HTTPCOLONSLASHSLASHRJBDOTSOCDOTPORTDOTACDOTUKSLASHPUNKSLASH RIGHTRIGHTRIGHTRIGHTDOTZIP
|
|
- Joy White
- 5 years ago
- Views:
Transcription
1 Portsmouth Cipher Step (morse code) HTTPCOLONSLASHSLASHRJBDOTSOCDOTPORTDOTACDOTUKSLASHPUNKSLASH RIGHTRIGHTRIGHTRIGHTDOTZIP Step 2 ALMPINYPMYWQECLEZIWLMJXIHFCXLVIIMXMWKSSHXSWIIXLEXCSYHMHRSXK MZIRXLEXGEIWEVAVSXILM WQIWWEKIWSZIVXASXLSYWERHCIEVWEKSMXMWKSSHXSWIIXLEXTVSKVIWW LEWFIIRQEHIMRXLIJMIPHSJ GVCTXSKVETLCWMRGIXLIJEPPSJXLIVISERIQTMVIXLMWRIBXGLETLEHELEHMR XLEXLXXTGSPSRWPEWLW PEWLVNFHSXWSGHSXTSVXHSXEGHSXYOWPEWLTYROWPEWLUAIVXCYMSTHS XDMT (caesar) WHILE JULIUS MAY HAVE SHIFTED BY THREE IT IS GOOD TO SEE THAT YOU DID NOT GIVEN THAT CAESAR WROTE HIS MESSAGES OVER TWO THOUSAND YEARS AGO IT IS GOOD TO SEE THA T PROGRESS HAS BEEN MADE IN THE FIELD OF CRYPTOGRAPHY SINCE THE FALL OF THE REOA N EMPIRE THIS NEXT CHAP HAD A HAD IN THAT HTTP COLON SLASH SLASH RJB DOT SOC DOT PORT DOT AC DOT UK SLASH PUNKSLASHQWERTYU
2 IOPDOTZIP Step 3 WKZRGZUBHXIPESXJFIGDCQWKUCLWZAYJKZGFCAUGQRITHLMQRTHERXACWI ATKLAZMFCBTXHOXREYMMJTHUSEXIHWKHJDMJVGJPSGQOXYTRINPAQEWVW CPQUCUNIJGMNIHIHEFLMGHOWIJKXYXGNIZXQJGIRNNWUGQLLVKUBWQPCAGV GROZWTIXIWHPYPWBLEWZMGHOVIJLGFEMHAZPIDWCTQBZXQTKXJHAXWHEEN XUHRUKRDJQOJEYMPDJDGWCTQBEWABHIRIWICTJHPLVKDIZKPHZSEMFCAXDK NRVRRBZCJWDXZFCUAGJCERXRMOIRSQYLRKYWBSGIQJWBVINPVMGDHILXAW DQTIWVJOUHWORVWHJFWKXDCXYXDIZKPHZWCTQB (Vigenere) GOVANBATTISTABELLASOMUSTBEROLLINGINHISGRAVECONSIDERINGHECAME UPWITHITFIRSTALASEVERYONEKNOWSTHISCIPHERASTHATOFBLAISEDEVIGNER ESNOTATTRIBUTINGITTOTHEITALIANCRYPTOGRAPHERWHOCAMECENTURIESBE FOREHIMVISITINGHTTPCOLONSLASHSLASHRJBDOTSOCDOTPORTDOTACDOTUKS LASHPUNKSLASHWILLLEAPYOUFURTHERFORWARDONTHISJOURNEYTHROUGHT IMEASSUMINGYOUADDACHARACTERSUFFIXOFBGWKZQPNDSIOAXEFCLUMTHY VRFOLLOWINGTHEFORWARDSLASH Step 4 OPAPNMRORYFRXEYLNCYNSYPEYMXYXHELDUNQWRLLOXOYUEYMOMXEXVR SIYSEYNGLROWTORXACXMHYZORYLYROGXLYSMYLSOLYROAHYWYFXCADHY TRWVLERAPEOASXSXCWONRDNLLRYUVYYLFEYLSEHUWHMXSYQYOYWYXHY MDTTQSDPBRGTWATPNGZNTQOMGMEONNUWNBQYKMATYEGTRONYZMSOGSO SRYNISQYSFISBYCGYQPYPIZTQQXFBRYWIPNBXTQSEFTOYDIAEVNPRAWDWCGR TCGINOMPLURPSZRITSGTFMRRRZTPNMTXTRTHRZWQQIHR (Bifid cipher, using the picture provided)
3 AND SO ENDS OUR TRIP THROUGH TIME THE FINAL STOP ON THIS PART OF YOUR JOURNEY CONCLUDING WITH FELIX DELASTELLE THE FRENCH AMATEUR CRYPTOGRAPHER RENOWN FOR HIS WORK IN THE FIELD OF CRYPTOGRAPHY TIME TO THINK DIFFERENTLY TO CONTINUE TO THE NEXT STAGE YOU WILL NEED CYPHER WYTWOVFLXOTHREEQ DOT ONION YOU SHOULD KEEP PORTSM SAFE FOR THE FUTURE REMEMBER TO CONVERT NUMBERS FROM STRING TO INTEGER CYPHER WYTWOVFLXOTHREEQ DOT ONION cypherwy2vflxo3q.onion Clue: portsm ('keep portsm safe for the future...') Step 5 If we go on the onion site that we've just found, we get a zip file containing a.ppm image. After looking through it, it was discovered that there was a pattern of binary for the RGB values of '2x 20x 2x' which were on top of each other. It was possible to convert the binary from left to right, top to bottom, i.e.: C o
4 n Until we get the whole message, repeated: C o n g r a t u l a t i o n s. N o w t h a t w a s n ' t s o d i f f i c u l t w a s i t? N o w o n w a r d t o t h e f i n a l s t a g e, y o u ' l l n e e d t h e s e c o n d p a r t t o t h e f i n a l p u z z l e w h i c h i s t h o o 5 a n d t h e n e x t s t a g e i s f o u n d i t p u n k s 6 a y s w 6 u j p o l. o n i o n Clue: thoo5 Step 6 The code generated from the previous step was: import binascii import struct import sys val="4cc2ae9a45702a881e2ef1a7573d0ca57c02002c19e5567f7b0d05205caa30821efbeec75a2d4c e0116b86f2a12187f6a195b3e7ac4d36b6b ebfe5e2874ca127ea1014e4a88fe2f7175c6b 216c069f af11176c043bfe64564fab10c34a37b d3aa4f0e46f078ab02bf550e21e25593e 1c34aae278c57c9ba c8f01a834b35c5fbb392a800d726edd162262f e544cc0370e75b264 