Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Size: px
Start display at page:

Download "Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview"

Transcription

1 Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology 31 August 2016 rev Egemen K. Çetinkaya

2 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Outline 31 August 2016 MST CPE 5420 Cryptology Overview 2

3 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Symmetric Encryption 31 August 2016 MST CPE 5420 Cryptology Overview 3

4 Plaintext Encryption Techniques Definitions 1 the original message Ciphertext the coded message Enciphering or encryption process of converting from plaintext to ciphertext Deciphering or decryption restoring the plaintext from the ciphertext 31 August 2016 MST CPE 5420 Cryptology Overview 4

5 Cryptography Encryption Techniques Definitions 2 study of encryption Cryptographic system or cipher schemes used for encryption Cryptanalysis deciphering without any knowledge of enciphering details Cryptology breaking the code areas of cryptography and cryptanalysis together 31 August 2016 MST CPE 5420 Cryptology Overview 5

6 Symmetric Encryption Definition aka: conventional encryption or single-key encryption Only encryption prior to 1970s development of public-key encryption One of two most widely used encryption technique symmetric asymmetric Examples of symmetric encryption algorithms? 31 August 2016 MST CPE 5420 Cryptology Overview 6

7 Symmetric Encryption Definition aka: conventional encryption or single-key encryption Only encryption prior to 1970s development of public-key encryption One of two most widely used encryption technique symmetric asymmetric Examples of symmetric encryption algorithms: DES: data encryption standard AES: advanced encryption standard 31 August 2016 MST CPE 5420 Cryptology Overview 7

8 Symmetric Encryption Simplified Model plaintext, X : intelligible message, input to encryption algo. encryption algorithm, E : substitutions and transformations secret key, K : input to encryption algorithm ciphertext, Y : unintelligible scrambled text decryption algorithm, D : reverse of encryption algorithm 31 August 2016 MST CPE 5420 Cryptology Overview 8

9 Symmetric Encryption Cryptosystem Model strong encryption algorithm, but not secret unable to determine the key or decrypt the ciphertext share the keys in a secure fashion 31 August 2016 MST CPE 5420 Cryptology Overview 9

10 Cryptography Cryptographic System Types Operation type transforming plaintext to ciphertext substitution: elements mapped into another transposition: elements are rearranged essential requirement - information is not lost and reversible The number of keys used symmetric, single-key, secret-key, private-key asymmetric, two-key, public-key The way in which the plaintext is processed block cipher stream cipher 31 August 2016 MST CPE 5420 Cryptology Overview 10

11 Cryptanalysis Attack Types on Encryption System Attacker aims to recover the key rather than a plaintext of a single ciphertext for recovering any messages in the future as well Two types of attacks against crypto system cryptanalysis exploits algorithm characteristics or plain-cipher-text pairs brute-force attack attacker tries every possible key on ciphertext on average, half of all possible keys must be tried some degree of knowledge about plaintext is needed as the key space increases, becomes practically impossible 31 August 2016 MST CPE 5420 Cryptology Overview 11

12 Cryptanalysis Attack Types on Encrypted Messages Assumption: cryptanalyst have access to encryption algorithm and ciphertext Ciphertext only Known plaintext one or more plaintext-ciphertext pairs are known Chosen plaintext plaintext chosen by cryptanalyst Chosen ciphertext ciphertext chosen by cryptanalyst Chosen text combination of ciphertext and plaintext 31 August 2016 MST CPE 5420 Cryptology Overview 12

13 Cryptography Encryption Scheme Security Unconditionally (perfectly) secure ciphertext generated by the scheme does not contain enough information to determine corresponding plaintext adversary does not learn anything despite time & resources except one-time-pad there is no algorithm in this category Computationally secure cost of breaking cipher exceeds value of encrypted info time required to break cipher exceeds useful lifetime of info 31 August 2016 MST CPE 5420 Cryptology Overview 13

14 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Substitution Ciphers 31 August 2016 MST CPE 5420 Cryptology Overview 14

