Download presentation
Presentation is loading. Please wait.
Published byOswald Sharp Modified over 9 years ago
1
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 3 August 26, 2004
2
Computer Science and Engineering Contents Algorithms (Revisited) Operating Systems Review Students Topics for Presentation Encryption Substitution and Transposition Ciphers
3
Computer Science and Engineering Algorithms -- revisited Hashing - Why? Hash Tables Hash Functions Insert Lookup
4
Computer Science and Engineering Applications OS -- Review OS – a program that acts as an intermediary between a user of a computer and the computer hardware. OS Hardware Users
5
Computer Science and Engineering OS -- Review OS Services Program Execution I/O Operation File System manipulation Communications Error detection Resource Allocation Accounting Protection
6
Computer Science and Engineering OS -- Review Process Memory Management
7
Computer Science and Engineering Student Presentations (15 minutes) 8/31 9/2 9/7 9/9
8
Computer Science and Engineering Main Components in Sending Messages senderreceiverMedium Intruder Block it Intercept it Modify it Fabricate an authentic looking message
9
Computer Science and Engineering Cryptography nSecret writing nDisguised data cannot be read, modified, or fabricated easily nEncryption : encoding (encipher) n plaintext cipher text P = C = C = E(P) (E = encryption rule) nDecryption : decoding (decipher) n Cipher text plaintext C = P = P = D(C) (D = decryption rule)
10
Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext
11
Computer Science and Engineering Encryption Decryption plaintext Original plaintext ciphertext EncryptionDecryption plaintext Original plaintext ciphertext Symmetric Cryptosystem Asymmetric Cryptosystem key KEKE KDKD
12
Computer Science and Engineering Cryptanalysis nHow to break an encryption! nCryptanalyst n Deduce the original meaning of the ciphertext n Determine the decryption algorithm that matches the encryption one used Breakable Encryption!
13
Computer Science and Engineering Ciphers Substitution Ciphers Substitute a character or a symbol for each character of the original message Transposition Ciphers The order of letters is rearranged (Uppercase – plaintext, lowercase – ciphertext)
14
Computer Science and Engineering Exercise wklv phvvdjh lv qrw wrr kdug wr euhdn
15
Computer Science and Engineering The Caesar Cipher -- Substitution C i = p i + 3 A d B e C f … X a Y b Z c Time complexity table search ??
16
Computer Science and Engineering Cryptanalysis of the Caesar Cipher TREATY IMPOSSIBLE wuhdwb lpsrvvleoh Break is preserved Double letters are preserved Repeated letters
17
Computer Science and Engineering Other Substitutions Permutation – Alphabet is scrambled, each plaintext letter maps to a unique ciphertext letter For example 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 1 = 1, 3, 5, 7, 9, 8, 6, 4, 2 1 (1) = 1, 1 (2) = 3, 1 (3) = 5, 1 (4) = 7, etc. Key can be used to control the permutation used to
18
Computer Science and Engineering Example ABCDEFGHIJKLMNOPQRSTUVWXYZ wordabcefghijklmnpqstuvxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ profesinalbcdghjkmqtuvwxyz
19
Computer Science and Engineering Cryptanalysis of substitution ciphers Clues Short words Words with repeated patterns Common initial and final letters …. Brute force attack (could be impossible – more than 1000 years) Knowledge of language may simplify it English E, T, O, A occur far more than J, Q, X, Z Context
20
Computer Science and Engineering Vernam Cipher EncryptionDecryption plaintextOriginal plaintext ciphertext Non-repeating series of numbers
21
Computer Science and Engineering Example Plaintext V E R N A M C I P H E R 21 4 17 13 0 12 2 8 15 7 4 17 Random numbers 76 48 16 82 44 3 58 11 60 5 48 88 Sum 97 52 33 95 44 15 60 19 75 12 52 105 Sum mod 26 19 0 7 17 18 15 8 19 23 12 0 1 Ciphertext t a h r s p i t x m a b
22
Computer Science and Engineering Transposition The letters of the message are rearranged Columnar transposition Example: THIS IS A MESSAGE TO SHOW HOW A COLMUNAR TRANSPOSITION WORKS
23
Computer Science and Engineering T H I S I S A M E S S A G E T O S H O W H O W A C O L M U N A R T R A N S P O S I T I O N W O R K S tssoh oaniw haaso lrsto imghw utpir seeoa mrook istwc nasna
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.