Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
Computer Security CS 426 Lecture 3
Classical Encryption Techniques
CSE 651: Introduction to Network Security
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Cryptography Programming Lab
CSCI 5857: Encoding and Encryption
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Introduction to Information Security Chapter II : Classical Ciphers.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Science 101 Cryptography Part I. Notes based on S. Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
a connection between language and mathematics
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Section 2.5 Polyaphabetic Substitutions
Lecture 23 Symmetric Encryption
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Communication Security
Basic Encryption Methods
History and Background Part 3: Polyalphabetic Ciphers
Polyalphabetic Ciphers
Traditional Symmetric-Key Ciphers
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Conventional crypto - Noack Conventional crypto Diffusion and confusion How Mary Queen of Scots lost her head Various hand operable ciphers Various Enigmas

Conventional crypto - Noack Confusion and diffusion Confusion Replacing one element by another of the same size, seemingly randomly chosen The substitution must be one-to-one so it can be undone Diffusion Permuting the elements from place to place in a seemingly random fashion Permutations rather than random scrambles must be used so the rearrangement can be undone Expansion and hiding Ciphers that don’t expand the text rely on confusion and diffusion Concealment ciphers bury the content in noise or nondata

Conventional crypto - Noack Confusion methods Monoalphabetic substitution Trivial example – Caesar cipher He replaced each letter of the plaintext by one three letters before Weakness is the fixed scheme – once diagnosed, the Gauls win – Fairly trivial example – randomly chosen permuted alphabet 26! Of these alphabets exist – a very large number Frequency table is used to break this one – plaintext has nonuniform distribution of characters and diphthongs Polyalphabetic substitution A sequence of permutation alphabets is used Methods include Vigenere table (very simplistic) Code strips and such (bulky) Rotor machine

Conventional crypto - Noack Comments on permutations A permutation is A one-to-one mapping of a set onto itself With the underlying operation it forms a group (more later) A permutation of a permutation is still a permutation An substitution alphabet is a permutation, but the resulting cipher is not a permutation Permutations have unique inverses The simple transposition ciphers are permutations

Conventional crypto - Noack Diffusion methods Transposition ciphers General idea is to rearrange the characters without changing them to produce a random-appearing text. Example – Playfair cipher – named for its inventor

Conventional crypto - Noack Monoalphabetic cipher example Note the use of the frequency table A bit easier – Excel wasn’t available in those days These often have nonstandard letter frequencies Also they have blanks

Conventional crypto - Noack How Mary Queen of Scots lost her head From Singh, Simon, The Code Book Note: This is nothing but a monoalphabetic cipher with some word substitution

Conventional crypto - Noack The 4-rotor Enigma, with wiring pictures from Budiansky, Stephen, Battle of Wits Uses the polyalphabetic principle Repositioning the rotors gives a new alphabet The rotors are stepped at each character It was broken at least partly because of operator carelessness

Conventional crypto - Noack The Bombe, used to break Enigma messages Comments This is actually a copy of the machine conceived by Turing It still used a plugboard approach rather than a strictly electronic stored program Material captured from ships and submarines was also used This was a combination of known plaintext and brute force cryptanalysis It is not a Turing machine in the computer science sense picture from Budiansky, Stephen, Battle of Wits

Conventional crypto - Noack The Vigenere table and an example Weaknesses Only one simple shifted translation alphabet Relatively short period Can be broken by frequency analysis of spaced groups Could be strengthened somewhat with a longer keyword and different alphabets