15 Substitution Techniques Overview Letters of plaintext are replaced by other: letters numbers symbols Examples? 31 August 2016 MST CPE 5420 Cryptology Overview 15

16 Substitution Techniques Examples Letters of plaintext are replaced by other: letters numbers symbols Examples: Caesar cipher monoalphabetic substitution cipher Playfair cipher Hill cipher polyalphabetic substitution cipher: Vigenère, Vernam one-time pad 31 August 2016 MST CPE 5420 Cryptology Overview 16

17 Substitution Techniques Caesar Cipher Simplest and earliest known substitution cipher used by Julius Caesar for military messages also known as shift cipher Replaces each letter of the alphabet with letter by some fixed number of positions Caesar cipher: three places further down the alphabet Alphabet is wrapped around plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C 31 August 2016 MST CPE 5420 Cryptology Overview 17

18 Substitution Techniques Caesar Cipher Algorithm Caesar algorithm can be expressed as: C = E(3, p ) = ( p + 3) mod 26 A shift may be of any amount C = E(k, p ) = ( p + k ) mod 26 Where key k takes on a value in the range 1 to 25 Decryption algorithm is simply: p = D( k, C ) = ( C k ) mod 26 Important characteristics brute-force cryptanalysis: encryption and decryption algorithms are known there are only 25 keys to try language of the plaintext is known and easily recognizable 31 August 2016 MST CPE 5420 Cryptology Overview 18

19 Substitution Techniques Monoalphabetic Substitution Cipher Caesar cipher is not secure with only 25 possible keys Arbitrary substitution increases the key space If permutation of 26 alphabetic characters is used, then there are 26! or ~ 4 x possible keys Easy to break using frequency of data Countermeasure is to provide multiple substitutes homophones for a single letter a letter is assigned different cipher symbols: e 16, 74, 35 each homophone assigned to a letter in rotation or randomly 31 August 2016 MST CPE 5420 Cryptology Overview 19

20 Substitution Techniques Relative Frequency of Letters in English Text If the message is long, message can be cracked 31 August 2016 MST CPE 5420 Cryptology Overview 20

21 Substitution Techniques English Alphabet Number of letters? Number of vowels? Number of consonants? Digrams: two letter combinations, common ones? Trigrams: three letter combinations, common ones? Common words? 31 August 2016 MST CPE 5420 Cryptology Overview 21

22 Substitution Techniques English Alphabet Egemen K. Çetinkaya Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Vowels: A E I O U Consonants: B C D F G H J K L M N P Q R S T V W X Y Z Common digrams: TH, IN, ER, RE, AN Common trigrams: THE, ING, AND, ION, ENT Common words: THE, OF, AND, TO, A Frequency of AEIOU: 39% Frequency of LNRST: 33% Frequency of JKQXZ: 1% [ref: 31 August 2016 MST CPE 5420 Cryptology Overview 22

23 Substitution Techniques Playfair Cipher Egemen K. Çetinkaya Best-known multiple-letter encryption cipher Brief history: invented by Sir Charles Wheatstone in 1854 perfected by Lord Baron Playfair at British foreign office used as the standard field system by British Army in World War I US Army and allies during World War II first published solution in 1914 by Joseph O. Mauborgne Treats digrams in the plaintext as single units translates these units into ciphertext digrams Based on the use of a 5 x 5 matrix of letters constructed using a keyword 31 August 2016 MST CPE 5420 Cryptology Overview 23

24 Substitution Techniques Playfair Cipher Algorithm Plaintext is encrypted two letters at a time Repeating plaintext letters are separated with a filler balloon would be treated as ba lx lo on; x is filler letter Plaintext letters that are on the same row of the matrix are each replaced by the letter to the right for example, ar is encrypted as RM Plaintext letters that are on the same column are each replaced by the letter beneath for example, mu is encrypted as CM Otherwise, each plaintext letter in a pair is replaced by the letter that lies in its own row and the column 31 August 2016 MST CPE 5420 Cryptology Overview 24

