Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
13-1 Last time Security in Networks Network Security Controls Firewalls Honeypots Intrusion Detection Systems.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
CSCI 5857: Encoding and Encryption
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
Introduction to Basic Crypto Schemes
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Lecture 4 Page 1 CS 136, Spring 2009 Introduction to Cryptography CS 136 Computer Security Peter Reiher April 9, 2009.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Chapter 2 Basic Encryption and Decryption
IT443 – Network Security Administration Instructor: Bo Sheng
CH15 –Security & Crypto.
Columnar Transposition
Basic Encryption Methods
One time pad & Many Time pad
Basic Encryption Methods
Presentation transcript:

Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT

Agenda of Classical Crypto Terms related to Crypto Simple Substitution Cipher Double Transposition Cipher One-Time Pad Codebook Cipher Conclusion

Terms related to Crypto Cryptology: art and science of making and breaking “secret codes.” Cryptography: making of “secret codes.” Cryptanalysis: breaking of “secret codes.” Crypto is a synonym for any or all of the above (and more).

Simple Substitution Cipher Ciphertext: substitute the letter of the alphabet (n) places ahead of the Plaintext. Plaintext: substitute the letter of the alphabet (n) places backward of the Ciphertext. n {0, 1, 2,…….,25} (n) acts as Key Ex: if (n=3) then

Simple Substitution Cipher Attack – Exhaustive key search? – A Long keys, Max = 26! ≈ 2 88 possible keys – It would take 8900 millennia to exhaust Key Size (bits) Number of Alternative Keys Time required at 10 6 Decryption/µs = 4.3 x milliseconds = 7.2 x hours = 3.4 x x years = 3.7 x x years

Another possible attack Compare with English letters frequency counts Ex: “E” is the most common Same, try and guess, but more clever!

Double Transposition Cipher Transpose 2 times Thwart learning from statistical information

One Time Pad (OTP) OTP strengths: – not easy to break if key is genuinely random – the cipher text is likewise completely random and so cannot be broken – not only function with 26 alphabets, but also 256 ASCII characters or other set. – also use XOR function OTP weakness: – Key need to have same length as Plaintext so data to send is double making the traffic of network become slow – Key can be intercepted when sending – Difficulty of creating volumes of genuinely random numbers

One Time Pad (OTP) Spy named Alice want to encrypt the plaintext message Spy Bob receives Alice’s message, he decrypts it using the same key.

OTP with same key In case messages are in depth Attacker recognizes pattern of ciphertext Try to guess Plaintext (Say P1) ! Then figure out key (Say K) Then use K to decrypt other chipertext

OTP with same key

Codebook Cipher A kind of substitution cipher By words or phrases Used by Germany during WW1

Codebook Cipher

Conclusion Weak : – Simple substitute cipher: attacker can guess in ciphertext message – Codebook cipher Strong : – One time pad: is provably secure cryptosystem Attacker can’t guess or break code Random key never reused – Double Transposition Cipher Employed by modern block cipher. Which cipher to choose? – Secure – Large enough key space