Download presentation
Presentation is loading. Please wait.
1
An Introduction to Cryptography
CS 41 GW Poorvi Vora
2
The Greeks Used a rod with a piece of cloth draped around it.
Could be decrypted by draping the cloth around a rod of the same size. Other size rods could not be used. The rod was the key to the cipher 4/10/2019 Spr04/GWU/Vora
3
The Caesar Cipher A B C D E D E F G H ….
Easily decrypted, key is fixed. Even with varying key is easily decrypted. 4/10/2019 Spr04/GWU/Vora
4
Substitution cipher A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C J M Z U V Y W RDBU N J O X A E S L P T F G H I A letter goes to another one. Each time a letter appears in the message it encrypts to the same letter in the ciphertext 4/10/2019 Spr04/GWU/Vora
5
Substitution cipher – encrypted message
vqwfcqaorqdrwfrfsfeojgjolkqsvirwgicfrquqnbibrwqbwqqjaxslqomuqnbfbiaykqxbqjwfbrobrojqfadrfzuvirwgxlkizuqnboaknrvouqnbfjqaqqdqdgqjxbqjoaqgxlkizfadoaqgjicfrqkqrxbbqqvwfrdimmejqazqrwibsfuqbiarwqaxslqjomuqnbaqqdqd 4/10/2019 Spr04/GWU/Vora
6
Frequency of occurence
Ciphertext q 37 b 16 r 16 f 14 a 13 i 11 j 11 o 11 w 10 d 8 x 7 u 7 n 6 English (every 1000) E 127 T 91 A 82 O 75 I 70 N 67 S 63 H 61 R 60 D 43 L 40 C 28 k 6 g 6 l 5 s 5 v 5 m 4 z 4 c 3 e 2 y 1 h 0 t 0 p 0 U 28 M 24 W 23 F 22 G 20 Y 20 P 19 B 15 V 10 K 8 J 2 Q 1 X 1 Z 1 4/10/2019 Spr04/GWU/Vora
7
Digram/Trigram occurence
TH HE IN ER AN RE ED ON ES ST EN AT Trigram THE ING AND HER ERE ENT THA NTH WAS ETH FOR DTH TO NT HA ND OU EA NG AS OR TI IS ET IT AR TE SE HI OF 4/10/2019 Spr04/GWU/Vora
8
Decrypted plaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y Z R F L Z D Q M Y W I E U K S A O G T J B R X C V H N P J WE HAVE NOTED THAT A MAJOR PROBLEM WITH PRIVATE KEYS IS THE SHEER NUMBER OF KEYS A SINGLE USER HAS TO STORE AND TRACK. WITH PUBLIC KEYS ONLY TWO KEYS ARE NEEDED PER USER ONE PUBLIC AND ONE PRIVATE. LET US SEE WHAT DIFFERENCE THIS MAKES IN THE NUMBER OF KEYS NEEDED. 4/10/2019 Spr04/GWU/Vora
9
Vernam Cipher Used by English in WWII
ESCAPE BY THE ROUTE THROUGH BELGRADE bababl ac ksh eepha veyouan ywoolyes FSDAQP BA DX……. Replaced by pieces of silk hidden in socks. Burnt after use. 4/10/2019 Spr04/GWU/Vora
10
Modern Cryptography Need to design ciphers so that breaking is hard even for the computer Require Mathematics, Algorithms, and Theory of Complexity 4/10/2019 Spr04/GWU/Vora
11
The problems modern crypto addresses
Confidentiality/secrecy/privacy How to keep a message secret so it can be read only by a chosen person Integrity How to determine a string of symbols has not been changed since it was created, and that it originated from a particular entity 4/10/2019 Spr04/GWU/Vora
12
Research Topics
13
Digital Media
14
Application: Robust, imperceptible watermarking Prevention of digital media piracy
Physical media piracy Quality deterioration with each copy Distribution visible and expensive, legal enforcement easier Digital media piracy Perfect copies Distribution unsupervised; no clear laws; no means of enforcing them, most important no easy way of locating distribution centers Current OS and digital copies: Any object that needs a PC for viewing can be copied perfectly through file copies, and imperfectly through screen captures 4/10/2019 Spr04/GWU/Vora
15
Copyright protection with a robust, invisible watermark
Owner looks for the watermark - either all over the Internet, or on an individual picture that she suspects was stolen from her. Original picture to be sold on the Internet contains an invisible mark: If she finds it with/being sold by an unauthorized person, she could seek legal recourse. `watermark’ - something that identifies owner or copyright owner All existing methods can be busted by free software available on the Internet; it is not a preventive measure, it merely aids in finding the culprit after the fact; 4/10/2019 Spr04/GWU/Vora
16
Watermark should survive accidental attacks
Original, legal, buyer performs operations on image - sharpening, brightness/colour adjustment, filtering, cropping, resizing, rotation - while retaining perceptual quality of image. Watermark should survive such operations - called accidental attacks - and should remain invisible; ie.e watermark should be robust 4/10/2019 Spr04/GWU/Vora
17
Image quality degrades if watermark removed (intentional attack)
Illegal reseller trys to destroy watermark before reselling. Watermark should damage perceptual quality of image when being removed (detection procedure does not detect the existence of a watermark) or sufficiently altered (the information contained in it is altered sufficiently - identity of owner is changed). Intentional attack. 4/10/2019 Spr04/GWU/Vora
18
User without decryption sees garbage
Encapsulated Content: Better Security, More Expensive – Prevents Unauthorized Use Content encrypted during transmission and in storage on buyer’s local disk User without decryption sees garbage aCd9Tof3trefgu Evariste Galois aCd9Tof3trefgu Content decrypted in hardware or software to allow viewing and manipulation. Pay per view possible Evariste Galois 4/10/2019 Spr04/GWU/Vora
19
Classification of Rights Management Systems
Complexity of access specifications Low Medium High Personal Family Multimedia Archives Personal publishing using templates Personal metadata? Lessons/hw by students and teachers Mixed Wedding videos professionally filmed Aggregated Personal metadata? Type of Content (Read only) Entertainment Magazine subscriptions Commercial Photography Publishing Press Ebooks Scientific publishing Commercial Use password protection Use secure encapsulation Use secure encapsulation + watermarking 4/10/2019 Spr04/GWU/Vora
20
4/10/2019 Spr04/GWU/Vora
21
Was this image changed in any way after it was captured?