25 Substitution Techniques Playfair Cipher Example Fill in letters of keyword from left to right and from top to bottom excluding duplicates Example using the keyword MONARCHY hs BP and ea IM or JM M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z 31 August 2016 MST CPE 5420 Cryptology Overview 25

26 Substitution Techniques Hill Cipher Developed by the mathematician Lester Hill in 1929 Hides single-letter frequencies as Playfair cipher Larger matrix hides more frequency information 3 x 3 Hill cipher hides single-letter frequency information two-letter frequency information Strong against a ciphertext-only attack Easily broken with a known plaintext attack 31 August 2016 MST CPE 5420 Cryptology Overview 26

27 Substitution Techniques Polyalphabetic Substitution Cipher Improves on the simple monoalphabetic technique Uses different monoalphabetic substitutions Common features: set of related monoalphabetic substitution rules is used key determines which particular rule is chosen Canonical examples: Vigenère cipher Vernam cipher 31 August 2016 MST CPE 5420 Cryptology Overview 27

28 Substitution Techniques Vigenère Cipher Best known and one of the simplest Multiple ciphertext letters for each plaintext letter Substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25 A key is needed that is as long as the message Usually, the key is a repeating keyword 31 August 2016 MST CPE 5420 Cryptology Overview 28

29 Substitution Techniques Tabula Recta Egemen K. Çetinkaya Vigenère table is formed by shifting letters cyclically 31 August 2016 MST CPE 5420 Cryptology Overview 29

30 Substitution Techniques Vigenère Cipher Example Keyword: computer Message: crypto is cool Key: COMPUTERCOMP Plaintext: CRYPTOISCOOL Ciphertext:EFKENHMJECAA 31 August 2016 MST CPE 5420 Cryptology Overview 30

31 Substitution Techniques Vigenère Autokey System Periodic nature of keyword can be eliminated by nonrepeating keyword Autokey system: keyword is concatenated with the plaintext itself Keyword: computer Message: crypto is cool Key: Plaintext: Ciphertext: COMPUTERCRYP CRYPTOISCOOL EFKENHMJEFMA 31 August 2016 MST CPE 5420 Cryptology Overview 31

32 Substitution Techniques Vernam Cipher Introduced by Gilbert Vernam in AT&T Works on binary bits rather than letters XORing ( ) the plaintext and the key Requires a very long but repeating keyword 31 August 2016 MST CPE 5420 Cryptology Overview 32

33 Substitution Techniques One-Time Pad Vernam cipher eliminates frequency analysis keyword has no statistical relationship to plaintext partially: uses long key but repeating Joseph Mauborgne proposed one-time pad Uses random key that is as long as the message Key is not repeated after a message is encrypted/decrypted, it is discarded Scheme is unbreakable produces random output no statistical relationship to the plaintext ciphertext contains no information about the plaintext there is simply no way to break the code 31 August 2016 MST CPE 5420 Cryptology Overview 33

34 Substitution Techniques One-Time Pad Properties One-time pad relies on the randomness of the key One-time pad offers complete security The constraints are: generating large quantities of random keys key distribution and protection is significant issue It is used for high-security communication 31 August 2016 MST CPE 5420 Cryptology Overview 34

35 Substitution Techniques Cipher Comparison Egemen K. Çetinkaya Relative frequency of occurrence of letters 31 August 2016 MST CPE 5420 Cryptology Overview 35

36 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Transposition Ciphers 31 August 2016 MST CPE 5420 Cryptology Overview 36

37 Transposition Techniques Overview Permutation on the plaintext letters reordering the plaintext Examples? 31 August 2016 MST CPE 5420 Cryptology Overview 37

38 Transposition Techniques Examples Permutation on the plaintext letters reordering the plaintext Examples: rail fence raw transposition cipher Frequency analysis still possible They can be cracked by anagrams sliding text around Security increase by more transposition stages 31 August 2016 MST CPE 5420 Cryptology Overview 38

