Introduction to Cryptography

Size: px
Start display at page:

Download "Introduction to Cryptography"

Transcription

1 Introduction to Cryptography Dr. Arjan Durresi Louisiana State University Baton Rouge, LA These slides are available at: Louisiana State University 5- Introduction to Cryptography - 1

2 Overview Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 2

3 Communication Secrecy The history of codes and ciphers is the story of centuries-old battle between codemakers and codebreakers Evolution of codes. Always under attack from codebreakers. Analogous to the situation of a strain of infectious bacteria under the attack of antibiotics Technologies involved from mathematics to linguistics, from information theory to quantum theory Louisiana State University 5- Introduction to Cryptography - 3

4 The Evolution of Secret Writing In The histories, Herodotus, the father of history, chronicled the conflicts between Greece and Persia in the fifth century B.C. The art of secret writing saved the Greece Demaratus send information to Greece about Persian preparation using secret messages: scraping the wax off a pair of wooden folding tablets, writing on the wood underneath and then covering the message with wax again. Herodotus chronicled also the story of Histaiaeus who wanted to encaurage Aristagoras of Miletus to revolt against Persians To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to grow. It seems this period of history tolerated a certain lack of urgency. Hiding a message is known as steganography derived from the Greek word steganos meaning covered and graphein to write. Louisiana State University 5- Introduction to Cryptography - 4

5 The Evolution of Secret Writing In the two thousand years since Herodotus, various forms of steganography has been used. The ancient Chinese wrote messages on fine silk, which then was scrunched into a tiny ball and covered in wax and swallowed by a messenger. In the 16 th century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from mixture of alum and pint vinegar and then write on the shell. The solution penetrates the shell and leaves the message on the egg inside and can be read when the shell is removed. Today write messages on pictures posted on the web Louisiana State University 5- Introduction to Cryptography - 5

6 The Evolution of Secret Writing The longevity of steganography illustrates that can offer security, but it suffers from a fundamental weakness. If the message is found the secret is revealed. Hence in parallel with steganography, there was the evolution of Cryptography, derived from the Greek word kryptos hidden. The aim of cryptography is not to hide the existence of the message, but rather hide its meaning, a process known as encryption. To render the message unintelligible, it is scrambled according a particular protocol agreed beforehand between the sender and the intended recipient. The advantage of cryptography is that if the enemy intercepts an encrypted message, then the message is unreadable. Louisiana State University 5- Introduction to Cryptography - 6

7 Cryptography Possible to combine cryptography and steganography. For example, during Second World War, German agents in Latin America would photographically shrink a page of text down to a dot less than 1 mm and then hide it in a letter. Sometimes they also scrambled the text before reducing it. Cryptography is more powerful because of this ability to prevent the information from falling into enemy hands. Louisiana State University 5- Introduction to Cryptography - 7

8 Cryptography Cryptography can be divided into: transposition and substitution. In transposition, the letters of the message are simply rearranged. For very short messages, such as a single word, this method is relatively insecure. For example, consider this short sentence. 35 letters with more than 50 *10 30 distinct arrangements. If each person would check one arrangement per second, it would take all people more than thousand time the life of universe to check all arrangements. This seems unbreakable, but there is a drawback. If letter are randomly jumbled without rule, then unscrambling the text will be impossible for the enemy as well as for the recipient. Louisiana State University 5- Introduction to Cryptography - 8

9 Cryptography Have a history of at least 4000 years Ancient Egyptians enciphered some of their hieroglyphic writing on monuments Louisiana State University 5- Introduction to Cryptography - 9

10 Spartan Scytale Wrap a strip of paper around a tube of specific size, then write your message sideways (generally one letter per strip). Only someone with same size tube can read your message. Louisiana State University 5- Introduction to Cryptography - 10

11 Cryptography Ancient Hebrews enciphered certain words in the scriptures 2000 years ago Julius Ceasar used a simple substitution cipher, now known as the Caesar cipher Roger Bacon described several methods in 1200s Geoffrey Chaucer included several ciphers in his works Leon Alberti devised a cipher wheel, and described the principles of frequency analysis in the 1460s Blaise de Vigenère published a book on cryptology in 1585, & described the polyalphabetic substitution cipher Increasing use, esp in diplomacy & war over centuries Louisiana State University 5- Introduction to Cryptography - 11

