Cryptanalysis. Ed Crowley

Similar documents
Cryptography ThreeB. Ed Crowley. Fall 08

1-7 Attacks on Cryptosystems

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

(8) Cryptanalysis. Close-up of the rotors in a Fialka cipher machine

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CSCE 813 Internet Security Symmetric Cryptography

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

NETWORK SECURITY & CRYPTOGRAPHY

Classical Cryptography. Thierry Sans

Lecture 4: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Computer Security: Principles and Practice

2.1 Basic Cryptography Concepts

Cryptography MIS

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

(2½ hours) Total Marks: 75

Cryptography and Network Security

Syrvey on block ciphers

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Cryptography Math/CprE/InfAs 533

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Lecture IV : Cryptography, Fundamentals

Some Stuff About Crypto

CSC 474/574 Information Systems Security

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Computer Security CS 526

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

P2_L6 Symmetric Encryption Page 1

Cryptographic Concepts

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Content of this part

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptography Introduction to Computer Security. Chapter 8

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Computational Security, Stream and Block Cipher Functions

1.264 Lecture 28. Cryptography: Asymmetric keys

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

ECEN 5022 Cryptography

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Uses of Cryptography

Network Security and Cryptography. 2 September Marking Scheme

Ref:

CSCE 715: Network Systems Security

Secret Key Algorithms (DES)

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

CRYPTOGRAPHY. BY, Ayesha Farhin

CSE 127: Computer Security Cryptography. Kirill Levchenko

Security Requirements

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Chapter 3 Block Ciphers and the Data Encryption Standard

CPSC 467: Cryptography and Computer Security

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

UNIT - IV Cryptographic Hash Function 31.1

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

10EC832: NETWORK SECURITY

Introduction to Cryptology

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Encryption. INST 346, Section 0201 April 3, 2018

APNIC elearning: Cryptography Basics

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Public-key Cryptography: Theory and Practice

Shared Secret = Trust

Introduction to Cryptography. Vasil Slavov William Jewell College

Introduction to Cryptography

The Rectangle Attack

Symmetric, Asymmetric, and One Way Technologies

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Modern Cryptography Activity 1: Caesar Ciphers

PASSWORDS & ENCRYPTION

Cryptography Introduction

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

PRNGs & DES. Luke Anderson. 16 th March University Of Sydney.

Module 1: Classical Symmetric Ciphers

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

Sirindhorn International Institute of Technology Thammasat University

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

S. Erfani, ECE Dept., University of Windsor Network Security

Introduction to Cryptology. Lecture 2

L13. Reviews. Rocky K. C. Chang, April 10, 2015

CSC 774 Network Security

CPSC 467: Cryptography and Computer Security

KALASALINGAM UNIVERSITY

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Foundations of Cryptology

Transcription:

Cryptanalysis Ed Crowley 1

Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2

Cryptanalysis Science of cracking ciphers and codes, decoding secrets, violating authentication schemes, and in general, breaking cryptographic protocols. 3

Cryptanalysis History 1920, William Friedman coined the term "cryptanalysis" to describe methods for breaking codes and ciphers. Though, the craft of cryptanalysis is much older. For most classical ciphers, frequency analysis is the basic tool. In natural languages, certain letters of the alphabet appear more frequently. In any sample of English plaintext, "E" is likely to be the most common letter. Similarly, the digraph "TH" is the most likely pair of letters. Frequency analysis relies on a cipher failing to hide these statistics. 4

Rise of Mathematics As ciphers became more complex, mathematics became more important in cryptanalysis. This change was particularly evident during World War II. Efforts to crack Axis ciphers required new levels of mathematical sophistication. Automation was first applied to cryptanalysis in that era with the Polish Bomba device 5

Modern Cryptanalysis Context By most measures, modern cryptography has become much more impervious to cryptanalysis than the pen-and-paper systems of the past. Most attacks are against the implementation and few are against the underlying algorithm. As William Hugh Murray has observed, there are an infinite number of ways to implement an algorithm, most of them wrong. While we can make statements, about cryptographic strength in the abstract, we can only make statements about security in a specific application and environment context. 6

Modern Context Computers have both increased the need for, and decreased the cost of, cryptography. Effectiveness of cryptographic algorithms now resides in complexity rather than in secrecy. Understand that strong security is different than strong cryptography. While modern algorithms are resistant to all but the most resourceful attacks, in practice they are no stronger than the systems and applications in which they are used. 7