fd0c3385f4a6765f8cf3e f415ed2614de0d25e59f5f60d0a5de65a326eeb0537f5ec390b92b3fe1 5b9f0e91f7db8bc6c9b0b4a bb9d93bf8ed4f308108aa1c0416ed54a4cdfa5070cbfd7987a78 a64052a8e2b48b2885fd2e69d3a9bb7a956bbae b4f26716e1e7f6f892a0f77df356b5c5f706ec 9cb4f de27b472fd32e3a5e7d6f26b63e27059afc5e6a3ba85a a4f98ffab73f 992ee631637ad f07f3f65c42a9a2ce4572fa4b6646f0aa5992acbe36e038f677f177e5783d37c27 272ea98756d b8b229f48a548994e3623a9df6f78cd612b e48371fdb10eb0b4f1de915a 32d61c86460ecc36e0ec5ca3f5a1bcf6474ac a91b01edfd0e3c92b d65a2bab10ef03 ef85b0881a1706ddf0b feeb4d814569b782bf733c346fad1" val="4cc2ae9a45702a881e2ef1a7573d0ca57c0200" # xor two messages def xor(a, b): return ''.join([chr(ord(a[i]) ^ ord(b[i])) for i in range(len(a))]) #stream cipher constants a = m = 2**31 # run the stream cipher! def generatestream(key, length): x = key stream = struct.pack(">l", x) while len(stream) < len(msg): x = (a*x) % m stream += struct.pack(">l", x)
5 return stream msg = "Test message " key = 0x # key - you need to crack this! stream = generatestream(key, len(msg)) ciphertext = xor(msg, stream) print "ciphertext: ", binascii.hexlify(ciphertext) print len(stream) print len(msg) #To decrypt: for key in range(0, 0xfffff): stream = generatestream(key, len(val)) plaintext = xor(val, stream) print plaintext The cipher is intentionally weak with the first four bytes of the key stream X-OR ing the message stream: def generatestream(key, length): x = key stream = struct.pack(">l", x) while len(stream) < len(msg): x = (a*x) % m stream += struct.pack(">l", x) return stream Thus we just created a list of common words (with upper and lower case starting letters), and generated keys for these for the first four bytes: Method: using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; namespace gencode class Program static void Main(string[] args) string str = "4cc2ae9a"; string [] commonwords = "and", "look","this","the","for","you","with ","have","with", "from","she","they","will","there","who ","make","like","which","when", "can","make","good","your","than","into","just";
6 foreach (string s1 in commonwords) for (int i = 0; i < 2; i++) string s = Truncate(s1, 4); string instr = s; if (i == 0) else instr = Convert.ToString(char.ToUpper(instr[0]))+Convert.ToString(instr[1]) + Convert.ToString(instr[2]) + instr[3]; s); string hex = ConvertAsciiToHex(instr); Console.WriteLine("print g(0x" + xor(hex, str) + ") # " + public static string Truncate( string value, int maximumlength) if (value.length == 3) return (value + " "); if (string.isnullorempty(value) == true) return value; if (value.length > maximumlength) return value.substring(0, maximumlength); return value; public static string xor(string hex1, string hex2) int dec1 = Convert.ToInt32(hex1, 16); int dec2 = Convert.ToInt32(hex2, 16); int result = dec1 ^ dec2; string hexresult = result.tostring("x"); return hexresult; public static string ConvertAsciiToHex(string asciistring) string hex = ""; foreach (char c in asciistring) int tmp = c; hex += String.Format("0:X2", (uint)system.convert.touint32(tmp.tostring())); return hex; This generated all the required key that would generate the first four letters of the cipher: print g(0x2daccaba) # and print g(0xdaccaba) # And print g(0x20adc1f1) # look print g(0xadc1f1) # Look print g(0x38aac7e9) # this print g(0x18aac7e9) # This print g(0x38aacbba) # the print g(0x18aacbba) # The
