Dan Boneh Symmetric Encryption History Crypto. Dan Boneh History David Kahn, “The code breakers” (1996)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Dan Boneh Block ciphers Exhaustive Search Attacks Online Cryptography Course Dan Boneh.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Classical Cryptosystems Shift Ciphers (Caesar) y= x+k (mod 26) Affine Ciphers y=ax+b (mod 26) Vigenere Ciphers codes=(02,14,03,04,18) Substitution Ciphers.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
Announcements: We’ll attempt to grade Friday’s quizzes by end of day on Friday and leave outside my office We’ll attempt to grade Friday’s quizzes by end.
David Reed Department of Computer Science Creighton University Nifty Assignments: Encryption & the Enigma Machine.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Enigma Machine - Design Presentation Group M1 Adithya Attawar Shilpi Chakrabarti Zavo Gabriel Michael Sokolsky Digital World War II Enigma Cipher Wed.
Classical Cryptography
The Enigma Encryption System Andrew Regan CSC 290.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Index of Coincidence Meghan Emilio Professor Ralph Morelli February 18, 2004.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Dan Boneh Block ciphers The data encryption standard (DES) Online Cryptography Course Dan Boneh.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Dan Boneh Introduction History Online Cryptography Course Dan Boneh.
Classical Monoalphabetic Ciphers Day 2. Keyword cipher Select a keyword, if the keyword has any repeated letters, drop all but the first occurrence. Write.
Lecture 2 Overview.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
Introduction to Information Security Chapter II : Classical Ciphers.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Team Name: team13 Programmer: 陳則凱 b Tester: 劉典恆 b
Topic 21 Cryptography CS 555 Topic 2: Evolution of Classical Cryptography CS555.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Early Crypto Historical Events A snap shot over time.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Pseudo-Random Functions 1/22 Encryption as Permutation Assume cryptosystem correct and P = C If x  x’ then E K (x)  E K (x’) So, no y is hit by more.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Dan Boneh Block ciphers More attacks on block ciphers Online Cryptography Course Dan Boneh.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
1 Cryptanalysis Four kinds of attacks (recall) The objective: determine the key ( Herckhoff principle ) Assumption: English plaintext text Basic techniques:
Dan Boneh Stream ciphers Pseudorandom Generators Online Cryptography Course Dan Boneh.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Daphne Koller Bayesian Networks Semantics & Factorization Probabilistic Graphical Models Representation.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Daphne Koller Introduction Motivation and Overview Probabilistic Graphical Models.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
CPIS 312 Chapter Three: Symmetric KEY CRYPTO By Dr. Daniyal Alghazzawi 2011 Term 2.
@Yuan Xue Quick Review.
Context-Specific CPDs
History of Cryptography
General Gibbs Distribution
I-equivalence Bayesian Networks Representation Probabilistic Graphical
Conditional Random Fields
Probabilistic Influence & d-separation
Reasoning Patterns Bayesian Networks Representation Probabilistic
Crypto Encryption Intro to public key.
Preliminaries: Independence
Meghan Emilio Professor Ralph Morelli February 18, 2004
Presentation transcript:

Dan Boneh Symmetric Encryption History Crypto

Dan Boneh History David Kahn, “The code breakers” (1996)

Dan Boneh Symmetric Ciphers

Dan Boneh Few Historic Examples (all badly broken) 1. Substitution cipher k :=

Dan Boneh Caesar Cipher (no key)

Template vertLeftWhite1 What is the size of key space in the substitution cipher assuming 26 letters?

Template vertLeftWhite2 How to break a substitution cipher? What is the most common letter in English text? “X” “L” “E” “H”

Dan Boneh How to break a substitution cipher? (1) Use frequency of English letters (2) Use frequency of pairs of letters (digrams)

Dan Boneh An Example UKBYBIPOUZBCUFEEBORUKBYBHOBBRFESPVKBWFOFERVNBCVBZPRUBOFERVNBCVBPCYYFVUFO FEIKNWFRFIKJNUPWRFIPOUNVNIPUBRNCUKBEFWWFDNCHXCYBOHOPYXPUBNCUBOYNRVNIWN CPOJIOFHOPZRVFZIXUBORJRUBZRBCHNCBBONCHRJZSFWNVRJRUBZRPCYZPUKBZPUNVPWPCYVF ZIXUPUNFCPWRVNBCVBRPYYNUNFCPWWJUKBYBIPOUZBCUIPOUNVNIPUBRNCHOPYXPUBNCUB OYNRVNIWNCPOJIOFHOPZRNCRVNBCUNENVVFZIXUNCHPCYVFZIXUPUNFCPWZPUKBZPUNVR B36 N34 U33 P32 C26  E  T  A NC11 PU10 UB10 UN9  IN  AT UKB6 RVN6 FZI4  THE digrams trigrams

Dan Boneh 2. Vigener cipher (16’th century, Rome) k = C R Y P T O C R Y P T O m = W H A T A N I C E D A Y T O D A Y C R Y P T (+ mod 26) c = Z Z Z J U C L U D T U N W G C Q S suppose most common = “H” first letter of key = “H” – “E” = “C”

Dan Boneh 3. Rotor Machines ( ) Early example: the Hebern machine (single rotor) ABC..XYZABC..XYZ ABC..XYZABC..XYZ KST..RNEKST..RNE KST..RNEKST..RNE EKST..RNEKST..RN EKST..RNEKST..RN NEKST..RNEKST..R NEKST..RNEKST..R key

Dan Boneh Rotor Machines (cont.) Most famous: the Enigma (3-5 rotors) # keys = 26 4 = 2 18

Dan Boneh 4. Data Encryption Standard (1974) DES: # keys = 2 56, block size = 64 bits Today: AES (2001), Salsa20 (2008) (and others)

Dan Boneh END END END

Template vertLeftWhite1 Consider the weight update: Which of these is a correct vectorized implementation?

Template vertLeftWhite1 Suppose  is at a local minimum of a function. What will one iteration of gradient descent do? Leave  unchanged. Change  in a random direction. Move  towards the global minimum of J(  ). Decrease .

Template vertLeftWhite2 Fig. A corresponds to  =0.01, Fig. B to  =0.1, Fig. C to  =1. Fig. A corresponds to  =0.1, Fig. B to  =0.01, Fig. C to  =1. Fig. A corresponds to  =1, Fig. B to  =0.01, Fig. C to  =0.1. Fig. A corresponds to  =1, Fig. B to  =0.1, Fig. C to  =0.01.

Template vertLeftWhite2

Template block2x2White1 Ordering of buttons is: 13 24