Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Making “Good” Encryption Algorithms
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
1 Digital certificates One concern with the public key approach: must ensure that you are encrypting to the correct person’s public key  Otherwise, you.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
Chap 2: Elementary Cryptography.  Concepts of encryption  Cryptanalysis: how encryption systems are “broken”  Symmetric (secret key) encryption and.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 2 Basic Encryption and Decryption (part B)
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Elementary Cryptography
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2003)1 Encryption A Brief Overview.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
TOTURIAL CRYPTOGRAPHY Ver :1. Things to learn about  Concepts of encryption  Cryptanalysis  Symmetric encryption  Asymmetric encryption  Protocols.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Cryptography and Network Security Chapter 2
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Chapter Two: Classic Cryptography
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Chapter 2 Basic Encryption and Decryption
Chapter-2 Classical Encryption Techniques.
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
EEC 688/788 Secure and Dependable Computing
Cryptography II Jagdish S. Gangolly School of Business
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)  Key exchange protocols and certificates  Digital Signatures  Cryptographic hash functions

Elementary Cryptography Terminology & Background  Sender (A), Recipient (B), Transmission media (T)  Interceptor / intruder (C) (availability)  C might block message from reaching R  C might intercept message (confidentiality)  C might modify message (integrity)  C might fabricate an authentic-looking message (integrity)

Terminology & Background  Encryption – process of encoding a message  Decryption – transforming encoded message back to normal  Encrypt – encode, encipher  Decrypt – decode, decipher  Cryptosystem – system for encryption and decryption  Plaintext – original form of message  Ciphertext – encoded form of message

Terminology & Background  Algorithms – rules for encryption and decryption  Key – value used to encrypt message  C = E(K, P) where P=plaintext, K = key, E = encryption algorithms, and C = ciphertext  Symmetric encryption P = D(K, E(K,P))  Asymmetric encryption P = D(K D, E(K E,P))  Keyless cipher  Cryptography (hidden writing) – uses encryption to hide message  Cryptanalysis – attempts to find meanings in encrypted messages  Cryptology – study of encryption and decryption

Types of Encryption  Substitution – one or more characters are replaced with another  Transpositions (permutations) – order of characters is rearranged  Hybrid – combinations of the two types

Substitution Ciphers  Caesar Cipher Each letter is translated a fixed number of positions in the alphabetEach letter is translated a fixed number of positions in the alphabet C i = E(p i ) = p i + 3C i = E(p i ) = p i + 3 Plaintext A B C D E F G H I J K L …Plaintext A B C D E F G H I J K L … Ciphertext d e f g h i j k l m n o …Ciphertext d e f g h i j k l m n o … Easy to perform; easy to breakEasy to perform; easy to break Look for double letters and then use common words with double lettersLook for double letters and then use common words with double letters

Other Substitution Ciphers  Use a key to scramble the letters  A B C D E F G H I J K L M N O …  c i p h e r s a b d f g j k l …  Rearrange using a fixed distance between letters (e.g. every 3 rd )  A B C D E F G H I J K L M N O …  a d g j m p s v y b e h k n r …

Complexity of Substitution Encryption and Decryption  Substitution encryption algorithms can be performed by direct lookup in tables and are O(n) algorithms

One-Time Pads  The pad consists of a large number of pages where each page contains a non- repeating key  The sender would write the keys above the message (e.g. a 300 character message would require 30 pages of 10 character keys)  The message is scrambled using a Vigenere tableau built from the message and key  Problem is synchronizing the receiver’s pad with the senders pad

Vernum Cipher  One-time pad consists of an arbitrary long non-repeating sequence of numbers that are combined with the plaintext  Each plaintext character is represented by its numeric equivalent and is added to one of the random numbers. The ciphertext character is computed from the sum mod 26  Repeated characters are typically represented by different ciphertext characters

Book Ciphers  Uses a passage from a book to form the letters at the top of a Vigenere Tableau  Computes ciphertext character by taking the intersection of the plaintext character and corresponding character at that position from the book passage  Relatively easy to break using frequency distributions

Transpositions (Permutations)  Columnar Transposition rearranging plaintext message into columns and then reading it row by row  “YES COMPUTER SECURITY IS FUN” would be written  Y M R R S  E P S I F  S U E T U  C T C Y N  O E U I X is encrypted as “ymrrs epsif suetu ctcyn oeuix” where the X is just filler. is encrypted as “ymrrs epsif suetu ctcyn oeuix” where the X is just filler.  Transposition algorithms require a constant amount of time per character and are O(n) algorithms, but space required to store results and delay in waiting for all characters to be read are dependent on the size of the plaintext

Cryptanalysis  Attempt to break a single message  Attempt to recognize patterns in encrypted messages  Attempt to infer some meaning without breaking the encryption  Attempt to deduce the key  Attempt to find weaknesses in the implementation or environment of use of encryption  Attempt to find general weaknesses in an encryption algorithm

Breakable Encryption  An encryption algorithm is called breakable when, given enough time and data, an analyst can determine the algorithm  May be impractical  A 25-character message of just uppercase letters has (10 35 ) possible decipherments. A computer performing operations/sec would take years

Cryptoanalysis of Substitution Ciphers  Brute force would require trying checking 26! permutations which at one permutation per microsecond would take over a thousand years  Look for short words, words with repeated patterns, common first and last letters  Look at frequency distributions  Could reduce time to hours

Cryptoanalysis of Transposition Algorithms  Compute letter frequencies of ciphertext; if appear with normal frequency, then assume a transposition algorithm was used  By shifting text, look for common digrams (e.g EN)and trigrams (e.g. ENT)