Examples The A5/1, A5/2 and CMEA algorithms, used in mobile phone technology, can all be broken in hours, minutes or even in real-time using widely-available computing equipment. In 2001, Wired Equivalent Privacy (WEP), a protocol used to secure Wi-Fi wireless networks, was shown to be susceptible to several practical related-key attack. 8

Characterizing Cryptographic Attacks Goal Gain ability to decrypt new cipher text Without additional information. Intermediate goal: crack message key. Attacks characterized by three criteria. 1. Prerequisite knowledge and capabilities needed 2. Additional secret information deduced 3. Effort required 9

Attack Types Prior knowledge scenarios Ciphertext Only Known Plaintext Chosen Plaintext Adaptive Chosen Plaintext Differential Cryptanalysis Chosen ciphertext Adaptive chosen ciphertext Symmetric Algorithm Attacks Brute Force Meet in the Middle Statistical Hash Attacks Birthday attack Network Attacks Man in the Middle Replay External attacks: Black-bag cryptanalysis Rubber-hose cryptanalysis 10

Cryptographic Attacks Ciphertext Only Cryptanalyst obtains several ciphertext samples. Without plaintext Goal: Determine key. Most difficult type of attack. Requires a very large ciphertext sample. Known Plaintext Based upon ciphertext/corresponding plaintext samples. Could be partial (repeating headers) Goal: determine key 11

Cryptographic Attacks Chosen Plaintext Cryptanalyst can choose what plain text message he wishes to encrypt and view the results. Much, much, stronger than known plain text attack. Optimum type of attack. 12

Cryptographic Attacks Adaptive Chosen Plaintext Special case of chosen-plaintext attack in which the cryptanalyst is able to choose plaintext samples dynamically, and alter his or her choices based on the results of previous encryptions. 13

Linear Cryptanalysis Specific type of chosen plaintext attack Succeeded in 1992 against DES Took 50 days Took 2 14 operations Faster than brute force but not relevant 14

Differential Cryptanalysis Differential Cryptanalysis Specific type of chosen plaintext attack. Looks at the difference between two text blocks Makes use of the fact that after a specific number of rounds, diverse differences bring out specific intermediate results with different probabilities. Based on this, and the known difference between input and output, a statistical forecast can be made about the key Goal: obtain key 15

Cryptographic Attacks Chosen-ciphertext Cryptanalyst may choose a piece of cipher text and attempt to obtain the corresponding plaintext. Generally utilized with public-key cryptosystems Adaptive-chosen-ciphertext Scenario in which a cryptanalyst has free use of a piece of decryption hardware, but is unable to extract the decryption key from it. 16

Symmetric Algorithm Attacks Brute Force Meet in the middle Differential cryptanalysis Statistical 17

Brute Force Originally meant trying every possible key until correct key is identified. Advances in computing performance over time makes brute force an increasingly practical attack against fixed length keys. In certain contexts, a dictionary attack can be considered a form of brute force. Now, most often implemented as smart brute force attacks Not all cryptosystems utilize key space appropriately. Those that don t are vulnerable to smart brute force attacks. Makes key likely to be found without searching the entire keyspace. 18

Symmetric Attacks Meet in the Middle Applied to double encryption schemes by encrypting known plaintext from one end with each possible key and comparing the results in the middle. Works brute force from both ends. Why 2DES doesn t work Statistical Exploiting the lack of randomness in key generation. 19

Hash Attacks Birthday attack Usually applied to the probability of two different messages using the same hash function that produces a common message digest or Given a message and its corresponding message digest, finding another message that when passed through the same hash function generates the same specific message digest. 20

Network Attacks Man in the Middle An attacker taking advantage of the store and forward nature of a network. Works by intercepting messages and forwarding modified versions of the original messages while in-between two parties attempting secure communications. SSL vulnerability 21

Algorithm Criteria A good algorithm must withstand a chosen plaintext attack, otherwise it is not secure. If known plain text or a cipher text only attack succeeds, then algorithm should be discarded. 22

Side Channel Attack 23

Questions? References FM 34-40-2, Basic Cryptanalysis http://www.umich.edu/~umich/fm-34-40-2/ 24