Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Similar documents
Cryptographic Concepts

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

CSC 474/574 Information Systems Security

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Classical Cryptography. Thierry Sans

Introduction to Symmetric Cryptography

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

APNIC elearning: Cryptography Basics

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Cryptography Introduction

Nature Sunday Academy Lesson Plan

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Worksheet - Reading Guide for Keys and Passwords

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Security: Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography

Some Stuff About Crypto

Cryptography MIS

Cryptography (Overview)

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

CCNA Security 1.1 Instructional Resource

PASSWORDS & ENCRYPTION

Cryptography and Network Security

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Security. Communication security. System Security

(2½ hours) Total Marks: 75

Classical Encryption Techniques

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Cryptography Introduction to Computer Security. Chapter 8

Authentication CHAPTER 17

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

Classical Cryptography

ENGR/CS 101 CS Session Lecture 5

Classical Encryption Techniques

Introduction to Cryptography. Vasil Slavov William Jewell College

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

CSC 580 Cryptography and Computer Security

File and Disk Encryption

Ref:

Chapter 2: Classical Encryption Techniques

Computers and Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

7. Symmetric encryption. symmetric cryptography 1

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

CSCE 813 Internet Security Symmetric Cryptography

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

CSCE 715: Network Systems Security

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

18-642: Cryptography 11/15/ Philip Koopman

Cryptography Functions

P2_L6 Symmetric Encryption Page 1

Recap. Definition (Encryption: Caesar Cipher)

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Information Systems Security

Cryptography Lesson Plan

Introduction to Cryptography

18-642: Cryptography

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

... Assignment 3 - Cryptography. Information & Communication Security (WS 2016/17) Ahmed S. Yeusf, M.Sc.

Cryptography Symmetric Encryption Class 2

CS61A Lecture #39: Cryptography

Password Based Cryptography

Overview of Conventional Encryption Techniques

How many DES keys, on the average, encrypt a particular plaintext block to a particular ciphertext block?

Senior Math Circles Cryptography and Number Theory Week 1

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

A Modified Playfair Encryption Using Fibonacci Numbers

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

PART I Symmetric Ciphers

Introduction to Cryptology. Lecture 2

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

CRYPTOGRAPHY. BY, Ayesha Farhin

Introduction to Cryptography

CRYPTOGRAPHY. Jakub Laszczyk. June 7th,

Digital Communications. Basic Concepts in Cryptography

CSE 127: Computer Security Cryptography. Kirill Levchenko

Lecture 1 Applied Cryptography (Part 1)

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Cryptography Worksheet

ELECTRONICS DEPARTMENT

Transcription:

Cryptography

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Introduction

Cryptography in the Real World Cryptography is the process of writing or reading secret messages or codes (Merriam Webster) Been used throughout recorded history

Terminology Plaintext Ciphertext An encrypted message Cipher The original readable message An algorithm to convert plaintext to ciphertext and vice versa Key A string that modifies the cipher

Uses for Cryptography Confidentiality Used since the dawn of recorded history to protect information Continues to this day aided by computers Integrity Provides some information that can be used to determine if a message has been changed Authentication Allows proof that you are who you say you are

Classical Cryptography

Early Classical Cipher Categories Classical ciphers worked with the symbols used in their language Substitution Cipher Replace the symbols in the message with other symbols according to some key Transposition Cipher Rearrange the symbols according to the key

Substitution Ciphers A mapping is created based on the key Symbols in the message are substituted based on the mapping Both sides need to know the mapping to encode or decode the message Examples: Caesar Cipher Substitution Cipher Vigenère Cipher

Caesar Cipher Shift the alphabet a certain number of places The key is the number of places shifted How to defeat?

Caesar Cipher - How To Defeat Only 26 permutations 25 since one is to change nothing Try every combination Look for common patterns dependant upon language How could you improve?

Substitution Cipher Generate a mapping where each symbol is paired with another symbol independent of the others Key is the mapping string How many possible mappings? How to defeat?

Substitution Cipher - How To Defeat Number of occurrences of a symbol Use frequency analysis to determine the most common symbols A symbol is always mapped with another symbol Work from the most common How to improve?

Vigenère Cipher Artificially extend the key to be the length of the plaintext. Plaintext P = p0p1p2 pm-1 Ciphertext C = c0c1c2 cm-1 Key K = k0k1 kn-1 Encryption: Ci = (Pi + ki mod n) mod 26 Decryption: Pi = (Ci - ki mod n) mod 26

Vigenère Cipher To encrypt: Extend the key to be the length of the plaintext. Use a Vigenère table to get the ciphertext. Example: Plaintext: NINE ONE ONE AND ONE ONE TWO Key: FOUR FOU RFO URF OUR FOU RFO Ciphertext: SWHV TBY FSS UEI CHV TBY KBC

Plaintext: Key: Ciphertext: NINE ONE ONE AND ONE ONE TWO FOUR FOU RFO URF OUR FOU RFO SWHV TBY FSS UEI CHV TBY KBC

Plaintext: Key: Ciphertext: NINE ONE ONE AND ONE ONE TWO FOUR FOU RFO URF OUR FOU RFO SWHV TBY FSS UEI CHV TBY KBC

Plaintext: Key: Ciphertext: NINE ONE ONE AND ONE ONE TWO FOUR FOU RFO URF OUR FOU RFO SWHV TBY FSS UEI CHV TBY KBC

