Introduction to Cryptography Techniques How secure is that banking network traffic?

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Computer Science 101 Data Encryption And Computer Networks.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
ICS 454: Principles of Cryptography
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CSE 651: Introduction to Network Security
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Chapter 2 – Classical Encryption Techniques
Chapter 12 Cryptography (slides edited by Erin Chambers)
 WHAT IS ENCRYPTION :-  Encryption (Round) (cont.) :-  HISTORY OF DE :-  TYPES OF DATA ENCRYPTION :-  Decryption :-  Security And Cryptanalysis.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
CSCI 5857: Encoding and Encryption
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Basic Cryptography Some examples taken from “Coding Theory and Cryptography, the essentials” Second Edition Hankerson, et.al. 2000, Marcel Dekker, Inc.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Overview of Cryptography & Its Applications
Lecture 23 Symmetric Encryption
Cracking the DES Encryption
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Chapter 2 Symmetric Encryption.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
DES: Data Encryption Standard
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Outline Desirable characteristics of ciphers Uses of cryptography
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Security through Encryption
Presentation transcript:

Introduction to Cryptography Techniques How secure is that banking network traffic?

Social and Computing Implications of Cryptography The internet is a collection of networks designed to deliver data packets. The internet is a collection of networks designed to deliver data packets. Packets are easy to sniff. Packets are easy to sniff. The internet is not secure, but is used to connect banks, the power grid, pipelines, transportation systems, etc. The internet is not secure, but is used to connect banks, the power grid, pipelines, transportation systems, etc.

Terms Plaintext – the readable message Plaintext – the readable message Ciphertext – the coded message Ciphertext – the coded message EncryptionDecryption plaintext ciphertext plaintext key

Types of Attacks Ciphertext Only Ciphertext Only – adversary uses just the ciphertext to gain either the key or the plaintext (really bad encryption) Known Plaintext Known Plaintext – adversary gets the key using some ciphertext and its plaintext Chosen Plaintext Chosen Plaintext – adversary introduces some plaintext to generate some ciphertext

Symmetric Key Encryption Both parties share a secret key The single key is used for both encryption and decryption Encryption and decryption are equal efforts

Shift Ciphers key = amount to shift each character Example: Rotate13 ‘A’ + 13 = = 14 = ‘N’ So, the message “aardvark” becomes “nneqinex”.

Shift Ciphers Advantage of Rot13: Easy to implement. Rot13('A') = 'N' (1 + 13)%26 = 14 Rot13('N') = 'A' ( )%26 = 1 So, one function does both encoding and decoding. Disadvantage of Any Rotation: Very easy to break – just try all 26 possibilities. Brute Force aka - Brute Force attack.

Substitution Cipher Key = list of character substitutions Example: Key = “Chair” A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Y Z c h a i r B D E F G J K L M N O P Q S T U V W X Disadvantage: Susceptible to Character Frequency Analysis

Character Frequencies

Polyalphbetic Ciphers Key is repeated and used to shift characters. Example plaintextnow is the time for all + keyaar dv ark aard var kaa Ciphertextopo mo uzp ujei bpj lmm

Polyalphbetic Ciphers Advantage: Thwarts character frequency analysis. For example, an “e” will encrypt to several different letters. Disadvantage: Statistics can still be used to break the code.

Polyalphbetic Ciphers How to Break Them: 1 - Look for repeated strings. For example, if the characters “thi” appear together frequently, then it could be because the key is hitting a common word. Text = and we need to test and retest Key = ste ve stev es teve ste vestev Sum = thi sj gyjz yh njoy thi njmyxp

Polyalphbetic Ciphers How to Break Them: 2 – Determine Probable Key Length The start of strings “thi” are frequently separated by distances that are multiples of 5. So, key length is probably five. 3A – Try keys of that length. 3B – Use CharFreqAnal on characters separated by that length.

One-Time Pad Key is used to shift the plaintext. Key is used only once. Key has same length as the message. Advantage: Unbreakable! Disadvantage: Requires lots of keys.

DES History DES Data Encryption Standard Solicited in 1973 by the National Bureau of Standards (National Institute of Standards and Technology) Developed by IBM and the NSA Adopted in 1977

DES Design Principles Confusion Confusion – complicate the relationship between key and ciphertext Diffusion Diffusion – spread structure of plaintext around the ciphertext

DES Design Overview Key = 56 bits plus 8 parity bits 70,000,000,000,000,000 possible keys of 56 bits Key generates 16 subkeys 16 rounds of functions

Breaking DES – design of $1M machine to search entire key space in one day – design of $1M machine to search entire key space in one hour “DES Challenge” prize claimed in 22 hours by distributed.net University of Bochum and Kiel, Germany, uses $10,000 hardware cost to get average time of 6.4 days University of Bochum and Kiel, Germany, uses $10,000 hardware cost to get average time of 6.4 days. triple DES is much less breakable

Unix Crypt “man 3 crypt” #include char *crypt(const char *key, const char *salt); crypt is the password encryption function. It is based on the Data Encryption Standard algorithm with variations intended (among other things) to discourage use of hardware implementations of a key search.

Password Salt Based on time when password created Based on time when password created First two letters in the passwd field First two letters in the passwd field Used to discourage a brute force attack Used to discourage a brute force attack Encrypting every dictionary word then comparing that list to passwd entries will not work since every dictionary word can yield 4096 different possibilities. Even if my password is the same for two systems, they have different salts so they look different Even if my password is the same for two systems, they have different salts so they look different

Public Key Encryption Two Keys : encryption and decryption Encryption key is public Decryption key is private Once sender encrypts a message, even they can’t decrypt it

Public Key Encryption 1.Receiver sends their public key to the sender 2.Sender encrypts message using that public key 3.Sender sends encrypted message 4.Receiver decrypts message using their private key

Summary Nothing on a public network is completely safe.