Cryptography (Traditional Ciphers)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSE331: Introduction to Networks and Security Lecture 17 Fall 2002.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Chapter 2 Basic Encryption and Decryption (part B)
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
Classical Encryption Techniques
Network Security Chapter
CSE 651: Introduction to Network Security
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Chapter Ten The Application and Presentation Layers.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
CSCI 5857: Encoding and Encryption
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Modern Symmetric-key Ciphers
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
EEC 688/788 Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter Two: Classic Cryptography
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Substitution Ciphers.
CSE565: Computer Security Lecture 2 Basic Encryption & Decryption
Columnar Transposition
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Cryptography.
Cryptography II Jagdish S. Gangolly School of Business
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Cryptography (Traditional Ciphers) Week-7

Substitution Ciphers Monoalphabetic Substitution Ciphers An improvement over the Caesar cipher Change/replace one symbol with another Obscures the meaning of a symbol (confusion) P : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C : Z X Y W U V T R S Q O P N L M K I J H F G E C D B A Each symbol in the plain alphabet P maps onto some other symbol in the cipher alphabet C

Substitution Ciphers Monoalphabetic Substitution Ciphers Effectively, we are using a 26-character key (26-letter string) corresponding to the alphabet In how many ways can all the 26-character be rearranged (permutation)? Brute force attack Not feasible: 26! (4 x 1026 ) – Enormous the key space At 1 nsec (billionth of a second) per solution, a computer would take ~10 billion years (1010) to try all the keys

Substitution Ciphers 4 x 1026 Incomprehensible!

Substitution Ciphers Cryptanalysis Attack Basic attack takes advantage of statistical properties of English: In English, e (most common letter) followed by t, o, a, n, i, etc. Common two-letter combinations (digrams): th, in, er, re, an Common three-letter combinations (trigrams): the, ing, and, ion

Substitution Ciphers Cryptanalysis Attack First, count relative frequencies of all letters in the ciphertext Second, tentatively assign most common letter to e, next common one to t and so on Third, find common trigrams of the form [t ? e], strongly suggesting that ? is h Fourth, check if [t h ? t] occurs frequently, suggesting that ? stands for a

Substitution Ciphers English Letter Frequencies

Substitution Ciphers Multiple Substitution Two or more substitution ciphers used in series Letters 1, 3, 5 .. encrypted under cipher (or key) 1; Letter 2, 4, 6 encrypted cipher (or key) 2 etc.

Substitution Ciphers Multiple Substitution - Example q r s t u v w x y z 13 14 15 16 17 18 19 20 21 22 23 24 25 I THINK THAT I SHALL NEVER SEE Under cipher 1: I H N T A I H L N V R E Under cipher 2: T I K H T S A L E E S E Cipher 1 = n + 3; cipher 2 = n + 5 Ciphertext 1 : L K Q W D L K O Q Y U H Ciphertext 2 : Y N P M Y X F Q J J X J Result: LYKNQPWMDYLXKFOQQJYJUXHJ

Transposition Ciphers Various Types Plaintext symbols are simply reordered and not replaced like substitution cipher (diffusion) Each letter represents itself keeping the frequency distribution intact Simple Example Plaintext : CAT Possible Ciphertext: { CTA, ACT, ATC, TCA, TAC }

Transposition Ciphers Columnar Transposition Simple Example Plaintext written in fixed-length rows, read off by columns Example: SAM PLE becomes SPALME Other more complex Examples Use of a key to number the columns. “we lost the war” 4 3 1 2 W E L O S T T H E W A R Result: Lta ohr etw wse

One-Time Pad The only unbreakable cipher (Theoretically) Example: First, convert the plaintext message into a bit string (ASCII) e.g. “ I love you.” Second, choose random bit string key (key pad) with same length as the plaintext Third, compute XOR (eXclusive OR) of the two strings, bit by bit plaintext: 1 0 0 1 0 0 1 … key pad: 1 0 1 0 0 1 0 … Ciphertext: 0 0 1 1 0 1 1 …

Book Cipher Similar to one-time pad Uses book (poem, piece of music, newspaper) to which both sender and receiver have access Starting at a predetermined place in the shared object, use the element of the object as random numbers for a on-time pad Weaknesses due to predictability in written objects, possible availability of shared objects to third party

Book Cipher Example uaopm kmkvt unhbl jmed because row M column i is u, row A column a is a, and so on.

Hardware Implementation Transposition P-Box (Permutation Box or P-Box) device Substitution S-Box (Substitution Box or S-Box) device Product Cipher Combines P-Boxes and S-Boxes

Thank You !