7 print g(0x2aaddcba) # for print g(0xaaddcba) # For print g(0x35addbba) # you print g(0x15addbba) # You print g(0x3babdaf2) # with print g(0x1babdaf2) # With print g(0x24a3d8ff) # have print g(0x4a3d8ff) # Have print g(0x3babdaf2) # with print g(0x1babdaf2) # With print g(0x2ab0c1f7) # from print g(0xab0c1f7) # From print g(0x3faacbba) # she print g(0x1faacbba) # She print g(0x38aacbe3) # they print g(0x18aacbe3) # They print g(0x3babc2f6) # will print g(0x1babc2f6) # Will print g(0x38aacbe8) # ther print g(0x18aacbe8) # Ther print g(0x3baac1ba) # who print g(0x1baac1ba) # Who print g(0x21a3c5ff) # make print g(0x1a3c5ff) # Make print g(0x20abc5ff) # like print g(0xabc5ff) # Like print g(0x3baac7f9) # whic print g(0x1baac7f9) # Whic print g(0x3baacbf4) # when print g(0x1baacbf4) # When print g(0x2fa3c0ba) # can print g(0xfa3c0ba) # Can print g(0x21a3c5ff) # make print g(0x1a3c5ff) # Make print g(0x2badc1fe) # good print g(0xbadc1fe) # Good print g(0x35addbe8) # your print g(0x15addbe8) # Your print g(0x38aacff4) # than print g(0x18aacff4) # Than print g(0x25acdaf5) # into print g(0x5acdaf5) # Into print g(0x26b7ddee) # just print g(0x6b7ddee) # Just Next we imported this into the Python code: import binascii import struct import sys import string val="4cc2ae9a45702a881e2ef1a7573d0ca57c02002c19e5567f7b0d05205caa30821efbeec7 5a2d4c e0116b86f2a12187f6a195b3e7ac4d36b6b ebfe5e2874ca127ea10 14e4a88fe2f7175c6b216c069f af11176c043bfe64564fab10c34a37b d3aa4f 0e46f078ab02bf550e21e25593e1c34aae278c57c9ba c8f01a834b35c5fbb392a800d7 26edd162262f e544cc0370e75b264fd0c3385f4a6765f8cf3e f415ed2614de0 d25e59f5f60d0a5de65a326eeb0537f5ec390b92b3fe15b9f0e91f7db8bc6c9b0b4a bb9d93bf8ed4f308108aa1c0416ed54a4cdfa5070cbfd7987a78a64052a8e2b48b2885fd2e6 9d3a9bb7a956bbae b4f26716e1e7f6f892a0f77df356b5c5f706ec9cb4f de27b472fd32e3a5e7d6f26b63e27059afc5e6a3ba85a a4f98ffab73f992ee ad f07f3f65c42a9a2ce4572fa4b6646f0aa5992acbe36e038f677f177e5783d3 7c27272ea98756d b8b229f48a548994e3623a9df6f78cd612b e48371fdb10
8 eb0b4f1de915a32d61c86460ecc36e0ec5ca3f5a1bcf6474ac a91b01edfd0e3c92b d65a2bab10ef03ef85b0881a1706ddf0b feeb4d814569b782bf733c346fa d1" # xor two messages def xor(a, b): return ''.join([chr(ord(a[i]) ^ ord(b[i])) for i in range(len(a))]) #stream cipher constants a = m = 2**31 # run the stream cipher! def generatestream(key, length): x = key stream = struct.pack(">l", x) while len(stream) < len(msg): x = (a*x) % m stream += struct.pack(">l", x) return stream def g( key1 ): stream = generatestream(key1, len(cipher)) plaintext = xor(cipher, stream) return plaintext #To decrypt: msg="" cipher = binascii.unhexlify(val) for x in range(1, len(cipher)): msg+="a" print g(0x2daccaba) # and print g(0xdaccaba) # And print g(0x20adc1f1) # look print g(0xadc1f1) # Look print g(0x38aac7e9) # this print g(0x18aac7e9) # This print g(0x38aacbba) # the print g(0x18aacbba) # The print g(0x2aaddcba) # for print g(0xaaddcba) # For... print g(0x21a3c5ff) # make print g(0x1a3c5ff) # Make print g(0x2badc1fe) # good print g(0xbadc1fe) # Good print g(0x35addbe8) # your print g(0x15addbe8) # Your print g(0x38aacff4) # than print g(0x18aacff4) # Than print g(0x25acdaf5) # into print g(0x5acdaf5) # Into print g(0x26b7ddee) # just print g(0x6b7ddee) # Just Then when run gives garbled text, apart from "Good", which gives:
9 Good work! If you are reading this you must have cracked the stream cipher. Hopefully in cracking this you have seen the value in creating a cryptographically secure random number generator, the same weakness in this stream cipher can also be seen in some computer-based casino games which can be used to predict play. The end is just around the corner, but to reach the end, take this final piece of the puzzle and the clue: Final piece: 3jhmu Clue: Final step If we look at the previous clues given in steps 4, 5, and 6, we get the words: portsm, thoo5, and 3jhmu. The video of Shrek basically tells us to take the 3 clues, put them together, and go to a third onion website on the tor network: portsmthoo53jhmu.onion
10
RegEx-validate IP address. Defined below is the pattern for checking an IP address with value: String Pattern Explanation
