R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Lesson 2 - Encryption ITD2323 Lecture by: IZWAN SUHADAK ISHAK Assistant Lecturer Universiti Industri Selangor.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Elementary Cryptography Steven Bogaerts. Goal of Cryptography ● Ensure security of communication over insecure medium  Privacy (secrecy, confidentiality)
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITMS – 3153 Information Systems Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CMPE 471 BASIC ENCRYPTION AND DECRYPTION. TERMINOLOGY & BACKGROUND S R S T RT O O Suppose S (Sender) wants to send a message to R (Reciever). S entrusts.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Lecture 23 Symmetric Encryption
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
Lecture 3 Page 1 CS 136, Fall 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
R R R CSE870: Advanced Software Engineering: Cheng1 Encryption A Brief Overview.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Lecture 4 Page 1 CS 136, Spring 2009 Introduction to Cryptography CS 136 Computer Security Peter Reiher April 9, 2009.
Chapter Two: Classic Cryptography
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Hide It in Plain Sight CS 490 Bob Orr
EEC 688/788 Secure and Dependable Computing
Chapter 3:Cryptography (16M)
Cryptography II Jagdish S. Gangolly School of Business
PART VII Security.
Outline What is data encryption? Cryptanalysis
Classical Cryptography II
Presentation transcript:

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)2 Acknowledgements Charles Pfleedger E. Spafford William A. Stein FOLDOC Sunit Chauhan Jim Xu, et al. Shawn Hillis

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)3 Outline Basic concepts Stream ciphers Block ciphers Summary of Stream and Block ciphers Public key encryption

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)4 Why do we need encryption Scenario: –S wants to send the message T to R, where an outsider, O, wants the message and tries to access it. –S: Sender –R: Receiver –T: Transmission Medium –O: Interceptor or Intruder. 4 ways O might try to access message. –Block it: prevent T from reaching R (availability) –Intercept it: read or listen to message (secrecy) –Modify it: obtaining message and changing it –Fabricate: generate an authentic-looking message to be delivered to R appearing to come from S

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)5 Basic Concepts Encryption: –Definition: mechanisms to disguise the message so that if the intermission is intercepted/diverted, the content of the message will not be understood. –Impact: foundational building block to security-based computing

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)6 Basic Concepts – cont’d Cryptosystem –5-tuple M: set of plain text C: set of cipher text K: set of keys E: M x K -> C D: C x K -> M

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)7 Basic Concepts – cont’d Encryption: process of encoding a message so that its meaning is not obvious Decryption: transforming encrypted message back to its normal form Encode/decode: translating phrases to other words or phrases Encipher/decipher: translating letters or symbols individually. Plaintext: original form of message: P = (p1,p2,…, pn) Ciphertext: encrypted form of message: C = (c1,c2,…, cn) Encryption/decryption relationships: –C = E(P); P = D(C); P = D(E(P))

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)8 Basic Concepts – cont’d Some encryption algs use a key K –C = E(K,P) –E is a SET of encryption algs –Key K selects specific one Symmetric Encryption: P = D(K,E(K,P)) –encryption/decryption keys are the same Asymmetric Encryption: P = D(K D,E(K E,P))

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)9 Pictorial Representation Key PlaintextCiphertext Original Plaintext EncryptionDecryption Encryption Key PlaintextCiphertext Original Plaintext EncryptionDecryption Decryption Key KDKD KEKE Symmetric Encryption: Asymmetric Encryption:

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)10 Basic Concepts – cont’d Cryptography: (hidden writing) –Practice of using encryption to conceal text Cryptanalyst: –Person who studies encryption and encrypted messages –Intent: find hidden meaning Cryptographer and Cryptanalyst: –Both attempt to translate coded material to original form –Cryptographer: works on behalf of legitimate sender or receiver. –Cryptanalyst: Works on behalf of unauthorized interceptor Cryptology: research/study into encryption/decryption –Includes cryptography and cryptanalysis.