12 Substitution Ciphers Make a table for all the letters of the alphabet. Pick a new code letter to stand for each one. Go through your message, and replace each letter with its code letter from the table. Only someone with the table could decode your message. Original a b c d e f g h i j Code Letter D F I Q K X M Z R P Louisiana State University 5- Introduction to Cryptography - 12 bed FKQ

13 Caesar Cipher aka Decoder Rings Caesar used a simple substitution cipher. He just shifted the alphabet. But since there s only 26 ways to shift, these codes are easy to break (just try all 26 ways). Original a b c d e f g h i j... Code Letter D E F G H I J K L M... Louisiana State University 5- Introduction to Cryptography - 13 Image: Old Time Radio Premiums

14 Kāma-Sūtra Secret Writing A harder-to-break cipher can be designed by instead of just shifting the letters of the alphabet, you assign each letter a totally random code letter. This form of secret-writing is one of the 64 arts explained in the Kāma-Sūtra. Original Code Letter a b c d e f g h i j D F I Q K X M Z R P Louisiana State University 5- Introduction to Cryptography - 14

15 Newspaper Cryptograms Why don t we all just use this approach to hide our information? Because people can figure out how to decode it! In fact, substitution ciphers are behind the cryptogram puzzles you see in the newspaper. People solve these in an afternoon Computers make them even easier to solve. Louisiana State University 5- Introduction to Cryptography - 15

16 Definitions Process data into unintelligible form, reversible, without data loss Usually one-to-one (not compression) Analog cryptography example: voice changers Other services: Integrity checking: no tampering Authentication: not an imposter Plaintext encryption ciphertext decryption plaintext Louisiana State University 5- Introduction to Cryptography - 16

17 Secret Key Cryptography Originally a way to keep secret data private Encode a message using a secret key A long and colorful history Today, it has many uses Privacy Authentication verifying someone (something s) identity Data Integrity reassuring the recipient of the message that the message has not been altered since it was generated by a legitimate source Louisiana State University 5- Introduction to Cryptography - 17

18 What is Encryption? You and I agree on a secret way to transform data Later, we use that transform on data we want to pass over an unsafe communications channel Instead of coming up with new transforms, design a common algorithm customized with a key Louisiana State University 5- Introduction to Cryptography - 18

19 Secret Key Encryption for Privacy Key Key Plaintext Encrypt Ciphertext Decrypt Plaintext Louisiana State University 5- Introduction to Cryptography - 19

20 How Secure is Encryption? An attacker who knows the algorithm we re using could try all possible keys Security of cryptography depends on the limited computational power of the attacker A fairly small key (e.g. 64 bits) represents a formidable challenge to the attacker Algorithms can also have weaknesses, independent of key size Louisiana State University 5- Introduction to Cryptography - 20

21 How do we know how good an algorithm is? A problem of mathematics: it is very hard to prove a problem is hard It s never impossible to break a cryptographic algorithm - we want it to be as hard as trying all keys Fundamental Tenet of Cryptography: If lots of smart people have failed to solve a problem then it probably won t be solved (soon) Louisiana State University 5- Introduction to Cryptography - 21

22 To Publish or Not to Publish If the good guys break your algorithm, you ll hear about it If you publish your algorithm, the good guys provide free consulting by trying to crack it The bad guys will learn your algorithm anyway Today, most commercial algorithms are published; most military algorithms are not Louisiana State University 5- Introduction to Cryptography - 22

23 Computational Difficulty Algorithm needs to be efficient. Otherwise only short keys can be used. Most schemes can be broken: depends on $$$. E.G. Try all possible keys. Longer key is often more secure: Encryption O(N+1). Brute-force cryptanalysis: O( 2N+1 ), twice as hard with each additional bit. Cryptanalysis tools: Special-purpose hardware. Parallel machines. Internet coarse-grain parallelism. Louisiana State University 5- Introduction to Cryptography - 23

24 Secret Key vs. Secret Algorithm Secret algorithm: additional hurdle Hard to keep secret if used widely: Reverse engineering, social engineering Commercial: published Wide review, trust Military: avoid giving enemy good ideas Dutch linguist in 1883, Kerckhoff s Principle: The security of a cryptosystem must not depend on keeping secret the cryptoalgorithm. The security depends only on keeping secret the key. Louisiana State University 5- Introduction to Cryptography - 24

