CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology
|
|
- Jerome Beasley
- 5 years ago
- Views:
Transcription
1 CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015
2 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition Cryptology is about secure communication in an insecure channel. Definitions Cryptography is about designing secure cryptosystems Cryptanalysis is about analyzing (breaking) cryptosystem Note Today the words Cryptology and Cryptography are used interchangeably.
3 Solved Problems Some of the Security Problems Solved by Cryptography Privacy of stored data, messages, and conversations Integrity of stored data, messages, and conversations User and data authentication Transaction non-repudiation
4 What is a Cryptosystem/Cipher What is a Cryptosystem? Plaintext is what you want to protect A cryptosystem is pair of algorithms that convert plaintext to ciphertext and back. Ciphertext is the encrypted version of the plaintext Ciphertext should appear like a random sequence
5 Historical Ciphers Historical ciphers They are mostly pen and paper methods. Key and the cryptosystem should be easy to use in practice. Mostly based on letter substitutions. Most of the time empty spaces and punctuation marks are removed from the ciphertext to avoid information leakage.
6 Substitution Ciphers Caesar s Cipher Every letter is replaced by a letter some fixed number of positions k down the alphabet. Used in ancient Rome by Julius Caesar who supposedly invented it. Example (k=2, English Alphabet) Plaintext: Ciphertext: CYBERSECURITY AWZCPQCASPGRW Notation p: plaintext P: Plaintext space Enc(p,k): Encryption function c: ciphertext C: Ciphertext space Dec(c,k): Decryption function k: key K: Key space. : Set size
7 Substitution Ciphers Caesar s Cipher P = 26 (English alphabet) C = 26 (Same as plaintext space) K = 26 (Actually 25 because if k = 0 then p = c) Enc(p,k)=k letter downs the alphabet Dec(c,k)=k letter up the alphabet Weaknesses key is easy to guess (key space is too small) 1 known plaintext-ciphertext is enough to break the cryptosystem
8 Substitution Ciphers Affine Cipher In order to increase the key space, we use two numbers a and b as the key and encrypt as follows E(p, k) = a p + b mod 26. Example (a=3,b=1, English Alphabet) Plaintext: CYBERSECURITY Ciphertext: HVENADNHJAZGV Affine Cipher P = 26 (English alphabet) C = 26 (Same as plaintext space) K = = 676 (Actually much lower) Enc(p,k)=a p + b mod 26 = c Dec(c,k)=a 1 c a 1 b mod 26 = p
9 Substitution Ciphers Warning a can have an inverse a 1 in Z N if and only if gcd(a, N) = 1. Key Space There are 12 possibilities for a so that gcd(a, 26) = 1. Thus, there are = 312 useable keys. Example (a=2,b=1, English Alphabet) Plaintext: Ciphertext: CYBERSECURITY FXDJJLJFPJRNX Weaknesses key is easy to guess (small key space) 1 known plaintext-ciphertext is enough to break the cryptosystem
10 Substitution Ciphers Definition Classical cryptosystems can be categorized according to the message units that the plaintext and ciphertext are broken into: Monograph: Single letter Digraph: Pair of letters Trigraph: Triple of letters Polygraph: Longer than a single letter Some Examples Ceaser s Cipher: E(p, k) = p k mod 26 Affine Cipher: E(p, k) = a p + b mod 26 Digraphic Shift Cipher: E(p, k) = k + p mod 676 Digraphic Affine Cipher: E(p, k) = a p + b mod 676
11 Substitution Ciphers Simple Monoalphabetic Substitution Every letter is replaced by a letter. Example Alphabet: A B C D E F G H... Y Z Key: K U E Z Q B O R... V S There are 26! = possibilities!!!! Weakness Redundancy in the language Can be broken by frequency analysis.
