Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CLASSICAL ENCRYPTION TECHNIQUES
Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lecture 1 Overview.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Introduction to Cryptography
Chapter 2 – Classical Encryption Techniques
Cryptography Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Cryptography 11.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptography Week-6.
Cryptanalysis. The Speaker  Chuck Easttom  
History and Background Part 1: Basic Concepts and Monoalphabetic Substitution CSCI 5857: Encoding and Encryption.
Lecture 18 Page 1 CS 111 Spring 2015 Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 Operating Systems.
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Lecture 23 Symmetric Encryption
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004.
Lecture 3 Page 1 CS 136, Fall 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Chapter 2 Symmetric Encryption.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
Lecture 4 Page 1 CS 136, Spring 2009 Introduction to Cryptography CS 136 Computer Security Peter Reiher April 9, 2009.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 3 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Cryptography Much of computer security is about keeping secrets
Outline Desirable characteristics of ciphers Uses of cryptography
Basic Encryption Methods
Outline Desirable characteristics of ciphers Stream and block ciphers
CSCI-235 Micro-Computer Applications
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Outline What is data encryption? Cryptanalysis
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Outline What is data encryption? Cryptanalysis
Outline What is data encryption? Cryptanalysis
Outline Using cryptography in networks IPSec SSL and TLS.
Outline What is data encryption? Cryptanalysis
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

Lecture 3 Page 2 CS 236 Online Outline What is data encryption? Cryptanalysis Basic encryption methods –Substitution ciphers –Permutation ciphers

Lecture 3 Page 3 CS 236 Online Introduction to Encryption Much of computer security is about keeping secrets One method is to make the secret hard for others to read While (usually) making it simple for authorized parties to read

Lecture 3 Page 4 CS 236 Online Encryption Encryption is the process of hiding information in plain sight Transform the secret data into something else Even if the attacker can see the transformed data, he can’t understand the underlying secret

Lecture 3 Page 5 CS 236 Online Encryption and Data Transformations Encryption is all about transforming the data One bit or byte pattern is transformed to another bit or byte pattern Usually in a reversible way

Lecture 3 Page 6 CS 236 Online Encryption Terminology Encryption is typically described in terms of sending a message –Though it’s used for many other purposes The sender is S The receiver is R And the attacker is O

Lecture 3 Page 7 CS 236 Online More Terminology Encryption is the process of making message unreadable/unalterable by O Decryption is the process of making the encrypted message readable by R A system performing these transformations is a cryptosystem –Rules for transformation sometimes called a cipher

Lecture 3 Page 8 CS 236 Online Plaintext and Ciphertext Plaintext is the original form of the message (often referred to as P) Transfer $100 to my savings account Ciphertext is the encrypted form of the message (often referred to as C) Sqzmredq #099 sn lx rzuhmfr zbbntms

Lecture 3 Page 9 CS 236 Online Very Basics of Encryption Algorithms Most algorithms use a key to perform encryption and decryption –Referred to as K The key is a secret Without the key, decryption is hard With the key, decryption is easy

Lecture 3 Page 10 CS 236 Online Terminology for Encryption Algorithms The encryption algorithm is referred to as E() C = E(K,P) The decryption algorithm is referred to as D() –Sometimes the same algorithm as E() The decryption algorithm also has a key

Lecture 3 Page 11 CS 236 Online Symmetric and Asymmetric Encryption Systems Symmetric systems use the same keys for E and D : P = D(K, C) Expanding, P = D(K, E(K,P)) Asymmetric systems use different keys for E and D: C = E(K E,P) P = D(K D,C)

Lecture 3 Page 12 CS 236 Online Characteristics of Keyed Encryption Systems If you change only the key, a given plaintext encrypts to a different ciphertext –Same applies to decryption Decryption should be hard without knowing the key

Lecture 3 Page 13 CS 236 Online Cryptanalysis The process of trying to break a cryptosystem Finding the meaning of an encrypted message without being given the key To build a strong cryptosystem, you must understand cryptanalysis

Lecture 3 Page 14 CS 236 Online Forms of Cryptanalysis Analyze an encrypted message and deduce its contents Analyze one or more encrypted messages to find a common key Analyze a cryptosystem to find a fundamental flaw

Lecture 3 Page 15 CS 236 Online Breaking Cryptosystems Most cryptosystems are breakable Some just cost more to break than others The job of the cryptosystem designer is to make the cost infeasible –Or incommensurate with the benefit extracted

Lecture 3 Page 16 CS 236 Online Types of Attacks on Cryptosystems Ciphertext only Known plaintext Chosen plaintext –Differential cryptanalysis Algorithm and ciphertext –Timing attacks In many cases, the intent is to guess the key

Lecture 3 Page 17 CS 236 Online Ciphertext Only No a priore knowledge of plaintext Or details of algorithm Must work with probability distributions, patterns of common characters, etc. Hardest type of attack

Lecture 3 Page 18 CS 236 Online Known Plaintext Full or partial Cryptanalyst has matching sample of ciphertext and plaintext Or may know something about what ciphertext represents –E.g., an IP packet with its headers

Lecture 3 Page 19 CS 236 Online Chosen Plaintext Cryptanalyst can submit chosen samples of plaintext to the cryptosystem And recover the resulting ciphertext Clever choices of plaintext may reveal many details Differential cryptanalysis iteratively uses varying plaintexts to break the cryptosystem –By observing effects of controlled changes in the offered plaintext

Lecture 3 Page 20 CS 236 Online Algorithm and Ciphertext Cryptanalyst knows the algorithm and has a sample of ciphertext But not the key, and cannot get any more similar ciphertext Can use “exhaustive” runs of algorithm against guesses at plaintext Password guessers often work this way Brute force attacks – try every possible key to see which one works

Lecture 3 Page 21 CS 236 Online Timing Attacks Usually assume knowledge of algorithm And ability to watch algorithm encrypting/decrypting Some algorithms perform different operations based on key values Watch timing to try to deduce keys Successful against some smart card crypto Similarly, observe power use by hardware while it is performing cryptography