25 Classical Substitution Ciphers Where letters of plaintext are replaced by other letters or by numbers or symbols Or if plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with ciphertext bit patterns Louisiana State University 5- Introduction to Cryptography - 25

26 Caesar Cipher Earliest known substitution cipher by Julius Caesar First attested use in military affairs Replaces each letter by 3rd letter on Example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB Louisiana State University 5- Introduction to Cryptography - 26

27 Caesar Cipher can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y Z then have Caesar cipher as: C = E(p) = (p + k) mod (26) p = D(C) = (C k) mod (26) Louisiana State University 5- Introduction to Cryptography - 27

28 Cryptanalysis of Caesar Cipher only have 26 possible ciphers A maps to A,B,..Z could simply try each in turn a brute force search given ciphertext, just try all shifts of letters do need to recognize when have plaintext eg. break ciphertext "GCUA VQ DTGCM" Louisiana State University 5- Introduction to Cryptography - 28

29 Monoalphabetic Cipher rather than just shifting the alphabet could shuffle (jumble) the letters arbitrarily each plaintext letter maps to a different random ciphertext letter hence key is 26 letters long Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN Plaintext: ifwewishtoreplaceletters Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA Louisiana State University 5- Introduction to Cryptography - 29

30 Monoalphabetic Cipher Security now have a total of 26! = 4 x 1026 keys with so many keys, might think is secure but would be!!!wrong!!! problem is language characteristics Louisiana State University 5- Introduction to Cryptography - 30

31 Language Redundancy and Cryptanalysis human languages are redundant eg "th lrd s m shphrd shll nt wnt" letters are not equally commonly used in English e is by far the most common letter then T,R,N,I,O,A,S other letters are fairly rare cf. Z,J,K,Q,X have tables of single, double & triple letter frequencies Louisiana State University 5- Introduction to Cryptography - 31

32 English Letter Frequencies Louisiana State University 5- Introduction to Cryptography - 32

33 Use in Cryptanalysis key concept - monoalphabetic substitution ciphers do not change relative letter frequencies discovered by Arabian scientists in 9 th century calculate letter frequencies for ciphertext compare counts/plots against known values if Caesar cipher look for common peaks/troughs peaks at: A-E-I triple, NO pair, RST triple troughs at: JK, X-Z for monoalphabetic must identify each letter tables of common double/triple letters help Louisiana State University 5- Introduction to Cryptography - 33

34 Example Cryptanalysis given ciphertext: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ count relative letter frequencies (see text) guess P & Z are e and t guess ZW is th and hence ZWP is the proceeding with trial and error finally get: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in moscow Louisiana State University 5- Introduction to Cryptography - 34

35 Playfair Cipher not even the large number of keys in a monoalphabetic cipher provides security one approach to improving security was to encrypt multiple letters the Playfair Cipher is an example invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair Louisiana State University 5- Introduction to Cryptography - 35

36 Playfair Key Matrix a 5X5 matrix of letters based on a keyword fill in letters of keyword (sans duplicates) fill rest of matrix with other letters eg. using the keyword MONARCHY MONAR CHYBD EFGIK LPQST UVWXZ Louisiana State University 5- Introduction to Cryptography - 36

37 Encrypting and Decrypting plaintext encrypted two letters at a time: 1. if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx lo on" 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end), eg. ar" encrypts as "RM" 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom), eg. mu" encrypts to "CM" 4. otherwise each letter is replaced by the one in its row in the column of the other letter of the pair, eg. hs" encrypts to "BP", and ea" to "IM" or "JM" (as desired) Louisiana State University 5- Introduction to Cryptography - 37

38 Security of the Playfair Cipher security much improved over monoalphabetic since have 26 x 26 = 676 digrams would need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic) and correspondingly more ciphertext was widely used for many years (eg. US & British military in WW1) it can be broken, given a few hundred letters since still has much of plaintext structure Louisiana State University 5- Introduction to Cryptography - 38

