Cryptograpy By Roya Furmuly W C I H D F O P S 1 2 3 9 L 7.

Slides:



Advertisements
Similar presentations
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Advertisements

CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Session 4 Asymmetric ciphers.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Ref. Cryptography: theory and practice Douglas R. Stinson
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Public Encryption: RSA
RSA Exponentiation cipher
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
 8 groups of 2  5 rounds  Basic Definitions  Substitution Cryptosystems  Math  Tricky Questions  Comparing Cryptosystems  10 questions per round.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Chapter 12 Cryptography (slides edited by Erin Chambers)
CS110: Computers and the Internet Encryption and Certificates.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
HW6 due tomorrow Teams T will get to pick their presentation day in the order Teams T will get to pick their presentation day in the order Teams mostly.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Pseudo-Random Functions 1/22 Encryption as Permutation Assume cryptosystem correct and P = C If x  x’ then E K (x)  E K (x’) So, no y is hit by more.
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Symmetric-Key Cryptography
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Some Number Theory Modulo Operation: Question: What is 12 mod 9?
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Tractability & Cryptography Strange Symbiosis Points of Reference: Oskars Rieksts.
1 Information Theory Nathanael Paul Oct. 09, 2002.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.2: Affine Ciphers; More Modular Arithmetic Shift ciphers use an additive key. To increase security, we can add a multiplicative parameter. –For.
Encryption CS110: Computer Science and the Internet.
Homework #1 J. H. Wang Oct. 2, 2013.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Modular Arithmetic with Applications to Cryptography
Taehyung Kim HPC Lab. POSTECH
Cryptography Survey.
Cryptography: Basics (2)
Cryptography Survey.
Enabling Technology1: Cryptography
Classical Cryptography
Classical Ciphers – I Terminology CSCI284 Spring 2004 GWU Shift Cipher
Presentation transcript:

Cryptograpy By Roya Furmuly W C I H D F O P S L 7

What Is It? Enables two people (Alice and Bob) to communicate over an insecure channel in such a way so that an opponent (Oscar) cannot understand what is being said.

How Does It Work? n Alice encrypts the information (Plaintext), using a predetermined key, then sends the result (Ciphertext) to Bob. n Oscar cannot determine the plaintext because he doesn’t know the key. n Bob, who knows the encryption key, decrypts the ciphertext and reconstructs the plaintext.

Formal Definition A Cryptosystem is a five-tuple ( P,C,K,E,D ) P = finite set of plaintexts C = finite set of ciphertexts K = finite set of keys (keyspace) For each K K e K E and a corresponding d K D. Each e K : P C and d K : C P are functions such that d K ( e K (x))=x x P.

Observations n The encryption function e K must be injective to avoid ambiguity. i.e. if y= e K (x 1 )= e K (x 2 ) where x 1 not equal x 2 Bob doesn’t know whether y= x 1 or y= x 2 If P = C, then the encryption function is a permutation.

Protocol Choose random key K in K ( when Oscar not present or through a secure channel ). n Alice Message: x=x 1 x 2...x n where i in (1,n), x i in P encrypts each x i using encryption rule y i = e K (x i ) y=y 1 y 2 …y n n Bob uses decryption function d K (y i )=x i x=x 1 x 2...x n

Diagram Alice encrypterdecrypter Oscar key source Bob Oscar xy K x

What makes a Cryptosystem practical? 1. Encryption and Decryption functions should be efficiently computable. 2. Upon seeing ciphertext y, the opponent should be unable to determine the key K used (“security”).

Shift Cipher Let P = C = K = Z 26. e K (x)=x+K mod 26 and d K (y)=y-K mod 26 (x,y in Z 26 ) cool fact: for K=3, cryptosystem is called the Caesar Cipher.

Shift Cipher (cont’d) n We encrypt English text, by the following correspondence: A 0, B 1, …, Z 25, A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Let’s Encrypt! Let the key be K=7, encrypt: UCLA BRUINS convert letters to integers using chart: add 7 to each value, reduce mod 26: convert to sequence of integers: BJSHIYBPUZ

Let’s Decrypt! BJSHIYBPUZ convert letters to integers: subtract 7, reduce mod 26: convert to letters: UCLA BRUINS

Shift Cipher, any Good? n Nope! Fails security property. n Keyspace is very small, only 25 possible keys. n Can easily be deciphered by an exhaustive key search. n Try K=1…25, until get a text that makes sense.

Vigenere Cipher Let m>0 be fixed. Let P = C = K = (Z 26 ) m For a key K=(k 1,k 2,…k m ) define e K (x 1,x 2,…,x m )=(x 1 +k 1, x 2 +k 2,…,x m +k m ) and d K (y 1,y 2,…,y m )=(y 1 -k 1, y 2 -k 2,…,y m -k m ) *all operations done in Z 26

Let’s Encrypt! Let key=hot=(7,14,19), encrypt: SUMMER IS HERE convert to integers & “add” the keyword mod 26: ZIFTSKPGALGX

Let’s Decrypt! ZIFTSKPGALGX convert to integers and “subtract” the keyword hot=(7,14,19) mod 26: SUMMER IS HERE

Vigenere Cipher, any Good? n Better than Shift Cipher n Possible number of keys of length m is (26) m n Say m=5, then keyspace size is (26) 5 approx 1.1x10 7 n So, exhaustive key search not feasible by hand (but OK by computer).

Other Cryptosystems n Data Encryption Standard (DES) Based on permutaion of 64 bits at a time. n RSA Based on difficulty of factoring large integers into primes. n Enigma Machine with rotors that shifted letters in complicated manner.

Summary n Cryptography allows us to communicate through insecure channels. n Shift Cipher…insecure (small keyspace) n Vigenere Cipher…less insecure n Complicated Cryptosystems DES, RSA, ENIGMA

WKH HQG