RegEx-validate IP address Defined below is the pattern for checking an IP address with value: 240.30.20.60 String Pattern Explanation 240 ^[0-9]1,3 To define the starting part as number ranging from 1
More informationRegEx - Numbers matching. Below is a sample code to find the existence of integers within a string.
RegEx - Numbers matching Below is a sample code to find the existence of integers within a string. Sample code pattern to check for number in a string: using System; using System.Collections.Generic; using
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018 Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1,
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2015 1 / 33 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2017 1 / 34 Who am I? Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,
More informationLab 1: Cipher Fundamentals
Lab 1: Cipher Fundamentals Objective: The key objective of this lab is to be introduced to some of the fundamental principles involved in cryptography, including the usage of Base-64, hexadecimal, the
More informationLab 2.5: Padding. Padding (AES)
Lab 2.5: Padding With encryption, we normally use a block cipher, and where we must pad the end blocks to make sure that the data fits into a whole number of block. Some background material is here: http://asecuritysite.com/encryption/padding
More informationSoftware Tutorial: Padding
Software Tutorial: Padding With encryption, we normally use a block cipher, and where we must pad the end blocks to make sure that the data fits into a whole number of block. Some background material is
More informationClassic Cryptography: From Caesar to the Hot Line
Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical
More informationLab 1: Cipher Fundamentals
Lab 1: Cipher Fundamentals Objective: The key objective of this lab is to be introduced to some of the fundamental principles involved in cryptography, including the usage of Base-64, hexadecimal, the
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationGreat Theoretical Ideas in Computer Science. Lecture 27: Cryptography
15-251 Great Theoretical Ideas in Computer Science Lecture 27: Cryptography What is cryptography about? Adversary Eavesdropper I will cut his throat I will cut his throat What is cryptography about? loru23n8uladjkfb!#@
More informationProblem Statement. B1: average speed
Problem Statement B1: average speed A woman runs on tracks of different lengths each day. She always times the last lap. Use the time for the last lap (in seconds) and the length of the track (in miles)
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationQuantum Encryption Keys
Quantum Technology PROGRAMME ACTIVITY SHEETS Quantum Encryption Keys SHARING DECRYPTION KEYS AND DECODING MESSAGES Every time you send an email or you pay for something online, or with your debit card,
More informationC = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)
Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationFundamentals of Python: First Programs. Chapter 4: Strings and Text Files
Fundamentals of Python: First Programs Chapter 4: Strings and Text Files Objectives After completing this chapter, you will be able to Access individual characters in a string Retrieve a substring from
More informationEE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions
EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions Assigned: Tuesday, January 17, 2017, Due: Sunday, January 28, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationENGR/CS 101 CS Session Lecture 5
ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret
More informationOpenSSL is a standard tool that we used in encryption. It supports many of the standard symmetric key methods, including AES, 3DES and ChaCha20.