Another problem: Authentication of digital media given cheap access to capable processing systems Was this image changed in any way after it was captured? 4/10/2019 Spr04/GWU/Vora
22
Authentication with a fragile, invisible watermark
In a court of law, a judge checks the watermark hidden in the presented image to see if it is associated in the same way with each pixel of the image presented as evidence Original picture contains an invisible mark inserted at `source’: If she finds that the hidden watermark is not what it should be for the presented image, the presented image is not authentic and has been changed since it was obtained. `watermark’ - something that is associated with the value of each pixel of the image 4/10/2019 Spr04/GWU/Vora
23
Auctions and Privacy
24
Privacy Cost When we re-encounter vendors online, they may use information from previous encounters against us If amazon knows I’m a crypto fan, why not charge me higher for crypto books? Would I pay higher on average if they knew stuff about me? If so, would that be an economic value to privacy in commercial interactions? 4/10/2019 Spr04/GWU/Vora
25
eBay example Highest Bids for Auction of Annexation Drone
Bid Order eBay Identity Bid Value b1 erelfir 13.50 b2 les-letwin 13.00 b3 daredevilgo 5.55 b4 jan1923 5.09 4/10/2019 Spr04/GWU/Vora
26
eBay example Highest Bids for Auction of Annexation Drone
Bid Order eBay Identity Bid Value Price Non-strategic b1 erelfir 13.50 b2 les-letwin 13.00 b3 daredevilgo 5.55 b4 jan1923 5.09 - 4/10/2019 Spr04/GWU/Vora
27
eBay example Highest Bids for Auction of Annexation Drone
Bid Order eBay Identity Bid Value Price Non-strategic Price Auctions b1 erelfir 13.50 b2 les-letwin 13.00 5.60 b3 daredevilgo 5.55 5.09 b4 jan1923 - 4/10/2019 Spr04/GWU/Vora
28
eBay example Highest Bids for Auction of Annexation Drone
Bid Order eBay Identity Bid Value Price Non-strategic Price Auctions Strategic b1 erelfir 13.50 5.12 b2 les-letwin 13.00 5.60 5.11 b3 daredevilgo 5.55 5.09 5.10 b4 jan1923 - 4/10/2019 Spr04/GWU/Vora
29
Electronic Voting
30
Receipts for secure transactions
You get a receipt when you use the ATM You can check your bank statement to ensure the transaction was recorded correctly Why don’t you get a receipt when you vote, so you can check your vote was correctly counted? You could use the receipt to sell your vote The mafia could force you to prove you voted a certain way 4/10/2019 Spr04/GWU/Vora
31
Integrity during ballot casting: paper receipts
Challenge: allow the voter to keep a record of her vote so she can determine that it has been counted correctly, yet not prove how she voted This record on paper, so “computer” problems will not destroy the record 4/10/2019 Spr04/GWU/Vora
32
The receipt can be encrypted
4/10/2019 Spr04/GWU/Vora
33
Key 4/10/2019 Spr04/GWU/Vora
34
Overlaid 4/10/2019 Spr04/GWU/Vora
35
Voter chooses The voter chooses one of the two layers shown and takes it home All encrypted receipts are displayed on the Web Voter checks to see her receipt is there. Equivalent to checking her receipt is in the ballot box before counting starts. 4/10/2019 Spr04/GWU/Vora
36
Counting The encrypted votes are passed to several trustees (such as representatives of the candidates, the Electronic Frontier Foundation, a government representative, etc.) Each trustee does a partial decryption and shuffles the receipts Finally, decrypted receipts (i.e. votes) are counted. Trustees can be audited 4/10/2019 Spr04/GWU/Vora
37
GW implementation Several
A recent implementation by GW grad student Stefan Popoveniuc and students from UMBC and Univ. of Ottawa won the Student Voting System competition and has been used for student government elections at Univ. of Ottawa 4/10/2019 Spr04/GWU/Vora
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.