Shahram Khazaei Siavash Ahmadi Fall 2015

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 10/06/2015 | pag. 2.
Classical Cryptography 1. Introduction: Some Simple Cryptosystems.
Cryptography Cryptography: art or science of keeping messages secret Cryptology: branch of mathematics that studies the mathematical foundations of cryptographic.
Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
CIS 5371 Cryptography Introduction.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Diffusion and Confusion Two properties that a good cryptosystem should have: Diffusion: change of one character in the plaintext results in several characters.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Systems of Equations as Matrices and Hill Cipher.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Terminology and classical Cryptology
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
11 The evolution of cryptologic machines. TOP: The oldest known cipher wheel, of the type described by Francis Bacon as early as 1605 and later by Thomas.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Section 2.3: Substitution Ciphers
Encryption CS110: Computer Science and the Internet.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Computer Security (CS4800)
Some of these PowerPoint pages were created by my friend Shawna Haider.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Substitution Ciphers.
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
Chapter-2 Classical Encryption Techniques.
Outline Some Basic Terminology Symmetric Encryption
Campbell R. Harvey Duke University and NBER
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Shahram Khazaei Siavash Ahmadi Fall 2015

Outline Introduction The Hill Cipher Cryptanalysis of Hill Preliminaries COA on Hill using monograms Brute-force attack on Hill Divide-and-conquer attack on Hill CRT based divide-and-conquer attack on Hill Experimental Results Main References End

Classical Cipher –Substitution –Transposition Examples: –Caesar –Vigenere square –Great –Morse Code –Pigpen –Columnar –Chinese cipher Introduction

most of them are broken not only with Known Plaintext Attacks (KPA) but also with Ciphertext Only Attacks (COA) (with existence of some redundancy in the messages) Hill is one of the classical cipher which is not broken by COA.

The Hill Cipher Invertible

Cryptanalysis of Hill

Preliminaries

: For English

Preliminaries For English

Preliminaries : For English

Preliminaries

COA on Hill using monograms Brute-force attack on Hill using monograms only A divide-and-conquer attack on Hill A CRT based divide-and-conquer attack They will find the key matrix up to an unknown permutation of its columns Improve

COA on Hill using monograms Brute-force attack on Hill using monograms only A divide-and-conquer attack on Hill A CRT based divide-and-conquer attack They will find the key matrix up to an unknown permutation of its columns The correct order of the columns can then be determined using diagram frequencies Improve

Brute-force attack on Hill

Unicity distance

Divide-and-conquer attack on Hill

CRT based divide-and-conquer attack on Hill The same procedure can be done in order to find the columns of the decryption key matrix modulo 2 and 13. Unicity distances: Now, to find a representative key modulo 26, the attack can be devised in two different ways using the CRT.

CRT based divide-and-conquer attack on Hill

Experimental Results

The Second Strategy

Experimental Results The Second Strategy Unicity distance:

Experimental Results Blue scenario: –Meaningful text Red scenario: –Real text

Main References 1. C. Christensen. Polygraphic Substitution Ciphers: The Hill Cipher, II. 20part%20II.pdf, Accessed Summer O. Grosek and P. Zajac. Automated cryptanalysis of classical ciphers. In Encyclopedia of Artificial Intelligence (3 Volumes), pages 186– L. S. Hill. Cryptography in an algebraic alphabet. In American Mathematical Monthly, pages 306– B. Hu. Introduction to Cryptology: Hill Cipher Remarks. Accessed Summer J. Overbey, W. Traves, and J. Wojdylo. On the keyspace of the hill cipher. Cryptologia, 29(1):59–72, D. E. Robling Denning. Cryptography and data security. Addison- Wesley Longman Publishing Co., Inc., 1982.

End Siavash Ahmadi