39 Polyalphabetic Ciphers another approach to improving security is to use multiple cipher alphabets called polyalphabetic substitution ciphers makes cryptanalysis harder with more alphabets to guess and flatter frequency distribution use a key to select which alphabet is used for each letter of the message use each alphabet in turn repeat from start after end of key is reached Louisiana State University 5- Introduction to Cryptography - 39

40 Vigenère Cipher simplest polyalphabetic substitution cipher is the Vigenère Cipher effectively multiple caesar ciphers key is multiple letters long K = k1 k2... kd i th letter specifies i th alphabet to use use each alphabet in turn repeat from start after d letters in message decryption simply works in reverse Louisiana State University 5- Introduction to Cryptography - 40

41 Example write the plaintext out write the keyword repeated above it use each key letter as a caesar cipher key encrypt the corresponding plaintext letter eg using keyword deceptive key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext:zicvtwqngrzgvtwavzhcqyglmgj Louisiana State University 5- Introduction to Cryptography - 41

42 Security of Vigenère Ciphers Have multiple ciphertext letters for each plaintext letter hence letter frequencies are obscured but not totally lost Start with letter frequencies see if look monoalphabetic or not If not, then need to determine number of alphabets, since then can attach each Louisiana State University 5- Introduction to Cryptography - 42

43 Kasiski Method Method developed by Babbage / Kasiski Repetitions in ciphertext give clues to period So find same plaintext an exact period apart Which results in the same ciphertext Of course, could also be random fluke eg repeated VTW in previous example Suggests size of 3 or 9 Then attack each monoalphabetic cipher individually using same techniques as before Louisiana State University 5- Introduction to Cryptography - 43

44 Autokey Cipher ideally want a key as long as the message Vigenère proposed the autokey cipher with keyword is prefixed to message as key knowing keyword can recover the first few letters use these in turn on the rest of the message but still have frequency characteristics to attack eg. given key deceptive key: deceptivewearediscoveredsav plaintext: wearediscoveredsaveyourself ciphertext:zicvtwqngkzeiigasxstslvvwla Louisiana State University 5- Introduction to Cryptography - 44

45 One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time pad is unbreakable since ciphertext bears no statistical relationship to the plaintext since for any plaintext & any ciphertext there exists a key mapping one to other can only use the key once though have problem of safe distribution of key Louisiana State University 5- Introduction to Cryptography - 45

46 Transposition Ciphers now consider classical transposition or permutation ciphers these hide the message by rearranging the letter order without altering the actual letters used can recognise these since have the same frequency distribution as the original text Louisiana State University 5- Introduction to Cryptography - 46

47 Rail Fence cipher write message letters out diagonally over a number of rows then read off cipher row by row eg. write message out as: m e m a t r h t g p r y e t e f e t e o a a t giving ciphertext MEMATRHTGPRYETEFETEOAAT Louisiana State University 5- Introduction to Cryptography - 47

48 Row Transposition Ciphers a more complex scheme write letters of message out in rows over a specified number of columns then reorder the columns according to some key before reading off the rows Key: Plaintext: a t t a c k p o s t p o n e d u n t i l t w o a m x y z Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ Louisiana State University 5- Introduction to Cryptography - 48

49 Product Ciphers ciphers using substitutions or transpositions are not secure because of language characteristics hence consider using several ciphers in succession to make harder, but: two substitutions make a more complex substitution two transpositions make more complex transposition but a substitution followed by a transposition makes a new much harder cipher this is bridge from classical to modern ciphers Louisiana State University 5- Introduction to Cryptography - 49

50 Rotor Machines before modern ciphers, rotor machines were most common product cipher were widely used in WW2 German Enigma, Allied Hagelin, Japanese Purple implemented a very complex, varying substitution cipher used a series of cylinders, each giving one substitution, which rotated and changed after each letter was encrypted with 3 cylinders have 26 3 =17576 alphabets Louisiana State University 5- Introduction to Cryptography - 50

51 Louisiana State University 5- Introduction to Cryptography - 51

52 Steganography an alternative to encryption hides existence of message using only a subset of letters/words in a longer message marked in some way using invisible ink hiding in LSB in graphic image or sound file has drawbacks high overhead to hide relatively few info bits Louisiana State University 5- Introduction to Cryptography - 52