39 Transposition Techniques Rail Fence Cipher Simplest transposition cipher Also called zigzag cipher Algorithm is two step: plaintext is written down as a sequence of diagonals then read off as a sequence of rows Example with 3 rails (or fences) W... E... H... O... C... T... A... E. R. I. T. E. O. L. E. U. I. Y. L. S... A... N... C... S... R... C... S Ciphertext: WEHOCTAERITEOLEUIYLSANCSRCS Plaintext? 31 August 2016 MST CPE 5420 Cryptology Overview 39

40 Transposition Techniques Raw Transposition Cipher Also called columnar transposition, more complex Algorithm works: write the message in a rectangle, row by row and read the message off, column by column but permute the order of the columns order of columns becomes key to the algorithm 31 August 2016 MST CPE 5420 Cryptology Overview 40

41 Transposition Techniques Raw Transposition Cipher Example D O Y O U L I K E T H E C L A S S X Example: key length? null? ciphertext? 31 August 2016 MST CPE 5420 Cryptology Overview 41

42 Transposition Techniques Raw Transposition Cipher Example D O Y O U L I K E T H E C L A S S X Example: key length: 6 null: X ciphertext: OKL YEA UHS OTS LEX DIC 31 August 2016 MST CPE 5420 Cryptology Overview 42

43 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Machine Ciphers 31 August 2016 MST CPE 5420 Cryptology Overview 43

44 Cryptography Machine Ciphers Multiple stages of encryption difficult to cryptanalyze Widespread use in Examples? 31 August 2016 MST CPE 5420 Cryptology Overview 44

45 Cryptography Machine Ciphers Multiple stages of encryption difficult to cryptanalyze Widespread use in Examples: Rotor machine Enigma machine Purple machine 31 August 2016 MST CPE 5420 Cryptology Overview 45

46 Symmetric encryption Substitution ciphers Transposition ciphers Machine ciphers Steganography Cryptology Overview Steganography 31 August 2016 MST CPE 5420 Cryptology Overview 46

47 Steganography Overview Conceal the existence of the message Cryptography: message unintelligible to outsiders Steganography techniques: character marking invisible ink pin punctures typewritter correction ribbon 31 August 2016 MST CPE 5420 Cryptology Overview 47

48 Steganography A Puzzle for Inspector Morse Egemen K. Çetinkaya Can you see the hidden message? 31 August 2016 MST CPE 5420 Cryptology Overview 48

49 Steganography Love Letter from 1850s 31 August 2016 MST CPE 5420 Cryptology Overview 49

50 Security vs. Obscurity Overview Idea around secrecy of the design if the attackers don t know design, they unlikely to attack primarily valid in early crypto work also called security by obscurity Modern crypto is around simplicity principle design should be easily explained strength should be in the key (key length) and algorithm also called security by design or open security Would you rather: hide your money under a tree or put it in safe? 31 August 2016 MST CPE 5420 Cryptology Overview 50

51 References and Further Reading [S2017] William Stallings, Cryptography and Network Security: Principles and Practice, 7th edition, Prentice Hall, [KPS2002] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 2nd edition, Prentice Hall, Fun links: August 2016 MST CPE 5420 Cryptology Overview 51

52 End of Foils 31 August 2016 MST CPE 5420 Cryptology Overview 52

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

PART I Symmetric Ciphers

PART I Symmetric Ciphers PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

Chapter 2: Classical Encryption Techniques

Chapter 2: Classical Encryption Techniques CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic

More information

Classical Encryption Techniques

Classical Encryption Techniques Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption

More information

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

Classical Encryption Techniques

Classical Encryption Techniques Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Cryptography and Network Security Chapter 2

Cryptography and Network Security Chapter 2 Cryptography and Network Security Chapter 2 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 Classical Encryption Techniques Many savages at the present day regard their names

More information

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

2

2 1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver

More information

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES CRYPTOGRAPHY AND NETWORK SECURITY UNIT 2 UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES SYMMETRIC ENCRYPTION SOME BASIC TERMINOLOGY or conventional / private-key / single-key sender and recipient share a common

