Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Security and Encryption (CSE348) 1. Lecture # 3 2.

Similar presentations


Presentation on theme: "Data Security and Encryption (CSE348) 1. Lecture # 3 2."— Presentation transcript:

1 Data Security and Encryption (CSE348) 1

2 Lecture # 3 2

3 Review Security concepts: – confidentiality, integrity, availability Security attacks, services, mechanisms Models for network (access) security Classical Encryption Techniques Symmetric Cipher Model 3

4 Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key cryptology - field of both cryptography and cryptanalysis 4

5 Symmetric Cipher Model 5

6 Cryptanalytic Attacks  ciphertext only only know algorithm & ciphertext, is statistical, know or can identify plaintext  known plaintext know/suspect plaintext & ciphertext  chosen plaintext select plaintext and obtain ciphertext  chosen ciphertext select ciphertext and obtain plaintext  chosen text select plaintext or ciphertext to en/decrypt 6

7 Brute Force Search Brute-force attack involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained On average, half of all possible keys must be tried to achieve success Different time is required to conduct a brute- force attack, for various common key sizes 7

8 Brute Force Search Data Encryption Standard(DES) is 56 Advanced Encryption Standard (AES) is 128 Triple-DES is 168 8

9 Brute Force Search always possible to simply try every key most basic attack, proportional to key size assume either know / recognise plaintext Key Size (bits)Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs 32 2 32 = 4.3  10 9 2 31 µs= 35.8 minutes2.15 milliseconds 56 2 56 = 7.2  10 16 2 55 µs= 1142 years10.01 hours 128 2 128 = 3.4  10 38 2 127 µs= 5.4  10 24 years5.4  10 18 years 168 2 168 = 3.7  10 50 2 167 µs= 5.9  10 36 years5.9  10 30 years 26 characters (permutation) 26! = 4  10 26 2  10 26 µs= 6.4  10 12 years6.4  10 6 years 9

10 Brute Force Search Users of an encryption algorithm can strive for is an algorithm that meets one or both of the following criteria: The cost of breaking the cipher exceeds the value of the encrypted information The time required to break the cipher exceeds the useful lifetime of the information 10

11 Brute Force Search An encryption scheme is said to be computationally secure if either of the foregoing two criteria are met Unfortunately, it is very difficult to estimate the amount of effort required to cryptanalyze ciphertext successfully 11

12 Brute Force Search For each key size, the results are shown assuming that it takes 1 μs to perform a single decryption which is a reasonable order of magnitude for today’s machines With the use of massively parallel organizations of microprocessors, it may be possible to achieve processing rates many orders of magnitude greater 12

13 Brute Force Search The final column of Table considers the results for a system that can process 1 million keys per microsecond And this performance level, DES can no longer be considered computationally secure. 13

14 Classical Substitution Ciphers In this section and the next, we examine a sampling of what might be called classical encryption techniques A study of these techniques enables us to illustrate the basic approaches to symmetric encryption used today and the types of cryptanalytic attacks that must be anticipated 14

15 Classical Substitution Ciphers The two basic building blocks of all encryption technique are substitution and transposition We examine these next. Finally, we discuss a system that combine both substitution and transposition. 15

16 Classical Substitution Ciphers where letters of plaintext are replaced by other letters or by numbers or symbols or if plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns 16

17 Caesar Cipher Substitution ciphers form the first of the fundamental building blocks Core idea is to replace one basic unit (letter/byte) with another Whilst the early Greeks described several substitution ciphers 17

18 Caesar Cipher First attested use in military affairs of one was by Julius Caesar Still call any cipher using a simple letter shift a caesar cipher, not just those with shift 3. 18

19 Caesar Cipher earliest known substitution cipher replaces each letter by 3rd letter on example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB 19

20 Caesar Cipher meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB m n o P e f g H t u v W m n o P e f g H 20

21 Caesar Cipher meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB a b c D f g h I t u v W e f g H r s t U 21

22 Caesar Cipher meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB t u v W h i j K e f g H 22

23 Caesar Cipher meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB t u v W o p q R g h i J a b c D 23

24 Caesar Cipher meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB p q r S a b c D r s t U t u v W y z a B (again start from a) 24

25 Caesar Cipher can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 then have Caesar cipher as: c = E(k, p) = (p + k) mod (26) p = D(k, c) = (c – k) mod (26) 25

26 Caesar Cipher This mathematical description uses modulo (clock) arithmetic. Here, when you reach Z you go back to A and start again. Mod 26 implies that when you reach 26, you use 0 instead (ie the letter after Z, or 25 + 1 goes to A or 0). Example: howdy (7,14,22,3,24) encrypted using key f (ie a shift of 5) is MTBID 26

27 Caesar Cipher can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Example: howdy (7,14,22,3,24) encrypted using key f (ie a shift of 5) is MTBID 27

28 Caesar Cipher mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Example: howdy (7,14,22,3,24) encrypted using key f (ie a shift of 5) is MTBID 7 8 9 10 11 12 14 15 16 17 18 19 22 23 24 25 0 1 3 4 5 6 7 8 24 25 0 1 2 3 (12,19,1,8,3) 28

29 Cryptanalysis of Caesar Cipher With a caesar cipher, there are only 26 possible keys of which only 25 are of any use, since mapping A to A etc doesn't really obscure the message Note this basic rule of cryptanalysis "check to ensure the cipher operator hasn't goofed and sent a plaintext message by mistake"! 29

30 Cryptanalysis of Caesar Cipher Can try each of the keys (shifts) in turn, until can recognise the original message. Do need to be able to recognise when have an original message (ie is it English or whatever) Usually easy for humans, hard for computers Though if using say compressed data could be much harder. 30

31 Cryptanalysis of Caesar Cipher Example "GCUA VQ DTGCM" when broken gives "easy to break", with a shift of 2 (key C) e f G a b C s t U y z A t u V o p Q 31

32 Cryptanalysis of Caesar Cipher Example "GCUA VQ DTGCM" when broken gives "easy to break", with a shift of 2 (key C) b c D r s T e f G a b C k l M 32

33 Cryptanalysis of Caesar Cipher  only have 26 possible ciphers A maps to A,B,..Z  could simply try each in turn  a brute force search  given ciphertext, just try all shifts of letters  do need to recognize when have plaintext  eg. break ciphertext "GCUA VQ DTGCM" 33

34 Summary have considered: – classical cipher techniques and terminology – Brute Force Cryptanalysis of Brute Force – Caesar Cipher Cryptanalysis of Caesar Cipher 34


Download ppt "Data Security and Encryption (CSE348) 1. Lecture # 3 2."

Similar presentations


Ads by Google