Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Similar documents
Introduction. Ahmet Burak Can Hacettepe University. Information Security

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Classical Cryptography. Thierry Sans

Cryptanalysis. Ed Crowley

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography ThreeB. Ed Crowley. Fall 08

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Classical Encryption Techniques. CSS 322 Security and Cryptography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Classical Encryption Techniques

CSC 474/574 Information Systems Security

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Computers and Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CSCE 715: Network Systems Security

Classical Cryptography

Cryptography Introduction to Computer Security. Chapter 8

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CSC 580 Cryptography and Computer Security

Cryptography and Network Security

Cryptography MIS

Classical Encryption Techniques

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Chapter 2: Classical Encryption Techniques

Cryptography Introduction

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Cryptographic Concepts

Lecture IV : Cryptography, Fundamentals

Lecture 2: Shared-Key Cryptography

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CIT 380: Securing Computer Systems. Symmetric Cryptography

Some Stuff About Crypto

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Information Security CS526

Security. Communication security. System Security

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

APNIC elearning: Cryptography Basics

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Foundations of Cryptology

CCNA Security 1.1 Instructional Resource

Introduction to Cryptography. In the News: Hacker exposes embassies'

Cryptography Math/CprE/InfAs 533

Ref:

CRYPTOGRAPHY. BY, Ayesha Farhin

Introduction to Cryptology

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

CSCE 813 Internet Security Symmetric Cryptography

PART I Symmetric Ciphers

(2½ hours) Total Marks: 75

KALASALINGAM UNIVERSITY

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

CPS2323. Block Ciphers: The Data Encryption Standard (DES)

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptology. Lecture 2

LECTURE 4: Cryptography

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

From Wikipedia, the free encyclopedia

2.1 Basic Cryptography Concepts

Survey: Recent Modifications in Vigenere Cipher

Channel Coding and Cryptography Part II: Introduction to Cryptography

Exploring Cryptography Using CrypTool

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Introduction to Cryptography

EEC-484/584 Computer Networks

(8) Cryptanalysis. Close-up of the rotors in a Fialka cipher machine

Cryptography Introduction

File and Disk Encryption

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

CPSC 467b: Cryptography and Computer Security

A SIMPLIFIED IDEA ALGORITHM

Encryption. INST 346, Section 0201 April 3, 2018

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptography and Network Security

2

ECE 646 Fall 2008 Multiple-choice test

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

E-Commerce/Web Security

Cryptography and Network Security Chapter 2

Introduction to Software Security Crypto Basics (Chapter 2)

Introduction to Cryptography. Vasil Slavov William Jewell College

Transcription:

Basic Ciphers Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Books Textbook: Network Security: Private Communication in a Public World, 2nd Edition. C. Kaufman, R. Perlman, and M. Speciner, Prentice-Hall Security in Computing. C. P. Pfleeger and S. L. Pfleeger, Prentice Hall Supplementary books: Applied Cryptography: Protocols, Algorithms, and Source Code in C, B. Schneier, John Wiley & Sons. Handbook of Applied Cryptography.A. Menezes, P. van Oorschot and S. Vanstone. CRC Press Security Engineering: A Guide to Building Dependable Distributed Systems, Ross J. Anderson, John Wiley & Sons 1 2 Outline of the Course Basic ciphers Block ciphers, Encryption modes and Stream ciphers Hash functions, message digests, HMAC Number Theory, Public Key Cryptography, RSA Digital certificates and signatures, X509 Auhentication: Two-Three factor authentication, Biometrics, Smart Cards Security Handshake Real-time Communication Security, SSL/TLS, IPSEC Kerberos Outline of the Course Threshold cryptography Operating System Security Malicious Software: Trojans, logic bombs, viruses, worms,botnets, rootkits, trapdoors and cover channels Firewalls, VPNs, Intrusion detection systems If time permits: Program Security HTTP and Web Application Security, XSS Wireless Security: WEP and WPA 3 4 Which Security Concept? Information Security Computer Security: Ensure security of data kept on the computer Network Security: Ensure security of communication over insecure medium Computer Security Network Security Computer Security Approaches to Secure Communication Steganography hides the existence of a message Information Security Cryptography hide the meaning of a message 5 6