12 Frequency Analysis Frequency Analysis Frequency analysis is introduced by Al-Kindi in A Manuscript Deciphering Cryptographic Messages in 9th century. It is based on the redundancy of the language: For a given language, find a long text and count the number of frequencies of every letter. For instance, in English E is the letter that appears the most. The second place belongs to T. If the ciphertext is long enough, the letter that appears the most in the ciphertext is most probably corresponds to E in the plaintext. The letter in the ciphertext with the second most frequency is most probably corresponds to T in the plaintext. And so on...
13 Digraph Ciphers Playfair Invented by Charles Wheatstone in 1854 (Lord Playfair promoted its use) First literal digraph substitution cipher Uses a 5 5 table containing a keyword and the rest of the alphabet Memorizing the keyword and 4 simple rules are enough to use the system British Foreign Office rejected because of its perceived complexity. Wheatstone offered to demonstrate that three out of four boys in a nearby school could learn to use it in 15 minutes, but the Under Secretary of the Foreign Office responded, That is very possible, but you could never teach it to attaches.
14 Playfair Example Example (Playfair) Plaintext: CYBERSECURITY Keyword: CRYPTOLOGY Key Schedule C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z First write the keyword. Drop any duplicate letters. Fill the rest of the 5 5 table with the remaining letters of the alphabet. I and J are put in the same space since we have 26 letters.
15 Playfair Example Rules 1 If both letters are the same (or only one letter is left), add an X after the first letter. 2 If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row). 3 If the letters appear on the same column of your table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column). 4 If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important the first letter of the encrypted pair is the one that lies on the same row as the first letter of the plaintext pair.
16 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP
17 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI
18 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI TM
19 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI TM DR
20 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI TM DR VC
21 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI TM DR VC SB
22 Playfair Example Encryption Plaintext: Ciphertext: C R Y P T O L G A B D E F H I/J K M N Q S U V W X Z CY BE RS EC UR IT YX RP LI TM DR VC SB PW
23 Frequency Analysis Countermeasures for Frequency Analysis Use polygraphic substitution. But playfair or digraph ciphers are still vulnerable to two-letter frequency analysis. Computers allow frequency analysis on short polygraphic substitution (e.g. Playfair). 8-character simple substitution systems are probably secure. Problems of longer substitution Key is too long to use/store in practice Encryption and decryption become too complicated Note Idea of polygraphic substitution leads to the idea of Block Ciphers.
24 Kerkckhoffs s Principle Kerkckhoffs s Principle (1883) Cipher must not be required to be secret, and it must be able to fall into the hands of the enemy without inconvenience. In other words, the security of the system must rest entirely on the secrecy of the key. Claude Shannon The enemy knows the system. 3 B s of Cryptography Bribe, Burglary, Blackmail Warning Our national ciphers are not available for academic analysis.
25 The Unbreakable Cipher One-time Pad Generate a very long sequence of random bits (one-time pad) XOR the plaintext and the one-time pad to get the ciphertext XOR the ciphertext and the one-time pad to get the plaintext Example Plaintext One-time pad Ciphertext Warning One-time pad must be truly random Can only be used once
26 Unbreakable Cipher One-time Pad Perfect secrecy (ciphertext provides no information about plaintext) Usually printed on a single page with very small letters (hence the name one-time pad) Instead of working with bits, one can work on letters or characters Problems Key is too long Key distribution Randomness
27 Unbreakable Cipher Weakness key re-use Example (Key Re-use) If the adversary captures two ciphertexts C 1 and C 2 which were generated with the same key, then they can compute C 1 C 2 = (P 1 K) (P 2 K) = P 1 P 2 Then the adversary can use the redundancy of the language or statistical techniques to capture P 1 and P 2.
28 Unbreakable Cipher Note Venona Project: Soviet one-time pad messages sent from the US for a brief time during WWII used non-random key material. US cryptanalysts, beginning in the late 40s, were able to, entirely or partially, break a few thousand messages out of several hundred thousand. Thus, the unbreakable cipher can be broken when it is not used properly One-time pads are exchanged between Washington and Moscow in order to be used in the future if necessary. Idea of one-time pad leads to the idea of Stream Ciphers.
