Computer Security coursework 3 Dr Alexei Vernitski.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Security coursework 3 (part 2) Dr Alexei Vernitski.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 23 Symmetric Encryption
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
CSCI 5857: Encoding and Encryption
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
Computer Security coursework 2 Dr Alexei Vernitski.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Improving Encryption Algorithms Betty Huang Computer Systems Lab
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Security coursework 1 Dr Alexei Vernitski.
LUCIFER hell's favorite cipher.... By: OUTSOURCED Trevin Maerten Eitan Romanoff.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Computer Security coursework 3 (part 1) Dr Alexei Vernitski.
Fifth Edition by William Stallings
Symmetric Encryption Lesson Introduction ●Block cipher primitives ●DES ●AES ●Encrypting large message ●Message integrity.
Chapter 2 (C) –Advanced Encryption Standard. Origins clearly a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Network Security. Three tools Hash Function Block Cipher Public Key / Private Key.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Triple DES.
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Lecture 2.2: Private Key Cryptography II
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
DES (Data Encryption Standard)
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Advanced Encryption Standard
Stream Cipher Structure
Presentation transcript:

Computer Security coursework 3 Dr Alexei Vernitski

Aims of the coursework Learn more about: – Block ciphers and the techniques used in modern ciphers, especially AES – Working with bits, bytes and ASCII codes This is useful not only for understanding computer security, but for any career in information technology

A simple cipher based on AES A block is 8 bits (or one byte, or one ASCII character) A key is 8 bits (or one byte)

Nibbles

Elements of the cipher Bitwise XOR of the block and the key Replacing each nibble in a block by another nibble according to a substitution table (sometimes called an S-box) Swapping the last two nibbles of the block Adding the last two nibbles to the first two nibbles

Bitwise XOR This is simply a bitwise XOR of the block and the key

S-box When encrypting, substitute the value of each nibble of the block as follows: 0 becomes 1, 1 becomes 3, 2 becomes 0, 3 becomes 2. When decrypting, substitute the value of each nibble of the block in the opposite direction, as follows: 0 becomes 2, 1 becomes 0, 2 becomes 3, 3 becomes 1.

Swapping two nibbles

Adding nibbles

Encryption algorithm Bitwise XOR of the block and the key Use the S-box substitution on each nibble of the block Swap the last two nibbles of the block Add the last two nibbles to the first two Bitwise XOR of the block and the key Use the S-box substitution on each nibble of the block Swap the last two nibbles of the block Bitwise XOR of the block and the key

Decryption algorithm Bitwise XOR of the block and the key Swap the last two nibbles of the block Use the S-box substitution on each nibble of the block Bitwise XOR of the block and the key Subtract the last two nibbles from the first two Swap the last two nibbles of the block Use the S-box substitution on each nibble of the block Bitwise XOR of the block and the key

A cipher The following list of numbers is a text encrypted with the cipher: [132, 201, 141, 74, 140, 94, 141, 140, 141, 15, 31, 164, 90, 229, 201, 141, 78, 114, 241, 217, 141, 217, 140, 180, 141, 164, 51, 141, 188, 221, 31, 164, 241, 177, 141, 140, 51, 217, 141, 201, 229, 152, 141, 78, 241, 114, 78, 102, 94, 141, 74, 152, 31, 152, 141, 94, 201, 31, 164, 102, 164, 51, 90, 141, 201, 229, 164, 31, 201, 152, 152, 51, 115] The key used for encryption is 84

Your task Implement the decryption algorithm in Python and decrypt the cipher on the previous slide.

What to submit? Submit just one Python file with your code which decrypts the cipher and outputs the decrypted plaintext.

How shall I mark? If your decryption is correct, you get 100%. If not everything is correct, I shall look at your code and allocate some partial marks according to how many parts of the decryption algorithms you have implemented correctly.

Programming I attempted the coursework and wrote my solution in Python – My code (for both encryption and decryption) is approximately 70 lines long – It took me approximately 1 hour to write it – You may need up to 3 hours to complete the assignment if you need to learn how to use bitwise operations in Python and how to work with modular arithmetic

Labs Before the submission date of each piece of coursework, we shall have a lab on Thursday The purpose of the lab is: – to help you to write your code, in case you have any difficulties – to give you an opportunity to demonstrate your code to me

No collaboration This is an individual assignment I shall look for signs of collaboration and plagiarism