Lab 2: Symmetric Key Objective: The key objective of this lab is to understand the range of symmetric key methods used within symmetric key encryption. We will introduce block ciphers, stream ciphers and
More informationCS61A Lecture #39: Cryptography
Announcements: CS61A Lecture #39: Cryptography Homework 13 is up: due Monday. Homework 14 will be judging the contest. HKN surveys on Friday: 7.5 bonus points for filling out their survey on Friday (yes,
More informationNUMB3RS Activity: Creating Codes. Episode: Backscatter
Teacher Page 1 NUMB3RS Activity: Creating Codes Topic: Codes Grade Level: 10-12 Objective: Explore several coding methods Time: 30+ minutes Materials: TI-83/84 Plus calculator Introduction While lecturing
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationAPI Guide MSS-8 and MVS-16
API Guide and MVS-16 Page 1-8 Channel Matrix Switcher Page 10-16 Channel Matrix Switcher and Multi Viewer MVS-16 API Guide for RS232 RS232 Connection: Port Settings: Bps 9600, Data bits 8, Parity None,
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationJAVA OPERATORS GENERAL
JAVA OPERATORS GENERAL Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups: Arithmetic Operators Relational Operators Bitwise Operators
More informationCryptosystems. Truong Tuan Anh CSE-HCMUT
Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationCS 556 Spring 2017 Project 3 Study of Cryptographic Techniques
CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques Project Due Dates: Part A: Due before class on CANVAS by Thursday, March 23, 2017 Part B: Due before class on CANVAS by Thursday April 6,
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationExpressions and Data Types CSC 121 Spring 2015 Howard Rosenthal
Expressions and Data Types CSC 121 Spring 2015 Howard Rosenthal Lesson Goals Understand the basic constructs of a Java Program Understand how to use basic identifiers Understand simple Java data types
More informationL2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015
L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More information1.What subjects should you know to play the code cracking game?
Mathematics: Modeling Our World Unit 2: SECRET CODES HANDOUT VIDEO VIEWING GUIDE 1.What subjects should you know to play the code cracking game? H2.1 2. What is the Zimmermann telegram? 3.How were secret
More informationInformation Security CS526
Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream CIphers 1 Announcements HW1 is out, due on Sept 11 Start early, late policy is 3 total late days
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationCryptography. What is Cryptography?
Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationSecurity: Cryptography
Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity
More informationStream Ciphers. Koç ( ucsb ccs 130h explore crypto fall / 13
Stream Ciphers Çetin Kaya Koç http://cs.ucsb.edu/~koc koc@cs.ucsb.edu Koç (http://cs.ucsb.edu/~koc) ucsb ccs 130h explore crypto fall 2014 1 / 13 Block Ciphers Plaintext: M i with M i = n, where n is the
More informationSOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS
SOLUTIONS OR HOMEWORK # 1 ANSWERS TO QUESTIONS 2.4 A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated
More informationPROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002
PROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002 Introduction... 1 Objectives... 2 Helpful Reading Resources for both parts of Project 2... 2 Part 1: Telegraph
More informationA Tour of Classical and Modern Cryptography
A Tour of Classical and Modern Cryptography Evan P. Dummit University of Rochester May 25, 2016 Outline Contents of this talk: Overview of cryptography (what cryptography is) Historical cryptography (how
More informationCIS 3362 Final Exam 12/4/2013. Name:
CIS 3362 Final Exam 12/4/2013 Name: 1) (10 pts) Since the use of letter frequencies was known to aid in breaking substitution ciphers, code makers in the Renaissance added "twists" to the standard substitution
More information2 What does it mean that a crypto system is secure?