29 Cipher Machines Cipher Machines Technological advancement replaced pen and paper methods with machines. Famous example: Enigma. Enigma An Enigma Machine is an electro-mechanical rotor cipher machine. Used in 20th century in military and commercial sectors like banking. It generates a polyalphabetic substitution cipher. Cryptanalysis of Enigma by British mathematicians/cryptologists (with the initial help Polish cryptologists) changed the course of WWII.
30 WWI: Enigma
31 Cryptanalysis of Enigma Weakness Impossible event: A letter is never encrypted to itself. Example Cryptanalysis of Enigma during the WWII Idea: Plaintext may contain Keine besonderen Ereignisse (means nothing to report ) WW2 Cryptanalysis Germans constantly modified their machines during the war and the their latest cipher machines eluded Allied cryptologists.
32 Colossus Colossus Computer The first programmable electronic digital computer (1943). Developed by British codebreakers at Bletchley Park to cryptanalyse Lorenz cipher. Alan Turing s use of probability in cryptanalysis contributed to its design. Optically reads a paper tape and then applies programmable logical functions to the bits of the key and ciphertext characters, counting how often the function returned false. Destroyed by British after the WW2. Reconstructed in 2007, available in Bletchley Park in a museum.
33 Further Read Further Read David Kahn - The CodeBreakers (1996) Simon Singh - Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (2000)
2
1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver
More information10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationPART I Symmetric Ciphers
PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3
More informationCryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL
Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption
More informationJNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World
Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 13, 2012 CPSC 467b, Lecture 3 1/36 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview
Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationChapter 2: Classical Encryption Techniques
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm
More informationOVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationCryptography and Network Security Chapter 2
Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 Classical Encryption Techniques Many savages at the present day regard their names
More informationUNIT 2 CLASSICAL ENCRYPTION TECHNIQUES
CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES SYMMETRIC ENCRYPTION SOME BASIC TERMINOLOGY or conventional / private-key / single-key sender and recipient share a common
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationOverview of Conventional Encryption Techniques
Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption
More informationCryptography Symmetric Encryption Class 2
Cryptography Symmetric Encryption Class 2 Stallings: Ch 3 & 6 Stallings: Ch 4 CEN-5079: 18.January.2018 1 Symmetric Cryptosystems Encryption Key Decryption Key Plaintext Plaintext Encryption Algorithm
More informationCHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college
CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY Badran Awad Computer Department Palestine Technical college CHAPTER 1 Introduction Historical ciphers Information theoretic security Computational security Cryptanalysis
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More information(8) Cryptanalysis. Close-up of the rotors in a Fialka cipher machine
(8) Cryptanalysis Definition: Close-up of the rotors in a Fialka cipher machine Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") : is the study of methods for obtaining
More informationT H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions: Hash
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationLesson 7a - Encryption and Decryption
Lesson 7a - Encryption and Decryption Last Session Looked at encryption Vignere cipher This Session More ciphers The Playfair cipher Mechanical ciphers Stream and block ciphers The one-time pad Stream
More information1 Brief Overview Of the talk
CSA E0 235: Cryptography (Chalk and Talk-2) January 22, 2016 OTP Implementation Details and Cryptanalysis of Reusing Key Instructor: Arpita Patra Submitted by: Sruthi Sekar 1 Brief Overview Of the talk
More informationTextbook: Ahmet Burak Can Hacettepe University. Supplementary books:
Basic Ciphers Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman, and M. Speciner,
More informationCOMPLEXITY ACROSS DISCIPLINES
COMPLEXITY ACROSS DISCIPLINES REU 2015 INTRODUCTION TO CRYPTOGRAPHY Liljana Babinkostova Cybersecurity Defined Information Assurance. IA consists of measures that protect and defend information and information
More informationCLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment
CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationClassical Encryption Techniques
Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationIntroduction to Cryptology