53 Cryptanalysis: Breaking an Ciphertext only: Encryption Scheme Exhaustive search until recognizable plaintext Need enough ciphertext Known plaintext: Secret may be revealed (by spy, time), thus <ciphertext, plaintext> pair is obtained Great for monoalphabetic ciphers Chosen plaintext: Choose text, get encrypted Useful if limited set of messages Encryption schemes have to withstand all three types of attacks Louisiana State University 5- Introduction to Cryptography - 53

54 Models for Evaluating Security Unconditional security (perfect secrecy) Uncertainty/entropy H(p)=H(p c) No matter how much computer power is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext Complexity-theoretic security Provable security As difficult to break as solving well-known and supposedly difficult problem Louisiana State University 5- Introduction to Cryptography - 54

55 Models for Evaluating Security Computational security Given limited computing resources (eg time needed for calculations is greater than age of universe), the cipher cannot be broken Ad hoc security Louisiana State University 5- Introduction to Cryptography - 55

56 Brute Force Attacks Number of encryption/sec: 1 million to 1 billion/sec 56-bit key broken in 1 week with 120,000 processors ($6.7m) 56-bit key broken in 1 month with 28,000 processors ($1.6m) 64-bit key broken in 1 week with processors ($1.7b) 128-bit key broken in 1 week with processors Louisiana State University 5- Introduction to Cryptography - 56

57 Uses of Cryptography Transmitting secret data over an insecure channel Storing secret data on an insecure medium Message integrity checksum/authentication code (MIC/MAC) Authentication: challenge the other party to encrypt or decrypt a random number Louisiana State University 5- Introduction to Cryptography - 57

58 Types of Cryptography Secret key cryptography: one key Public key cryptography: two keys - public, private Hash functions: no key Louisiana State University 5- Introduction to Cryptography - 58

59 Secret Key Cryptography Same key is used for encryption and decryption Symmetric cryptography Ciphertext approximately the same length as plaintext Substitution codes, DES, IDEA Message transmission: Agree on key (but how?) Communicate over insecure channel Secure storage: crypt Louisiana State University 5- Introduction to Cryptography - 59

60 Symmetric Cipher Model Louisiana State University 5- Introduction to Cryptography - 60

61 Secret Key Algorithms DES (Data Encryption Standard) 56 bit key (+ 8 parity bits) controversial! Input and output are 64 bit blocks slow in software, based on (sometime gratuitous) bit diddling IDEA (International Data Encryption Algorithm) 128 bit key Input and output are 64 bit blocks designed to be efficient in software Louisiana State University 5- Introduction to Cryptography - 61

62 Triple DES Secret Key Algorithms Apply DES three times (EDE) using K1, K2, K3 where K1 may equal K3 Input and output 64 bit blocks Key is 112 or 168 bits Advanced Encryption Standard (AES) New NIST standard to replace DES. Public Design and Selection Process. Key Sizes 128,192,256. Block size 128. Louisiana State University 5- Introduction to Cryptography - 62

63 Secret Key Algorithms RC2 (Rivest s Cipher #2) Variable key size Input and output are 64 bit blocks RC4 (Rivest s Cipher #4) Variable key size Extremely efficient Stream cipher - one time use keys Many other secret key algorithms exist It is hard to invent secure ones! No good reason to invent new ones Louisiana State University 5- Introduction to Cryptography - 63

64 XOR (Exclusive-OR) Bitwise operation with two inputs where the output bit is 1 if exactly one of the two input bits is one (B XOR A) XOR A) = B If A is a one time pad, very efficient and secure Common encryption schemes (e.g. RC4) calculate a pseudo-random stream from a key Louisiana State University 5- Introduction to Cryptography - 64

65 Secret Key Integrity Protection Plaintext Generate MAC MAC Verify MAC Yes/No Key Key Louisiana State University 5- Introduction to Cryptography - 65

66 Challenge / Response Authentication Alice (knows K) Bob (knows K) I m Alice Pick Random R Encrypt R using K (getting C) If you re Alice, decrypt C R Louisiana State University 5- Introduction to Cryptography - 66