Basic Security Goals Privacy (secrecy, confidentiality) only the intended recipient can see the communication Authenticity (integrity) the communication is generated by the alleged sender Authorization limit the resources that a user can access Availability make the services available 99.999 % of time Non-repudiation no party can refuse the validity of its actions Auditing Take a log of everything done in the system Basic Terminology in Cryptography 1 Cryptography: the study of mathematical techniques related to aspects of providing information security services. Cryptanalysis: the study of mathematical techniques for attempting to defeat information security services. Cryptology: the study of cryptography and cryptanalysis. 7 8 Basic Terminology in Cryptography 2 Encryption (encipherment): the process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone except those possessing special knowledge Decryption (decipherment): the process of making the encrypted information readable again Key: the special knowledge shared between communicating parties Plaintext: the data to be concealed. Ciphertext: the result of encryption on the plaintext Encryption & Decryption Key Encryption Key Decryption Plaintext Ciphertext Original Plaintext 9 10 Breaking Ciphers There are different methods of breaking a cipher, depending on: the type of information available to the attacker the interaction with the cipher machine the computational power available to the attacker Breaking Ciphers Attack Types Ciphertext-only attack: The cryptanalyst knows only the ciphertext. Sometimes the language of the plaintext is also known. The goal is to find the plaintext and the key. Any encryption scheme vulnerable to this type of attack is considered to be completely insecure. Known-plaintext attack: The cryptanalyst knows one or several pairs of ciphertext and the corresponding plaintext. The goal is to find the key used to encrypt these messages or a way to decrypt any new messages that use that key. 11 12

Breaking Ciphers - Attack Types Chosen-plaintext attack : The cryptanalyst can choose a number of messages and obtain the ciphertexts for them The goal is to deduce the key used in the other encrypted messages or decrypt any new messages using that key. Chosen-ciphertext attack: Similar to the chosenplaintext attack, but the cryptanalyst can choose a number of ciphertexts and obtain the plaintexts. Today s Ciphers Shift Cipher Mono-alphabetical Substitution Cipher Polyalphabetic Substitution Ciphers Rotor Machine Enigma 13 14 Shift Cipher A substitution cipher The Key Space: [1.. 25] Encryption given a key K: each letter in the plaintext P is replaced with the K th letter following corresponding number (shift right) Decryption given K: shift left History: K = 3, Caesar s cipher Shift Cipher: An Example A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 P = CRYPTOGRAPHYISFUN K = 11 C = NCJAVZRCLASJTDQFY C 2 R 17 N 13 2+11 mod 26 = 13 N 17+11 mod 26 = 2 C 13+11 mod 26 = 24 Y 15 16 Shift Cipher: Cryptanalysis Can an attacker find K? YES: exhaustive search, key space is small (<= 26 possible keys) the attacker can search all the key space in very short time Once K is found, very easy to decrypt General Mono-alphabetical Substitution Cipher The key space: all permutations of Σ = {A, B, C,, Z} Encryption given a key : each letter X in the plaintext P is replaced with (X) Decryption given a key : each letter Y in the ciphertext P is replaced with -1 (Y) Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z π=b A D C Z H W Y G O Q X S V T R N M S K J I P F E U BECAUSE AZDBJSZ 17 18

General Substitution Cipher: Cryptanalysis Exhaustive search is infeasible for the letter A, there are 26 probabilities for the letter B, there are 25 probabilities for the letter C, there are 24 probabilities and so on Key space size is 26! 4*10 26 Cryptanalysis of Substitution Ciphers: Frequency Analysis Basic ideas: Each language has certain features: frequency of letters, or of groups of two or more letters. Substitution ciphers preserve the language features. Substitution ciphers are vulnerable to frequency analysis attacks. History of frequency analysis: Earliest known description of frequency analysis is in a book by the ninth-century scientist al-kindi Rediscovered or introduced from the Arabs in the Europe during the Renaissance 19 20 Frequency Features of English Vowels, which constitute 40 % of plaintext, are often separated by consonants. Letter A is often found in the beginning of a word or second from last. Letter I is often third from the end of a word. Letter Q is followed only by U Some words are more frequent, such as the, and, at, is, on, in Cryptanalysis using Frequency Analysis The number of different ciphertext characters or combinations are counted to determine the frequency of usage. The cipher text is examined for patterns, repeated series, and common combinations. Replace ciphertext characters with possible plaintext equivalents using known language characteristics. Frequency analysis made substitution cipher insecure 21 22 Improve the Security of Substitution Cipher Using nulls e.g., using numbers from 1 to 99 as the ciphertext alphabet, some numbers representing nothing are inserted randomly Deliberately misspell words e.g., Thys haz thi ifekkt off diztaughting thi ballans off frikwenseas Homophonic substitution cipher each letter is replaced by a variety of substitutes These make frequency analysis more difficult, but not impossible Summary Shift ciphers are easy to break using brute force attacks, they have small key space. Substitution ciphers preserve language features and are vulnerable to frequency analysis attacks. 23 24

