Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
IS 302: Information Security and Trust Week 4: Asymmetric Encryption
Modern Cryptography.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
CRYPTOGRAPHY Modern techniques. Computers and Cryptography Computers allow more sophisticated enciphering than mechanical devices Computers are faster.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Quantum Cryptography Marshall Roth March 9, 2007.
Public Encryption: RSA
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
CS Network Security Lecture 2 Prof. Katz. 9/7/2000Lecture 2 - Data Encryption2 DES – Data Encryption Standard Private key. Encrypts by series of.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Computer Science 101 Cryptography Part II
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Encryption Coursepak little bit in chap 10 of reed.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Multimedia Data Security and Cryptographic Algorithms Dr Sandra I. Woolley Electronic, Electrical.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Lecture 23 Symmetric Encryption
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
CS 4803 Fall 04 Public Key Algorithms. Modular Arithmetic n Public key algorithms are based on modular arithmetic. n Modular addition. n Modular multiplication.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptosystem
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Privacy & Security.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Some basic terminology
NET 311 Information Security
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Modern Cryptography.
Presentation transcript:

Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age

Overview of Lecture Computers and Cryptography Exclusive Or and modulo arithmetic DES – the Data Encryption Standard Key Exchange Public Key Cryptography Quantum Cryptography

The Code Book Simon Singh Fourth Estate ISBN  £ CD-ROM/Download  Examples  Animations

Cryptonomicon Novel Neal Stephenson ISBN:

General Cipher Process Plain Text Algorithm Cipher Text Algorithm Plain Text Key Encryption Decryption

Impact of Computers on Cryptography Pros  Computer can mimic any machine (Turing)  Ability to perform complicated encryption easily  Working with binary numbers rather than letters, closer to mathematical process Cons  Cryptanalysis eased  Try many keys quickly  Computer data tends to have fixed form  known plaintext attacks

Exclusive OR Output true if and only if one of its inputs true Alternative symbols  A  B, A  B Addition modulo 2 A  B = B  A (A  B)  C = C  B  A A  B  A = B Circuit Symbol AB ABAB Truth Table

DES the Data Encryption Standard Developed in 1970s Based on design of Horst Feistel, IBM Design modified by NSA Adopted as Federal Standard Nov 1976

Inside DES #1 Block cipher 64 bits of data (In/Out) 56 bits of key (7x10 16 ) 16 Rounds  XOR left 32 bits with Fiestel function (F) of right 32 bits and 48 bits of subkey  Swap left 32 and right 32 bits Decrypt by same process but with subkeys in reverse order  F LnLn RnRn L n+1 R n+1 Subkey n One round of the DES cipher

Inside DES #2 The Fiestel function (F) E – Expansion  Expand 32-bit half block to 48 bits by duplicating some bits XOR with 48 bit subkey Substitute using S- boxes  8x6bit  8x4bit Permute

DES Falls to technology 56-bit key not long enough  weakened at request of NSA  Original key length (IBM) 128 bits 1997 Competition to crack DES  Distributed internet wide attack, DESCHALL 1998 – EFF DES Cracker  Dedicated hardware  1,536 custom chips  $250,000  2 days

Successors to DES Triple DES  Apply DES 3x, different keys Blowfish, IDEA, NewDES, SAFER  64 bit data, 64/128 bit keys AES, Advanced Encryption Standard  Adopted as standard 2002  128 bits data  128/192/256 bits key

Key Exchange Still need to distribute keys Diffie, Hellman & Merkle 1976 Ralph Merkle, Martin Hellman, Whitfield Diffie (c) Chuck Painter/Stanford News Service

Alice, Bob and Eve Alice wants to send a secret message to Bob Eve is eavesdropping

Alice sends a message to Bob Alice locks up message with padlock A Alice sends locked message to Bob Bob locks up message with padlock B Bob returns message to Alice Alice removes padlock A Alice returns message to Bob Bob remove padlock B & read message

How can this work with encryption ? Padlocks: A on, B on, A off, B off Most encryption functions need to be first on, last off Use one-way functions Y x (mod P) Bob & Alice can exchange keys Inconvenient  multiple messages to exchange key

Public Key Cryptography Asymmetric Cryptography  Concept due to Diffie, 1975 Public key - Encrypts messages Private Key - Decrypts messages Suitable function discovered 1977 by Ronald Rivest, Adi Shamir, Leonard Adelman (RSA)

Rivest, Shamir, Adelman (RSA) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Communications of the ACM 21,2 (Feb. 1978),

Public Key cryptography in use 2 prime numbers p and q Public key N = p × q Easy to multiply number Difficult to factor Make N >

Public Key Cryptography Details Encryption: C = M^e ( modulo n ) Decryption: M = C^d ( modulo n ) where: M = the plain-text message expressed as an integer number. C = the encrypted message expressed as an integer number. n = the product of two randomly selected, large primes p and q. d = a large, random integer relatively prime to (p-1)*(q-1). e = the multiplicative inverse of d, that is: ( e * d ) = 1 ( modulo ( p - 1 ) * ( q - 1 ) ) The public key is the pair of numbers ( n, e ). The private key is the pair of numbers ( n, d ).

Pretty Good Privacy (PGP) RSA algorithm ‘computer hungry’ Phil Zimmerman – Pretty Good Privacy Use RSA to encrypt message key Use message key to encrypt main message using DES or successor PGP wraps up encryption, key generation etc. in easy to use package Distributed freeware 1991

Quantum Cryptography – ultimate security Based on laws of quantum mechanics Send information by using polarisation of single photons Impossible to intercept without changing 1991 – 1 st exchange ≈30cm 1995 – 23km fibre optic 2007 – ≈100km

Quantum Cryptography using polarised photons #1 Charles H. Bennet, Gilles Brassard 1984 Photons are both waves & particles Waves may be polarised (direction of e/m vector) Select random bit (0,1) & polarisation scheme (+, ×) Transmit photon according to table, record bit & scheme Scheme01 Rectilinear+  Diagonal × 

Quantum Cryptography using polarised photons #2 - receiving Different detector for schemes (+, × ) Wrong detector will give incorrect output 50% Randomly select which detector to use Record (1,0) & (+, × ) Alice tells Bob which scheme she used Bob tells Alice when he used the correct detector Discard results using wrong detector Bob & Alice share same random stream of 1,0  random key for conventional crypto

Quantum Cryptography using polarised photons #3 - Summary Alice Bit Alice scheme + × ++ ×× ++ × + × Bob scheme × + × + × + × + × ++ Bob detected Correct? Sequenc e 10101

Quantum Cryptography using polarised photons – Eve’s problem Doesn’t know scheme used by Alice or Bob Can’t detect state of photon without changing it  can’t intercept message w/o changing  can’t ‘re-transmit’ message

Review of Lecture Computers and Cryptography Exclusive Or and modulo arithmetic DES – the Data Encryption Standard Key Exchange Public Key Cryptography Quantum Cryptography