67 Secret Key Cryptography (Cont d) Strong authentication: prove knowledge of key without revealing it: Send challenge r, verify the returned encrypted {r} Fred can obtain chosen plaintext, cihpertext pairs Challenge should chosen from a large pool Integrity check: fixed-length checksum for message Send Message Integrity Code (MIC) along with the message Louisiana State University 5- Introduction to Cryptography - 67

68 Public Key Encryption for Privacy Public Key Private Key Plaintext Ciphertext Plaintext Louisiana State University 5- Introduction to Cryptography - 68

69 Public Key Cryptography Asymmetric cryptography Invented/published in 1975 Two keys: private (d), public (e) Encryption: public key; Decryption: private key Signing: private key; Verification: public key Much slower than secret key cryptography Louisiana State University 5- Introduction to Cryptography - 69

70 Public Key Cryptography Two keys per user: a private key and a public key. The keys reverse each other s effects. Encrypt a message for Alice using her public key Decryption requires her private key Generating Digital Signatures requires the private key Verifying them requires the public key Louisiana State University 5- Introduction to Cryptography - 70

71 Public Key Cryptography Data transmission: (Cont d) Alice encrypts m a using e B, Bob decrypts to m a using d b. Storage: Can create a safety copy: using public key of trusted person. Authentication: No need to store secrets, only need public keys. Secret key cryptography: need to share secret key for every person to communicate with. Louisiana State University 5- Introduction to Cryptography - 71

72 Public Key Cryptography Digital signatures (Cont d) Encrypt hash h(m) with private key Authorship Integrity Non-repudiation: can t do with secret key cryptography Louisiana State University 5- Introduction to Cryptography - 72

73 Public Key Integrity Protection Plaintext Generate Signature Signature Verify Signature Yes/No Private Key Public Key Louisiana State University 5- Introduction to Cryptography - 73

74 Public Key Authentication Alice (knows A s private key) I m Alice If you re Alice, decrypt C Bob (knows A s public key) Pick Random R Encrypt R using A s public key (getting C) Decrypt C R Louisiana State University 5- Introduction to Cryptography - 74

75 Message Digest Functions Message Digest Digest Value Louisiana State University 5- Introduction to Cryptography - 75

76 Hash Algorithms Message digests, one-way transformations Length of h(m) much shorter then length of m Usually fixed lengths: bits Easy to compute h(m) Given h(m), no easy way to find m Computationally infeasible to find m 1, m 2 s.t. h(m 1 ) = h(m 2 ) Example: (m+c) 2, take middle n digits Louisiana State University 5- Introduction to Cryptography - 76

77 Hash Algorithms (Cont d) Password hashing Doesn t need to know password to verify it Store h(p+s), s (salt), and compare it with the user-entered p Salt makes dictionary attack less convenient Message integrity Agree on a password p Compute h(p m) and send with m Doesn t require encryption algorithm, so the technology is exportable Louisiana State University 5- Introduction to Cryptography - 77

78 Message Digest Functions Also known as cryptographic hashes Non-reversible function Takes an arbitrary size message and mangles it into a fixed size digest It should be impossible to find two messages with the same MD, or come up with a message with a given MD Useful as a shorthand for a longer thing Louisiana State University 5- Introduction to Cryptography - 78

79 Message Digest Functions MD2, MD4, and MD5 used to be most popular. SHA- 1 taking over All produce 128 bit digests MD4 and MD2 were recently broken and MD5 has significant weaknesses SHA-1 was proposed by the U.S. government. It produces a 160 bit digest Message digests are not difficult to design, but most are not secure Louisiana State University 5- Introduction to Cryptography - 79

80 Combining Cryptographic Functions for Performance Public key cryptography is slow compared to hashes and secret key cryptography Public key cryptography is more convenient & secure in setting up keys Algorithms can be combined to get the advantages of both Louisiana State University 5- Introduction to Cryptography - 80

81 Hybrid Encryption Instead of: Use: Message Encrypted with Alice s Public Key Randomly Chosen K Encrypted with Alice s Public Key + Message Encrypted with Secret Key K Louisiana State University 5- Introduction to Cryptography - 81

82 Hybrid Signatures Instead of: Message Signed with Bob s Private Key Use: Message + Digest Message (Message) Signed with Bob s Private Key Louisiana State University 5- Introduction to Cryptography - 82

