Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang.

Similar presentations


Presentation on theme: "Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang."— Presentation transcript:

1 Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang

2 Contents n MODELS,GOALS,AND EARLY CIPHER SYSTEMS n THE SECRECY OF A CIPHER SYSTEM n PRACTICAL SECURITY n STREAM ENCRYPTION n PUBLIC KEY CRYPTOSYSTEMS

3 Model of a cryptographic channel Plaintext M Encipher Decipher Public channel Plaintext Cryptanalyst Key Ciphertext K K Secure channel

4 The two primary reasons for using cryptosystems in communications n (1)privacy,to prevent unauthorized persons from exacting information from the channel n (2)authentication,to prevent unauthorized persons from injecting information into the channel

5 System Goals The major requirements for a cryptosystem 1.To provide an easy and inexpensive means of encryption and decryption to authorized users in possession of the appropriate key 2.To ensure that the cryptanalyst’s task of producing an estimate of the plaintext without benefit of the key is made difficult and expensive

6 Classic Threats n Ciphertext-Only Attack n Known-Plaintext Attack n Chosen-Text Attack

7 Classic Ciphers n Caesar Cipher ex. Plaintext : N O W I S T H E T I M E : Ciphertext : Q R Z L V W K H W L P H n Polybius square. Plaintext : NOWI S T H E T I M E Ciphertext: 33 43 25 42 34 44 32 51 44 42 23 51 n Polyalphabetic cipher. Plaintext: NOWI S T H E T I M E Ciphertext: OQZMXZ O M CS X Q

8 Caesar’s alphabet with a shift of 3 Plaintext: ABCDEFGHIJKLMNOPQRSTUVWXYZ CHIPHERTEXT: DEFGHIJKLMNOPQRSTUVWXYZABC Polybius square 1 2 3 4 5 A B C D E F G H IJ K L M N O P Q R S T U V W X Y Z

9 Trithemius progressive key

10 THE SECRECY OF A CIPHER SYSTEM What is Perfect Secrecy?? Entropy and Equivocation Rate of a language and Redunancy Unicity Distance and Ideal Secrecy

11 P(M o )=1/4M0M0 0 C0C0 1 C1C1 C2C2 2 C3C3 3 P(M 1 )=1/4 M1M1 P(M 2 )=1/4 M2M2 P(M 3 )=1/4 M3M3 PlaintextCiphertext Example of perfect secrecyKey C s =T k j (M i ) S=( ) modulo-N

12 PRACTICAL SECURITY n Substitution n Permutation n Product Cipher System n The Data Encryption Standard

13 Substitution box n=3 input 2 n =8 1 1 0 output 0 1 1 2 n =8 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 input output 000 011 001 111 010 000 011 110 100 010 101 100 110 101 111 001

14 Permutation box input output 1 0 0 1 0 0 1 0 0 1

15 Individual keying capability Example of binary key 1 0 1 0 0 0 1 0 1 1 1 1 1 0 1 1 0 1 0 1 1 1 0 1 0

16

17 Initial Permutation (IP) 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 55 45 37 29 21 13 5 63 55 47 39 31 23 15 7

18

19 E-Table Bit Selection 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1

20

21 P-Table Permutation 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25

22 Final Permutation (IP -1 ) 40 8 48 16 56 24 64 32 39 7 47 15 55 23 63 31 38 6 46 14 54 22 62 30 37 5 45 13 53 21 61 29 36 4 44 12 52 20 60 28 35 3 43 11 51 19 59 27 34 2 42 10 50 18 58 26 33 1 41 9 49 17 57 25

23 Key Permutation PC-1 57 49 41 33 25 17 9 1 58 50 42 34 26 18 10 2 59 51 43 35 27 19 11 3 60 52 44 36 63 55 47 39 31 23 15 7 62 54 46 38 30 22 14 6 61 53 45 37 29 21 13 5 28 20 12 4

24 Key Schedule of Left Shifts Iteration Number of left shifts i 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 1 2 1 2 2 2 2 2 1 2 2 2 2 2 2 1

25 Key Permutation PC-2 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 45 33 48 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32

26 STREAM ENCRYPTION n Key Generation Using a Linear Feedback Shift Register n Vulnerabilities of Linear Feedback Shift Registers

27 Linear feedback shift register example feedback output x4x4 x3x3 x2x2 x1x1 Modulo-2 adder

28 PUBLIC KEY CRYPTOSYSTEMS n Signature Authentication Using a Public Key Cryptosystem n A Trapdoor One-Way Function n The Rivest-Shamir-Adelman Scheme n The Knapsack Problem n A Public Key Cryptosystem Based on a Trapdoor Knapsack

29 The important features of a public key cryptosystem n The encryption algorithm,,and the decryption algorithm,,are invertible transformations on the plaintext,M,or the ciphertext,C,defined by the key K.That is,for each K and M, n For each K, and are easy to compute. n For each K,the computation of from is computa-tionally intractable.

30 Public Key cryptosystem M Crypto machine Subscriber A Directory A- B- C-.. Crypto machine Subscriber B M

31 Signature authenticaton using a public key cryptosystem M Crypto machine A Date Crypto machine A Public channel Directory Crypto machine B Crypto machine B M Directory Signature storage

32 The Rivest-Shamir-Adelman Scheme 1.Each user chooses his own value of n and another pair of positive integers (e,d),and n=pq, =(p-1)(q-1),gcd[,d]=1, ed modulo- =1,and p,q are prime numbers. 2..The user places his encryption key the number pair (n,e),in the public directory. 3. The decryption key consists of the number pair (n,d),of which d is kept secret. 4.messages are first represented as integers in the range (0,n-1) 5.Encryption: modulo-n Decryption: modulo-n RSA

33 How to Compute e A variation of Euclid’s algorithm for computing the gcd of and d is to compute e 1.First,compute a series …... where =, =d,and = modulo-,until an =0 is found. than the gcd (, d )= 2.For each compute numbers and such that = + 3.If =1,then is the multiplicative inverse of modulo-.If is a negative number, the solution is +

34 The Knapsack problem 1.Let us express the knapsack problem in terms of a knapsack vector ‘a’ and a data vector ’ x’. 2.The knapsack,S,is the sum of a subset of the components of the knapsack vector where = ax

35 Super-increasing and how to slove “x” 1.super-increasing is 2.When a is super-incresing,the solution of x is found by starting with if S (otherwise ),and continuing as follows: = where

36 A Public key Cryptosystem Based on a Trapdoor Knapsack -this scheme,also known as the Merkle-Hellman scheme method: 1.we form a super-increasing n-tuple a’,and select a prime number M such that,also select a random number,W, where 1<W<M,and we form to satisfy the following relationship: W modulo -M =1,note:the vector a’ and the number M,W, are all kept hidden. 2.we form a with the elements from a’ as: modulo-M

37 3.When a data vector x is to be transmitted,we multiply x by a, yielding the number S,which is sent on the public channel. 4.The authorized user receives S and converts it to S’ : = = 5.Since the authorized user knowns the secretly held super-increasing vector a’,he can use S’ to find x.

38 CONCLUSION 1.We have presented the basic models and goals of the cryptographic process,and looked at some early cipher systems. 2.We defined a system that can exhibit perfect secrecy. 3.We outlined the DES algorithm in detail,and we also considered the use of linear feedback shift registers(LFSR) for stream encryption systems. 4.RSA scheme,based on the product of two large prime numbers, and the Merkle-Hellman scheme,based on the classical knapsack problem.


Download ppt "Encryption and Encryption and Decryption Speaker:Tsung Ray Wang Advisor:Prof.Li-Chun Wang."

Similar presentations


Ads by Google