Cryptography Written by: Marius Zimand Notes: On the notion of security 1 The One-time Pad cryptosystem The one-time pad cryptosystem was introduced by Vernam and Mauborgne in 1919 (for more details about
More informationCSE 127: Computer Security Cryptography. Kirill Levchenko
CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified
More informationFall 2017 CIS 3362 Final Exam. Last Name: First Name: 1) (10 pts) Decrypt the following ciphertext that was encrypted using the shift cipher:
Fall 2017 CIS 3362 Final Exam Last Name: First Name: 1) (10 pts) Decrypt the following ciphertext that was encrypted using the shift cipher: mubsecujejxuvydqbunqc 2) (10 pts) Consider an affine cipher
More informationCryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1
Cryptography Encryption COMP620 Information Privacy & Security Cryptography in general represents the process of encrypting a plain text file into an unreadable cipher so that it can be stored and decrypted
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationJava Bytecode (binary file)
Java is Compiled Unlike Python, which is an interpreted langauge, Java code is compiled. In Java, a compiler reads in a Java source file (the code that we write), and it translates that code into bytecode.
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationModule 1: Classical Symmetric Ciphers
Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts
More informationAirDroid Multiple Vulnerabilities
AirDroid Multiple Vulnerabilities 06/01/2016 Software Affected Versions CVE Reference Author Severity Vendor Vendor Response AirDroid 4.0.0.3 and lower None Bryan Schmidt Medium Sand Studio Patch released.
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationCHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college
CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY Badran Awad Computer Department Palestine Technical college CHAPTER 1 Introduction Historical ciphers Information theoretic security Computational security Cryptanalysis
More informationStream Ciphers. Çetin Kaya Koç Winter / 13
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 13 Block Ciphers Cryptography Plaintext: M i with M i = n, where n is the block length (in bits) Ciphertext: C i with C i = m, where m n, however,
More informationCOMP4109 : Applied Cryptography
COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 4 (and 5 and maybe 6) secret-key primitives symmetric-key encryption security notions and types of
More informationCryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL
Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption
More informationSymmetric Cryptography. CS4264 Fall 2016
Symmetric Cryptography CS4264 Fall 2016 Correction: TA Office Hour Stefan Nagy (snagy2@vt.edu) Office hour: Thursday Friday 10-11 AM, 106 McBryde Hall 2 Slides credit to Abdou Illia RECAP AND HIGH-LEVEL
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationModern Cryptography Activity 1: Caesar Ciphers
Activity 1: Caesar Ciphers Preliminaries: The Caesar cipher is one of the oldest codes in existence. It is an example of a substitution cipher, where each letter in the alphabet is replaced by another
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationAssignment 3: Block Ciphers
Assignment 3: Block Ciphers CSCI3381-Cryptography Due October 3, 2014 1 Solutions to the Written Problems 1. Block Cipher Modes of Operation 6 points per part, 30 total. Parts (a)-(d) refer to the cipherblock
More informationObject oriented lab /second year / review/lecturer: yasmin maki
1) Examples of method (function): Note: the declaration of any method is : method name ( parameters list ).. Method body.. Access modifier : public,protected, private. Return
More information15110 PRINCIPLES OF COMPUTING EXAM 3A FALL 2011
15110 PRINCIPLES OF COMPUTING EXAM 3A FALL 2011 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic
More informationCOMP-202: Foundations of Programming. Lecture 9: Arrays and Practice Jackie Cheung, Winter 2016
COMP-202: Foundations of Programming Lecture 9: Arrays and Practice Jackie Cheung, Winter 2016 Review: for Loops for (initialization; condition; update) { Happens once per loop only, before the first check
More information1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class
1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and
More informationAES Code Example
210 Figure 12-1. Block cipher chaining modes 12.1.6. AES Code Example Now that we have covered block ciphers and CBC, we provide a simple Java code example that can encrypt and decrypt using AES in CBC
More information3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some
3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption
More informationkrl gl drlrpcj cpr ougei tm arjgrvr tfct wfgef tfry wgqf tm ar tpur.