Polyalphabetic Substitution Ciphers Main weaknesses of monoalphabetic substitution ciphers each letter in the ciphertext corresponds to only one letter in the plaintext letter Idea for a stronger cipher (1460 s by Alberti) use more than one cipher alphabet, and switch between them when encrypting different letters Developed into a practical cipher by Vigenère (published in 1586) The Vigenère Cipher Definition: Given m, a positive integer, P = C = (Z 26 ) n, and K = (k 1, k 2,, k m ) a key, we define: Encryption: E k (p 1, p 2 p m ) = (p 1 +k 1, p 2 +k 2 p m +k m ) (mod 26) Decryption: D k (c 1, c 2 c m ) = (c 1 -k 1, c 2 -k 2 c m - k m ) (mod 26) Example: Plaintext: Key: Ciphertext: C R Y P T O G R A P H Y L U C K L U C K L U C K N L A Z E I I B L J J I 25 26 Security of Vigenère Cipher Vigenere masks the frequency with which a character appears in a language: One letter in the ciphertext corresponds to multiple letters in the plaintext. Makes the use of frequency analysis more difficult. Any message encrypted by a Vigenere cipher is a collection of as many shift ciphers as there are letters in the key. Vigenere Cipher: Cryptanalysis Find the length of the key. Divide the message into that many shift cipher encryptions. Use frequency analysis to solve the resulting shift ciphers. Vigenère cipher is vulnerable: once the key length is found, a cryptanalyst can apply frequency analysis. How to Find the Key Length? For Vigenere, as the length of the keyword increases, the letter frequency shows less English-like characteristics and becomes more random. Two methods to find the key length: Kasisky test Index of coincidence (Friedman) 27 28 Kasisky Test Two identical segments of plaintext will be encrypted to the same ciphertext, if the they occur in the text at the distance, ( 0 (mod m), m is the key length). Algorithm: PT Key CT Search for pairs of identical segments of length at least 3 Record distances between the two segments: 1, 2, m divides gcd(δ1, Δ2, ) T H E S U N A N D T H E M A N I N T H E M O O N K I N G K I N G K I N G K I N G K I N G K I N G D P R Y E V N T N B U K W I A O X B U K W W B T Rotor Machines-1 Basic idea: if the key in Vigenere cipher is very long, then the attacks won t work Implementation idea: multiple rounds of substitution A machine consists of multiple cylinders each cylinder has 26 states, at each state it is a substitution cipher: the wiring between the contacts implements a fixed substitution of letters each cylinder rotates to change states according to different schedule changing the substitution 29 30

Rotor Machines-2 A m-cylinder rotor machine has 26 m different substitution ciphers 26 3 = 17576 26 4 = 456,976 26 5 = 11,881,376 Enigma Machine Patented by Scherius in 1918 Came on the market in 1923, weighted 50 kg (about 110 lbs), later cut down to 12kg (about 26 lbs) It cost about $30,000 in today s prices 34 x 28 x 15 cm Widely used by the Germans from 1926 to the end of second world war First successfully broken by Polish in the thirties by exploiting the repeating of the message key and knowledge of the machine design) During the WW II, Enigma was broken by Alan Turing (1912-1954) in the UK intelligence. He was an english mathematician, logician and cryptographer, father of modern computer science. 31 32 Enigma Use 3 scramblers (rotors): 17576 substitutions 3 scramblers can be used in any order: 6 combinations Plug board: allowed 6 pairs of letters to be swapped before the scramblers process started and after it ended. Total number of keys 10 16 Later versions use 5 rotors and 10 pairs of letters Key Mapping A reflector enables to map a character twice with each rotor First rotor rotates after each key press Second rotor rotates after first had a complete revolution, and so on 33 34 Encrypting with Enigma Machine was designed under the assumption that the adversary may get access to the machine Daily key: The settings for the rotors and plug boards changed daily according to a codebook received by all operators A day key has the form Plugboard setting: A/L P/R T/D B/W K/F O/Y Scrambler arrangement: 2-3-1 Scrambler starting position: Q-C-W Message key: Each message was encrypted with a unique key defined by the position of the 3 rotors How to Break the Enigma Machine? Recover 3 secrets Internal connections for the 3 rotors Daily keys Message keys With 2 months of day keys and Enigma usage instructions, the Polish mathematician Rejewski succeeded to reconstruct the internal wiring 35 36

Lessons Learned From Breaking Enigma Keeping a machine (i.e., a cipher algorithm) secret does not help The Kerckhoff s principle Security through obscurity doesn t work Large number of keys are not sufficient Known plaintext attack was easy to mount Key management was the weakest link People were also the weakest link Even a strong cipher, when used incorrectly, can be broken Kerckhoffs s s Principle Auguste Kerckhoff (1835 1903) was a Dutch linguist and cryptographer who was professor of languages at the School of Higher Commercial Studies in Paris in the late 19th century. The security of a protocol should rely only on the secrecy of the keys, protocol designs should be made public. (1883) secrecy of a protocol does not work 37 38