crypttext 2018/1/9 13:06 page 1 #5 Chapter 1 Introduction to Cryptology Throughout the history of human communication, the practice of keeping information secret by disguising it, known as cryptography,
More informationClassical Cryptography. Thierry Sans
Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY
More informationA (Brief) History of Cryptography
Caesar Cipher A (Brief) History of Cryptography Ozalp Babaoglu A substitution cipher Each letter of the plaintext is replaced by a unique letter in the ciphertext Which letter? In the case of Caesar Cipher,
More informationOutline Basics of Data Encryption CS 239 Computer Security January 24, 2005
Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data
More informationCryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals
Cryptography December 9, 2008 1 Intercepting Information Scenario 1 Wireless broadcasts information using radio signals Any computer on a wireless network CAN listen to any network traffic http://www.geeksquad.com/
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationFrom Wikipedia, the free encyclopedia
Cryptography From Wikipedia, the free encyclopedia Cryptography or cryptology is a field of mathematics and computer science concerned with information security and related issues, particularly encryption
More informationBehrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18
Behrang Noohi School of Mathematical Sciences Queen Mary University of London 22 July 2014 Behrang Noohi (QMUL) 1 / 18 Introduction Secure Communication How can one send a secret message? Steganography
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 3 September 6, 2017 (appendix added 10/27/17) CPSC 467, Lecture 3 1/72 Secret Message Transmission Symmetric Cryptography Caesar
More informationCryptography Part II Introduction to Computer Security. Chapter 8
Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:
More informationUNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering. Introduction to Cryptography ECE 597XX/697XX. Part 1.
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 1 Introduction Israel Koren ECE597/697 Koren Part.1.1 Course Outline I. Introduction
More informationICT 6541 Applied Cryptography. Hossen Asiful Mustafa
ICT 6541 Applied Cryptography Hossen Asiful Mustafa Basic Communication Alice talking to Bob Alice Bob 2 Eavesdropping Eve listening the conversation Alice Bob 3 Secure Communication Eve listening the
More informationIntroduction to Cryptography. In the News: Hacker exposes embassies'
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography EECE 412 Copyright 2004-2007 Konstantin Beznosov In the News: Hacker exposes embassies' e-mail A Swedish security
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to
More informationClassical Cryptography
Classical Cryptography Chester Rebeiro IIT Madras STINSON : chapter 1 Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT,
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 1 Introduction to Cryptography ver. October 27, 2009 These slides were
More informationInformation Systems Security
Information Systems Security Dr. Ayman Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Chapter 2 Classical Encryption Techniques
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More information3D (6 X 4 X 4) - Playfair Cipher
3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital
More informationCryptosystems. Truong Tuan Anh CSE-HCMUT
Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationIntroduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017
Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017 Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in
More informationCSC 580 Cryptography and Computer Security
CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018 Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1,
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More informationCRYPTOGRAPHY. BY, Ayesha Farhin
CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer
More informationChapter 3. Cryptography. Information Security/System Security p. 33/617
Chapter 3 Cryptography Information Security/System Security p. 33/617 Introduction A very important tool for security is cryptography Cryptography is the (art and) science of keeping information secure
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 6 January 25, 2012 CPSC 467b, Lecture 6 1/46 Byte padding Chaining modes Stream ciphers Symmetric cryptosystem families Stream ciphers
More informationCryptography ThreeB. Ed Crowley. Fall 08
Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,
More informationCIT 380: Securing Computer Systems. Symmetric Cryptography
CIT 380: Securing Computer Systems Symmetric Cryptography Topics 1. Modular Arithmetic 2. What is Cryptography? 3. Transposition Ciphers 4. Substitution Ciphers 1. Cæsar cipher 2. Vigènere cipher 5. Cryptanalysis:
More informationLecture 2: Shared-Key Cryptography
Graduate Course on Computer Security Lecture 2: Cryptography Iliano Cervesato iliano@itd.nrl.navy.mil ITT Industries, Inc @ NRL Washington DC http://www.cs.stanford.edu/~iliano/ DIMI, Universita di Udine,
More informationCIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm
CIS 4360 Introduction to Computer Security Fall 2010 WITH ANSWERS in bold Name:.................................... Number:............ First Midterm Instructions This is a closed-book examination. Maximum
More informationThe Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American
Danielle Curran Dr. Derek Bruff Math 115F: Cryptography October 26, 2010 The Hill Cipher In 1929 Lester Hill, a professor at Hunter College, published an article in the American Mathematical Monthly called
More informationA Tour of Classical and Modern Cryptography
A Tour of Classical and Modern Cryptography Evan P. Dummit University of Rochester May 25, 2016 Outline Contents of this talk: Overview of cryptography (what cryptography is) Historical cryptography (how
More informationCryptanalysis. Ed Crowley
Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,
More informationConventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution
Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation
More informationCOMP4109 : Applied Cryptography
COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 4 (and 5 and maybe 6) secret-key primitives symmetric-key encryption security notions and types of
More informationPolyalphabetic cyphers
Unit 7 January 26, 2011 1 Polyalphabetic cyphers Let E 1, E 2,..., E n be distinct substitution cyphers. To encrypt a plaintext message P = p 1 p 2 p 3... apply the E i (i = 1,..., n) cyclically to the
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 1 Introduction to Cryptography ver. October 28, 2010 These slides were
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationCryptography Intro and RSA
Cryptography Intro and RSA Well, a gentle intro to cryptography, followed by a description of public key crypto and RSA. 1 Definition Cryptology is the study of secret writing Concerned with developing
More informationIntroduction to Cryptography. --- Foundations of computer security ---
Introduction to Cryptography --- Foundations of computer security --- Related Chapters Cryptography CHAPTER 2, A Cryptography Primer CHAPTER 37, Data Encryption CHAPTER 39, Public Key Infrastructure CHAPTER
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationIntroduction to Software Security Crypto Basics (Chapter 2)
Introduction to Software Security Crypto Basics (Chapter 2) Seong-je Cho Spring 2018 Computer Security & Operating Systems Lab, DKU Textbook Sources / References M. T. Goodrich and R. Tamassia, Introduction
More informationECE 646 Fall 2008 Multiple-choice test
ECE 646 Fall 2008 Multiple-choice test 1. (1 pt) Arrange the following ciphers in the order of the increasing measure of roughness for the ciphertext obtained by encrypting 1000-letter message with a given
More informationBlock Ciphers. Advanced Encryption Standard (AES)
Network Security - ISA 656 Angelos Stavrou September 28, 2008 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let
More informationIntroduction to Cryptology. Lecture 2
Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More informationMaking and Breaking Ciphers
Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationCS150: Problem Set 4: The Lorenz Cipher and the Postman's Computer
Page 1 of 8 University of Virginia, Department of Computer Science cs150: Computer Science Spring 2007 Problem Set 4: Creating Colossi Out: 12 February 2007 Due: 19 February 2007 (beginning of class) Collaboration
More informationCS150 Assignment 7 Cryptography
CS150 Assignment 7 Cryptography Date assigned: Monday, November 20, 2017 Date Due: Tuesday, December 5, 2017, 9:40am (40 points) There is no late grace period for this last assignment!!!!! Cryptography
More informationCryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1
Cryptography Encryption COMP620 Information Privacy & Security Cryptography in general represents the process of encrypting a plain text file into an unreadable cipher so that it can be stored and decrypted
More informationCSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography
CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More informationFile and Disk Encryption
File and Disk Encryption Alex Applegate 1 Overview Common Weak Encryption Stronger Methods Threat From File Encryption Full Disk Encryption (FDE) Threat From FDE 2 Common Types of Weak File Encryption
More informationL2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015
L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift
More informationClassic Cryptography: From Caesar to the Hot Line
Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationStudy Guide to Mideterm Exam
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible
More informationSurvey: Recent Modifications in Vigenere Cipher
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha
More informationExploring Cryptography Using CrypTool
NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information
More information