CS-105 Cryptogram Game Instructor: Joel Castellanos e-mail: joel@unm.edu Web: http://cs.unm.edu/~joel/ Office: Farris Engineering Center (FEC) room 319 krl gl drlrpcj cpr ougei tm arjgrvr tfct wfgef tfry
More informationInformation Security
SE 4472b Information Security Week 2-2 Some Formal Security Notions Aleksander Essex Fall 2015 Formalizing Security As we saw, classical ciphers leak information: Caeser/Vigenere leaks letter frequency
More informationOVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,
More informationLecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes
What is Encryption Parties involved: Alice: The Sender Bob: The Receiver Eve: The Eavesdropper Aim of Encryption Alice wants to send a message to Bob The message should remain hidden from Eve What distinguishes
More informationProblem Statement. A1: being lapped on the track
Problem Statement A1: being lapped on the track You and your friend are running laps on the track at the rec complex. Your friend passes you exactly X times in one of your laps (that is, you start the
More informationA cipher is a type of secret code, where you swap the letters around so that noone can read your message.
Secret Messages Introduction: In this project, you ll learn how to make your own encryption program, to send and receive secret messages with a friend. This project ties in with the Earth to Principa activity
More informationCENTRAL UNIVERSITY OF RAJASTHAN
CLASS : M.TECH SEMESTER: II BRANCH : CSE SESSION: 2011-12 SUBJECT CODE & NAME : CSIS-304 TOPICS IN OPERATING SYSTEM 1. The question paper contains five questions. 4.Before attempting the question paper,
More informationExpressions and Data Types CSC 121 Fall 2015 Howard Rosenthal
Expressions and Data Types CSC 121 Fall 2015 Howard Rosenthal Lesson Goals Understand the basic constructs of a Java Program Understand how to use basic identifiers Understand simple Java data types and
More informationECE2049: Homework 1. Due: Thursday, 25 May 2017 by 7pm
Due: Thursday, 25 May 2017 by 7pm Submission notes: For full credit, please show your work and denote your answers with a circle or a box. Always write and draw your diagrams neatly! We cannot be expected
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationA1 Problem Statement Willie s Push-ups
A1 Problem Statement Willie s Push-ups After every football score, Willie the Wildcat does one push-up for every point scored so far in the current game. On the scoreboard at the stadium, there is displayed
More informationJNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World
Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not
More informationCIS 6930/4930 Computer and Network Security. Topic 3.1 Secret Key Cryptography (Cont d)
CIS 6930/4930 Computer and Network Security Topic 3.1 Secret Key Cryptography (Cont d) 1 Principles for S-Box Design S-box is the only non-linear part of DES Each row in the S-Box table should be a permutation
More informationClassical Cryptography. Thierry Sans
Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY
More informationCode Ninjas: Introduction to Computer Science. Macomb Science Olympiad Presented by Swati Dharia Shane Storks
Code Ninjas: Introduction to Computer Science Macomb Science Olympiad Presented by Swati Dharia Shane Storks Goals of the Math Topics Learn basic math concepts used in computer science Introduce basic
More informationPayment Gateway Integration Document For Offline and Online Modes
Payment Gateway Integration Document For Offline and Online Modes Dated: 28-Dec-2016 1. Introduction... 3 2. Process Flow... 3 2.1 Merchant Enrollment Flow... 3 2.2 Merchant Integration Flow... 3 2.3 Request
More informationClassical Cryptography
Classical Cryptography Chester Rebeiro IIT Madras STINSON : chapter 1 Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT,
More informationUsing block ciphers 1
Using block ciphers 1 Using block ciphers DES is a type of block cipher, taking 64-bit plaintexts and returning 64-bit ciphetexts. We now discuss a number of ways in which block ciphers are employed in
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More informationMiscellaneous Solutions
2017 Miscellaneous Solutions Sponsored By 2017 Cyber Security Challenge Australia CySCA 2017 Miscellaneous Solutions Table of Contents Challenge 1: Python In a Pickle... 2... 2... 2 Challenge 2: Python
More informationCryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng
Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationJava provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups:
Basic Operators Java provides a rich set of operators to manipulate variables. We can divide all the Java operators into the following groups: Arithmetic Operators Relational Operators Bitwise Operators
More informationClassical Encryption Techniques
Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,
More information