83 Signed and Encrypted Message Randomly Chosen K Encrypted with Alice s Public Key + Digest (Message) Message+ Signed with Bob s Private Key Encrypted with Secret Key K Louisiana State University 5- Introduction to Cryptography - 83

84 Summary Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 84

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption

More information

Chapter 2: Classical Encryption Techniques

Chapter 2: Classical Encryption Techniques CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm

More information

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption

More information

2

2 1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver

More information

Cryptography and Network Security Chapter 2

Cryptography and Network Security Chapter 2 Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 Classical Encryption Techniques Many savages at the present day regard their names

More information

PART I Symmetric Ciphers

PART I Symmetric Ciphers PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3

More information

Information Systems Security

Information Systems Security Information Systems Security Dr. Ayman Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Chapter 2 Classical Encryption Techniques

More information

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES SYMMETRIC ENCRYPTION SOME BASIC TERMINOLOGY or conventional / private-key / single-key sender and recipient share a common

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

Cryptography Symmetric Encryption Class 2

Cryptography Symmetric Encryption Class 2 Cryptography Symmetric Encryption Class 2 Stallings: Ch 3 & 6 Stallings: Ch 4 CEN-5079: 18.January.2018 1 Symmetric Cryptosystems Encryption Key Decryption Key Plaintext Plaintext Encryption Algorithm

More information

Classical Encryption Techniques

Classical Encryption Techniques Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers.

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers. Unit-II Symmetric Ciphers Objectives: To define the terms and contents of symmetric key ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers. To describe

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not

More information

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography 1 2 Definition process data into unintelligible form, reversibly, without data loss typically digitally usually one-to-one in size $ compression analog cryptography: voice

More information

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

Classical Cryptography. Thierry Sans

Classical Cryptography. Thierry Sans Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY

More information

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing Outline CSCI 454/554 Computer and Network Security Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues Topic 2. Introduction to Cryptography 2 Cryptography Basic Concepts

More information

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶 Network Security 網路安全 Lecture 3 March 16, 2015 洪國寶 1 Outline Review: Symmetric encryption -- Classical techniques (Cont.) Symmetric encryption -- Modern techniques secure encryption schemes modern symmetric

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

CRYPTOGRAPHY. BY, Ayesha Farhin

CRYPTOGRAPHY. BY, Ayesha Farhin CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

Computer Security Network Security Internet Security

Computer Security Network Security Internet Security Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms computer use requires automated tools to protect files and other

More information

Nature Sunday Academy Lesson Plan

Nature Sunday Academy Lesson Plan Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis

More information

Block Encryption and DES

Block Encryption and DES Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

Classical Encryption Techniques

Classical Encryption Techniques Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data

More information

Security: Cryptography

Security: Cryptography Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity

More information

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Classical Encryption Techniques

Classical Encryption Techniques Contents Some Basic Terminology... 15 Cryptanalysis... 15 Brute Force Search... 17 Conventional Encryption Principles... 18 Symmetric Encryption... 18 Symmetric Cipher Model... 19 Classical Substitution

More information

APNIC elearning: Cryptography Basics

APNIC elearning: Cryptography Basics APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security

More information

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018 Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1,

More information

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

CNT4406/5412 Network Security

CNT4406/5412 Network Security CNT4406/5412 Network Security Introduction to Cryptography Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 18 Introduction What is Cryptography Mangling

More information

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography. Vasil Slavov William Jewell College Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and

More information

Prof.(Dr.) J. K. Mandal

Prof.(Dr.) J. K. Mandal Information Security Prof.(Dr.) J. K. Mandal Ex-Dean, Faculty of Engineering, Technology & Management Professor & Head, Department of Computer Science & Engineering University of Kalyani Kalyani, Nadia,

More information

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard

More information

Practical Aspects of Modern Cryptography

Practical Aspects of Modern Cryptography Practical Aspects of Modern Cryptography Lecture 3: Symmetric s and Hash Functions Josh Benaloh & Brian LaMacchia Meet Alice and Bob Alice Bob Message Modern Symmetric s Setup: Alice wants to send a private

More information

CSC 774 Network Security

CSC 774 Network Security CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution