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)11 Basic Concepts – cont’d Cryptanalysis –Objective: Break an encryption Deduce the meaning of a ciphertext mesg Determine decrypting algorithm that matches an encrypting algorithm –Possible techniques: break single message Recognize patterns in encrypted mesgs –break subsequent mesgs with straightforward decryption alg Find general weaknesses in encryption alg –Without necessarily intercepting any mesgs –Tools: Encrypted mesgs, known encryption algs, intercepted plaintext, data elements known/suspected of being in ciphertext, mathematical/statistical techniques, props of languages, computers, and luck

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)12 Basic Concepts – cont’d Breakability –Encryption algorithm is BREAKABLE: Given enough time and data, an analyst could determine the algorithm Practicality is issue For given cipher scheme, may have possible decipherments –Select one from Current technology: perform ops/sec –Require secs – years –Reality Check: Cryptanalyst won’t just try the “hard” ways –Ex: more clever approach, might only take ops ops/sec, ops will take about one day Breakability estimates are based on CURRENT technology

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)13 Stream Ciphers and Block Ciphers Stream Ciphers –Letter by letter –E.g. substitution-based cipher Block cipher –Block by block –E.g. transposition based cipher

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)14 Character Representations Study ways to encrypt any computer material: –ASCII/EBCDIC chars –Binary data or Object code –Control stream ABCDEFGHIJKLM NOPQRSTUVWXYZ

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)15 Substitution-based Encryption Monoalphabetic Ciphers –Caesar Cipher: c i = E(p i ) = p i + k –Cryptosystem K: {k| 0<=k<=25} E: (m+k) mod 26 D: (26+c-k) mod 26 C = M = {all sequence of roman letters} –Examples ( k=3) wuhdwb lpsrvvleoh, wklv phvvdjh lv qrw wrr kdug wr euhdn –Evaluation Easy to perform in field (no written instructions) Too simple, very easy to break

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)16 Substitution-based Encryption – cont’d –Weakness: study frequency distribution [Jim Xu, et al.]

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)17 Substitution-based Encryption-cont’d Polyalphabetic Substitution Ciphers –Desire flat distribution –Combine distributions that are high with low ones Encipher T as a and sometimes as b Also encipher X as a and sometimes as b –Use two separate encryption alphabets Tables for odd and even positions    mod 26    mod 26 TREAT YIMPO SSIBL E Fumnf dyvtf czysh h –Weaknesses Break by studying patterns (digram, trigram)

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)18 Substitution Discussion Major weakness: –frequency distribution (index of coincidence: measure of variation between frequencies in a distribution) –Some letters are just used more frequently than others –Numerous enciphering techniques still can make it difficult to hide these patterns –Kasiski Method: find number of alphabets used Identify repeated patterns of 3 or more chars For each pattern, write down position at which each instance of pattern begins Compute difference between start points of success instances Determine all factors of each difference If polyalphabetic subst used, key length will be one of the factors that appears often in previous step.

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)19 Transpositions (Permutations) Definition: encryption where letters are rearranged. Goal: diffusion, spread info from message or key out widely across the ciphertext. Try to break established patterns. –Digram or trigram: patterns of adjacent letters. Study 2 and 3 letter combinations of adj letters E.g. th, en, ing, etc.

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)20 Transposition Techniques Columnar Transpositions: –Rearrangement of chars of plaintext into cols C1C2C3C4C5 C6C7C8C9C10 C11C12Etc. THISI SAMES SAGET OSHOW HOWAC OLUMN ARTRA NSPOS ITION WORKS tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasns

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)21 Transposition Double Transposition Alg: –Involves 2 columnar transpositions –With different number of columns, applied sequentially. Fractionated Morse: –keyed mono-alphabetic cipher –Result is subsequently blocked (clustered) –Morse code is used as its basis

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)22 Summary Stream Ciphers (substitution based) –Mono and poly-alphabetic encryptions –Since they convert one symbol of plaintext immediately into a symbol of ciphertext –Features include: a) speed of transformation, b) low error propagation –Disadvantages are: a) low diffusion, b) susceptible to malicious insertions

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)23 Summary – cont’d Block Ciphers –Columnar transposition algorithm and fractionated Morse –Since a group of plaintext symbols are encrypted as one block –Features include: a) diffusion, b) immunity to insertions –Disadvantages are: a) slowness of encryption, b) error propagation

R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)24 Summary – cont’d Combination of stream cipher and block cipher can be very powerful –DES –Will go into details