciphertext character by taking the intersection of the plaintext character and corresponding character at that position from the book passage Relatively easy to break using frequency distributions SHIRAJ MOHAMED M | MIS UNIT

Transpositions (Permutations) Columnar Transposition rearranging plaintext message into columns and then reading it row by row Transposition algorithms require a constant amount of time per character and are (n) algorithms, but space required to store results and delay in waiting for all characters to be read are dependent on the size of the plaintext SHIRAJ MOHAMED M | MIS UNIT

Transpositions…. THIS IS A MESSAGE TO SHOW HOW A COLUMNAR TRANSPOSITION WORKS tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasns SHIRAJ MOHAMED M | MIS UNIT

Infrequent letter If the message length is not a multiple of the length of a row, the last columns will be one or more letters short. When this happens, we sometimes use an infrequent letter, such as X, to fill in any short columns SHIRAJ MOHAMED M | MIS UNIT

Cryptoanalysis of Transposition Algorithms Compute letter frequencies of ciphertext; if appear with normal frequency, then assume a transposition algorithm was used SHIRAJ MOHAMED M | MIS UNIT

Shannon's Characteristics of "Good" Ciphers The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption The set of keys and the enciphering algorithm should be free from complexity The implementation of the process should be as simple as possible Errors in ciphering should not propagate and cause corruption of further information in the message The size of the enciphered text should be no larger than the text of the original message SHIRAJ MOHAMED M | MIS UNIT

Stream Ciphers Most of the ciphers we have presented so far are stream ciphers (exception is the columnar transposition cipher) convert one symbol of plaintext immediately into a symbol of ciphertext SHIRAJ MOHAMED M | MIS UNIT

Stream Ciphers System SHIRAJ MOHAMED M | MIS UNIT

Errors of Stream Ciphers Skipping a character in the key during encryption SHIRAJ MOHAMED M | MIS UNIT

Block Cipher A block cipher encrypts a group of plaintext symbols as one block Eg: columnar transposition SHIRAJ MOHAMED M | MIS UNIT

Block Cipher Systems SHIRAJ MOHAMED M | MIS UNIT

Advantages and disadvantages of stream and block encryption algorithms SHIRAJ MOHAMED M | MIS UNIT

Confusion and Diffusion SHIRAJ MOHAMED M | MIS UNIT

Confusion The interceptor should not be able to predict what will happen to the ciphertext by changing one character in the plaintext The goal of substitution is confusion SHIRAJ MOHAMED M | MIS UNIT

Diffusion The cipher should also spread the information from the plaintext over the entire ciphertext so that changes in the plaintext affect many parts of the ciphertext SHIRAJ MOHAMED M | MIS UNIT

References Charles P. Pfleeger, (2005) "Security in Computing (Fourth Edition)", Prentic-Hall International, Inc. SHIRAJ MOHAMED M | MIS UNIT

thank you SHIRAJ MOHAMED M | MIS UNIT