More information

Cryptography Symmetric Encryption Class 2

Cryptography Symmetric Encryption Class 2 Cryptography Symmetric Encryption Class 2 Stallings: Ch 3 & 6 Stallings: Ch 4 CEN-5079: 18.January.2018 1 Symmetric Cryptosystems Encryption Key Decryption Key Plaintext Plaintext Encryption Algorithm

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not

More information

Information Systems Security

Information Systems Security Information Systems Security Dr. Ayman Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Chapter 2 Classical Encryption Techniques

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data

More information

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

Classical Cryptography. Thierry Sans

Classical Cryptography. Thierry Sans Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY

More information

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis

More information

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition

More information

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

ENGR/CS 101 CS Session Lecture 5

ENGR/CS 101 CS Session Lecture 5 ENGR/CS 101 CS Session Lecture 5 No programming today Submission system will be demonstrated at the end of class. Lecture 5 ENGR/CS 101 Computer Science Session 1 Outline Problem: How to send a secret

More information

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018 Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1,

More information

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography. Vasil Slavov William Jewell College Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,

More information

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing Outline CSCI 454/554 Computer and Network Security Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues Topic 2. Introduction to Cryptography 2 Cryptography Basic Concepts

More information

Cryptography Introduction to Computer Security. Chapter 8

Cryptography Introduction to Computer Security. Chapter 8 Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

Block Encryption and DES

Block Encryption and DES Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶 Network Security 網路安全 Lecture 3 March 16, 2015 洪國寶 1 Outline Review: Symmetric encryption -- Classical techniques (Cont.) Symmetric encryption -- Modern techniques secure encryption schemes modern symmetric

More information

Module 1: Classical Symmetric Ciphers

Module 1: Classical Symmetric Ciphers Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books: Basic Ciphers Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman, and M. Speciner,

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation 2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is

More information

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18 Behrang Noohi School of Mathematical Sciences Queen Mary University of London 22 July 2014 Behrang Noohi (QMUL) 1 / 18 Introduction Secure Communication How can one send a secret message? Steganography

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 13, 2012 CPSC 467b, Lecture 3 1/36 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Cryptography Part II Introduction to Computer Security. Chapter 8

Cryptography Part II Introduction to Computer Security. Chapter 8 Cryptography Part II Introduction to Computer Security Chapter 8 Vigènere Cipher Like Cæsar cipher, but use phrase Example Message: THE BOY HAS THE BALL Key: VIG Encipher using Cæsar cipher for each letter:

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

Classical Cryptography

Classical Cryptography Classical Cryptography Chester Rebeiro IIT Madras STINSON : chapter 1 Ciphers Symmetric Algorithms Encryption and Decryption use the same key i.e. K E = K D Examples: Block Ciphers : DES, AES, PRESENT,

More information

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015 L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Lecture 6 Michael J. Fischer Department of Computer Science Yale University January 27, 2010 Michael J. Fischer CPSC 467b, Lecture 6 1/36 1 Using block ciphers

More information

Introduction to Software Security Crypto Basics (Chapter 2)

Introduction to Software Security Crypto Basics (Chapter 2) Introduction to Software Security Crypto Basics (Chapter 2) Seong-je Cho Spring 2018 Computer Security & Operating Systems Lab, DKU Textbook Sources / References M. T. Goodrich and R. Tamassia, Introduction

More information

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Introduction to Cryptography 1 Module Outline Historical background Classic ciphers One-time pad The Random Oracle model Random functions: Hash

More information

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels Lecture 2 Cryptography: History + Simple Encryption,Methods & Preliminaries 1 Cryptography can be used at different levels algorithms: encryption, signatures, hashing, RNG protocols (2 or more parties):

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 CRYPTOGRAPHY Cryptography is an art and science of hiding existing data from the external environment. This is an approach of converting the original message into coded and scrambled

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to

More information

Survey: Recent Modifications in Vigenere Cipher

Survey: Recent Modifications in Vigenere Cipher IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha

More information

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore CSE 484 / CSE M 584 Computer Security TA: Jared Moore jlcmoore@cs Logistics Lab #1 due next Friday Today: Lab 1 questions. Authentication grab bag. (if time) Cryptography Password Salting Servers shouldn

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers.