More information

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography

More information

Encryption and Forensics/Data Hiding

Encryption and Forensics/Data Hiding Encryption and Forensics/Data Hiding 1 Cryptography Background See: http://www.cacr.math.uwaterloo.ca/hac/ For more information 2 Security Objectives Confidentiality (Secrecy): Prevent/Detect/Deter improper

More information

Introduction to Software Security Crypto Basics (Chapter 2)

Introduction to Software Security Crypto Basics (Chapter 2) Introduction to Software Security Crypto Basics (Chapter 2) Seong-je Cho Spring 2018 Computer Security & Operating Systems Lab, DKU Textbook Sources / References M. T. Goodrich and R. Tamassia, Introduction

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Module 1: Classical Symmetric Ciphers

Module 1: Classical Symmetric Ciphers Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,

More information

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a

More information

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions: Hash

More information

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18 Behrang Noohi School of Mathematical Sciences Queen Mary University of London 22 July 2014 Behrang Noohi (QMUL) 1 / 18 Introduction Secure Communication How can one send a secret message? Steganography

More information

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY Badran Awad Computer Department Palestine Technical college CHAPTER 1 Introduction Historical ciphers Information theoretic security Computational security Cryptanalysis

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers

More information

CSE 127: Computer Security Cryptography. Kirill Levchenko

CSE 127: Computer Security Cryptography. Kirill Levchenko CSE 127: Computer Security Cryptography Kirill Levchenko October 24, 2017 Motivation Two parties want to communicate securely Secrecy: No one else can read messages Integrity: messages cannot be modified

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

A Tour of Classical and Modern Cryptography

A Tour of Classical and Modern Cryptography A Tour of Classical and Modern Cryptography Evan P. Dummit University of Rochester May 25, 2016 Outline Contents of this talk: Overview of cryptography (what cryptography is) Historical cryptography (how

More information

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret

More information

ENGR/CS 101 CS Session Lecture 5

ENGR/CS 101 CS Session Lecture 5 ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret

More information

Some Stuff About Crypto

Some Stuff About Crypto Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher

More information

From Wikipedia, the free encyclopedia

From Wikipedia, the free encyclopedia Cryptography From Wikipedia, the free encyclopedia Cryptography or cryptology is a field of mathematics and computer science concerned with information security and related issues, particularly encryption

More information

Cryptography Introduction to Computer Security. Chapter 8

Cryptography Introduction to Computer Security. Chapter 8 Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure

More information

CS61A Lecture #39: Cryptography

CS61A Lecture #39: Cryptography Announcements: CS61A Lecture #39: Cryptography Homework 13 is up: due Monday. Homework 14 will be judging the contest. HKN surveys on Friday: 7.5 bonus points for filling out their survey on Friday (yes,

More information

Cryptography Intro and RSA

Cryptography Intro and RSA Cryptography Intro and RSA Well, a gentle intro to cryptography, followed by a description of public key crypto and RSA. 1 Definition Cryptology is the study of secret writing Concerned with developing

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Introduction to Cryptography. In the News: Hacker exposes embassies'

Introduction to Cryptography. In the News: Hacker exposes embassies' T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 Copyright 2004-2007 Konstantin Beznosov In the News: Hacker exposes embassies' e-mail A Swedish security

More information

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017 Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017 Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in

More information

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography Cryptography CS 555 Topic 1: Course Overview & What is Cryptography 1 Administrative Note Professor Blocki is traveling and will be back on Wednesday. E-mail: jblocki@purdue.edu Thanks to Professor Spafford

More information

2.1 Basic Cryptography Concepts

2.1 Basic Cryptography Concepts ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts

More information

CSC/ECE 774 Advanced Network Security

CSC/ECE 774 Advanced Network Security Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015 L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift

More information

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books: Basic Ciphers Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman, and M. Speciner,

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

Computer Security 3/23/18

Computer Security 3/23/18 s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 6 January 25, 2012 CPSC 467b, Lecture 6 1/46 Byte padding Chaining modes Stream ciphers Symmetric cryptosystem families Stream ciphers

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Ref:

Ref: Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:

More information

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4 EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Introduction University of Colorado Spring 2008 Historically, cryptography is the science and study of secret writing (Greek: kryptos = hidden, graphein = to write). Modern cryptography also includes such

More information