Scytale THIS IS A SCYTALE!!! SPARTA!!! One of the earliest encryption devices was the Spartan Scytale (c 500 B.C.) which consisted of a ribbon wrapped.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
CMSC 414 Computer (and Network) Security Lecture 4 Jonathan Katz.
Classic Crypto Classic Crypto 1.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Sigaba 1 Sigaba Sigaba 2 Sigaba  Used by Americans during WWII o And afterwards (to about 1948)  Never broken o Germans quit collecting, considered.
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
Lecture 1 Overview.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
Classical Encryption Techniques
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Cryptography
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Classical Encryption Techniques
Lecture 2 Overview.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Fall 2006CS 395 Computer Security1 Cryptography Well, a gentle intro to cryptography.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cis 4930 Introduction to cryptography
Computer System Security CSE 5339/7339
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
Lec. 5 : History of Cryptologic Research II
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
CSCI 5857: Encoding and Encryption
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Introduction to Ciphers Breno de Medeiros. Cipher types From “Cipher”, Wikipedia article.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Data Security and Encryption (CSE348) 1. Lecture # 4 2.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
Lecture 23 Symmetric Encryption
Section 2.3: Substitution Ciphers
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 4 Page 1 CS 236 Online Basic Encryption Methods Substitutions –Monoalphabetic –Polyalphabetic Permutations.
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 4. Traditional and Modern.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
Cryptography and Network Security
Cryptography.
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Cryptography II Jagdish S. Gangolly School of Business
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Scytale

THIS IS A SCYTALE!!!

SPARTA!!! One of the earliest encryption devices was the Spartan Scytale (c 500 B.C.) which consisted of a ribbon wrapped around a dowel of a particular diameter and length. The secret message was written on the ribbon while the ribbon was wrapped on the dowel. The ribbon was then removed and transported to the other field commander who had an identical dowel. If the ribbon was intercepted it look like jumble of letters. Officially this kind of encryption would be called a "transposition" cipher.

Scytale Cipher An early Greek transposition cipher a strip of paper was wound round a staff, then the message was written along staff in rows. When paper removed, were left with a strip of seemingly random letters. Not very secure as key was width of paper & staff

Scytale Spartans, circa 500 BC Wind strip of leather around a rod Write message across the rod T H E T I M E H A S C O M E T H E W A L R U S S A I D T O T A L K O F M A N Y T H I N G S When unwrapped, letters are scrambled TSATAHCLONEORTYTMUATIESLHMTS…

Scytale Suppose Alice and Bob use Scytale to encrypt a message – What is the key? – How hard is it for Trudy to break without key? Suppose many different rod diameters are available to Alice and Bob… – How hard is it for Trudy to break a message? – Can Trudy attack messages automatically—without manually examining each putative decrypt?

Columnar Transposition Put plaintext into rows of matrix then read ciphertext out of columns For example, suppose matrix is 3 x 4 – Plaintext: SEETHELIGHT – Ciphertext: SHGEEHELTTIX Same effect as Scytale – What is the key?

Keyword Columnar Transposition For example – Plaintext: CRYPTOISFUN – Matrix 3 x 4 and keyword MATH – Ciphertext: ROUPSXCTFYIN What is the key? How many keys are there?

Keyword Columnar Transposition How can Trudy cryptanalyze this cipher? Consider the ciphertext VOESA IVENE MRTNL EANGE WTNIM HTMLL ADLTR NISHO DWOEH Matrix is n x m for some n and m Since 45 letters, n  m = 45 How many cases to try? How will Trudy know when she is correct?

Keyword Columnar Transposition The ciphertext is VOESA IVENE MRTNL EANGE WTNIM HTMLL ADLTR NISHO DWOEH If encryption matrix was 9 x 5, then… 

Cryptanalysis: Exhaustive key search – Always an option for Trudy If keyspace is too large, such an attack will not succeed in a reasonable time – Or it will have a low probability of success A large keyspace is necessary for security But, large keyspace is not sufficient…

Double Transposition Plaintext: ATTACK AT DAWN Permute rows and columns   Ciphertext: XTAWXNATTXADAKC  Key? o 5 x 3 matrix, perms (2,4,0,3,1) and (0,2,1) columns 012 row 0 ATT row 1 ACK row 2 XAT row 3 XDA row 4 WNX columns 021 row 2 XTA row 4 WXN row 0 ATT row 3 XAD row 1 AKC

Double Transposition How can Trudy attack double transposition? Spse Trudy sees 45 -letter ciphertext Then how many keys? – Size of matrix: 3 x 15, 15 x 3, 5 x 9, or 9 x 5 – A lot of possible permutations! 5!  9!  2 25 and 3!  15!  2 42 Size of keyspace is greater than 2 43 Is there a shortcut attack?

Double Transposition Shortcut attack on double transposition? Suppose ciphertext is ILILWEAHREOMEESANNDDVEGMIERWEHVEMTOSTTAONN TNH Suppose Trudy guesses matrix is 9 x 5 Then Trudy has:  Now what?  Try all perms? 5!  9!  2 25  Is there a better way? column01234 row 0 ILILW row 1 EAHRE row 2 OMEES row 3 ANNDD row 4 VEGMI row 5 ERWEH row 6 VEMTO row 7 STTAO row 8 NNTNH

Double Transposition Shortcut attack on double transposition? Trudy tries “columns first” strategy  Now what? Permute columns  column01234 row 0 ILILW row 1 EAHRE row 2 OMEES row 3 ANNDD row 4 VEGMI row 5 ERWEH row 6 VEMTO row 7 STTAO row 8 NNTNH column24013 row 0 IWILL row 1 HEEAR row 2 ESOME row 3 NDAND row 4 GIVEM row 5 WHERE row 6 MOVET row 7 TOSTA row 8 THNNN

Transposition Ciphers Also known as permutation ciphers Core idea: hide the message by rearranging the letter order without altering the actual letters used Can recognize these since have the same frequency distribution as the original text Very Simple Example: Mirror Cipher (write message backwards). Obviously not very secure – But what about mirror image in Russian?!

Row Transposition Ciphers Group the message and shuffle letters within each group More formally write letters across rows, then reorder the columns before reading off the rows Always have an equivalent pair of keys (Read vs Write)

Cracking Transposition Ciphers There are many more transposition ciphers of increasing complexity. Cracking them involves educated guessing at row and column arrangements with much trial and error BUT, there is software that will do a lot of this stuff for you (and it’s out there and freely available) Bottom line, transposition ciphers are no more secure than pure substitution ciphers. (With the exception of the one-time pad, of course).

Increasing Cipher Security Ciphers based on just substitutions or transpositions are not secure Have seen how these can be attacked because they do not sufficiently obscure the underlying language structure Hence consider using several ciphers in succession to make cryptanalysis harder, but: – two substitutions are really only one more complex substitution – two transpositions are really only one more complex transposition – BUT a substitution followed by a transposition makes a new much harder cipher

king/transposition-ciphers.php king/transposition-ciphers.php