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers. Unit-II Symmetric Ciphers Objectives: To define the terms and contents of symmetric key ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers. To describe

More information

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University and NBER

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University and NBER Innovation and Cryptoventures Cryptology Campbell R. Harvey Duke University and NBER Campbell R. Harvey 2018 Overview Cryptology Cryptography Cryptanalysis Symmetric Ciphers Asymmetric Ciphers Protocols

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Exploring Cryptography Using CrypTool

Exploring Cryptography Using CrypTool NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information

More information

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography

More information

Some Stuff About Crypto

Some Stuff About Crypto Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 6 January 25, 2012 CPSC 467b, Lecture 6 1/46 Byte padding Chaining modes Stream ciphers Symmetric cryptosystem families Stream ciphers

More information

Cryptography BITS F463 S.K. Sahay

Cryptography BITS F463 S.K. Sahay Cryptography BITS F463 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Cryptography 1 Terminology Cryptography: science of secret writing with the goal of hiding the meaning of a message.

More information

Chapter 3. Cryptography. Information Security/System Security p. 33/617

Chapter 3. Cryptography. Information Security/System Security p. 33/617 Chapter 3 Cryptography Information Security/System Security p. 33/617 Introduction A very important tool for security is cryptography Cryptography is the (art and) science of keeping information secure

More information

2.3 SUBTITUTION CIPHERS.

2.3 SUBTITUTION CIPHERS. Lec 5 : Data Security Substitution Cipher Systems 1 2.3 SUBTITUTION CIPHERS. 2.3.1 SIMPLE SUBTTTUION CIPHERS: In simple substitution (or monoalphabetic) ciphers, each character of the plaintext is replaced

More information

Making and Breaking Ciphers

Making and Breaking Ciphers Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation

More information

SKP Engineering College

SKP Engineering College SKP Engineering College Tiruvannamalai 606611 A Course Material on Cryptography and Network Security By G.Rajkumar Assistant Professor Electronics and Communication Engineering Electronics and Communication

More information

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation

More information

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Module 13 Network Security. Version 1 ECE, IIT Kharagpur Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures

More information

Nature Sunday Academy Lesson Plan

Nature Sunday Academy Lesson Plan Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns

More information

Introduction to Symmetric Cryptography

Introduction to Symmetric Cryptography Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography

More information

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using

More information

Classical Encryption Techniques

Classical Encryption Techniques Contents Some Basic Terminology... 15 Cryptanalysis... 15 Brute Force Search... 17 Conventional Encryption Principles... 18 Symmetric Encryption... 18 Symmetric Cipher Model... 19 Classical Substitution

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography ThreeB. Ed Crowley. Fall 08 Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,

More information

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret

More information

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES International Journal of Information Technology and Knowledge Management July-December 2008, Volume 1, No. 2, pp. 475-483 IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:

More information

Introduction to Network Security Missouri S&T University CPE 5420 Network Access Control

Introduction to Network Security Missouri S&T University CPE 5420 Network Access Control Introduction to Network Security Missouri S&T University CPE 5420 Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu

More information

7. Symmetric encryption. symmetric cryptography 1

7. Symmetric encryption. symmetric cryptography 1 CIS 5371 Cryptography 7. Symmetric encryption symmetric cryptography 1 Cryptographic systems Cryptosystem: t (MCKK GED) (M,C,K,K,G,E,D) M, plaintext message space C, ciphertext message space K, K, encryption

More information

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa ICT 6541 Applied Cryptography Hossen Asiful Mustafa Basic Communication Alice talking to Bob Alice Bob 2 Eavesdropping Eve listening the conversation Alice Bob 3 Secure Communication Eve listening the

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1 Cryptography Encryption COMP620 Information Privacy & Security Cryptography in general represents the process of encrypting a plain text file into an unreadable cipher so that it can be stored and decrypted

More information