Plaintext: Key: Ciphertext: NINE ONE ONE AND ONE ONE TWO FOUR FOU RFO URF OUR FOU RFO SWHV TBY FSS UEI CHV TBY KBC

Plaintext: Key: Ciphertext: NINE ONE ONE AND ONE ONE TWO FOUR FOU RFO URF OUR FOU RFO SWHV TBY FSS UEI CHV TBY KBC

Vigenère Cipher

Vigenère Cipher To break: Look for groups of three or more characters that regularly repeat. Find a common factor for the distance between the repeating groups. Perform frequency analysis on subsets of characters. Key: ABCDABCDABCDABCDABCDABCDABCD Plaintext: CRYPTOISSHORTFORCRYPTOGRAPHY Ciphertext: CSASTPKVSIQUTGQUCSASTPIUAQJB

Vigenère Cipher To break: Look for groups of three or more characters that regularly repeat. Find a common factor for the distance between the repeating groups. Perform frequency analysis on subsets of characters. Key: ABCDABCDABCDABCDABCDABCDABCD Plaintext: CRYPTOISSHORTFORCRYPTOGRAPHY Ciphertext: CSASTPKVSIQUTGQUCSASTPIUAQJB

Transposition Ciphers These ciphers shift the original positions of each plaintext character. The ciphertext is just a permutation of the plaintext. Rail fence cipher Route cipher

Scytale Utilized by the Spartans of ancient Greece A strip of parchment would be wrapped around the scytale and the message written Both sides would need a scytale of the same diameter Easily breakable, the message itself hints at the encryption method

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Rail Fence Cipher The plaintext is written downwards on rails of an imaginary fence, then written back upwards when the bottom is reached. Plaintext: WEAREDISCOVEREDFLEEATONCE W...E...C...R...L...T...E.E.R.D.S.O.E.E.F.E.A.O.C...A...I...V...D...E...N.. Ciphertext: WECRLTEERDSOEEFEAOCAIVDEN

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Route Cipher The plaintext is written on a grid of given dimensions and padded with low-frequency characters. W R I O R F E O E E E S V E L A N J A D C E D E T C X The key is how you derive the ciphertext: Spiral counter-clockwise, starting from the top right. Ciphertext: EOEFROIRWEADCEDETCXJNALEVSE

Modern Cryptography

Modern Cryptography Cryptography was greatly changed by the use of first analog then digital computers More complex algorithms Easier to break algorithms Increased focus on mathematics Messages had to be machine readable An Enigma Machine

Encodings With computers messages are now in binary Binary represented in different ways for humans to understand Different character sets such as ASCII, Unicode Hex: Uses base 16 numbers to avoid long strings of binary Base64: Uses base 64 numbers to condense it further Examples: ASCII - hello Binary - 01101000 01100101 01101100 01101100 01101111 Hex - 0x68 0x65 0x6c 0x6c 0x6f Base64 - agvsbg8

XOR Common operation in computers Allows use to manipulate binary bits based on an input If A is plaintext and C is ciphertext, then we can use XOR to encrypt and decrypt a message using key B (A XOR B = C) B XOR C = A

One Time Pad Achieves perfect secrecy, provides no information on the plaintext Only if key same length as the message Adds each symbol in plaintext with corresponding symbol in the key With ROT13: H V U E V R L V Y With One Time Pad: L V Y O V B H + A V H E + F V J L + P V A L + G V R O + E V S

CIPHERTEXT KEY PLAINTEXT HULGO APPLE SFAPL PEACH HJARS

One Time Pad Usage Used during the Cold War Allowed for secure communication later on an unsecured channel Requires the key to be securely distributed in advance Key can also be used only once Distribution of a key the same length of the message is difficult How could you make it work with a smaller key?

Modern Cipher Categories Symmetric Uses a shared secret key to encrypt and decrypt messages Requires the key to be distributed in a secure manner Asymmetric Uses a two separate, mathematically related keys to encrypt and decrypt A message encrypted with one key can only be decrypted with the other Each person will have a public/private keypair

Symmetric Key Encryption Shared key is used in the cipher algorithm Different algorithms such as DES, AES Requires the key to be distributed securely Can generate more keys based off the original secret key Relatively quick Used in the majority of communication encryption schemes

Asymmetric Key Encryption A pair of related keys are generated in advance for each user Private key is kept secret, public key is shared Any message encrypted with the public key can only be decrypted with the private key, and vice versa Encryption is relatively slow and complex Used for symmetric key distribution and authentication

Integrity

Cryptography and Computers Introduction of computers changed how cryptography is done Also introduced new uses for cryptography The fast computation allowed for values to be quickly generated based on message contents This value can be created at both sender and receiver, then compared

Hash Functions One-way algorithm Given any input of any length, produces a string of a given length n Used for integrity, message digests, and password storage

Properties of Good Hash Functions Impossible to reverse Output is always of a fixed size Changing any part of the input changes the hash completely Hard to find collisions, where two inputs give the same output

Authentication

Proving Who You Are Communication is done increasingly digitally Difficult to tell if someone really is who they say they are Cryptography provides us tools that can be used to prove someone's identity Prove by: Knowing a secret only the person would know Telling you something in a way only the person could

Known Shared Secret Prove who you are by knowing something, i.e. a password By comparing with a stored value, you can authenticate Don t compare against the plain password Add salt for extra flavour And security

Symmetric Encryption Prove identity by sending a message encrypted with the shared key Only the people who know the secret key should be able to use it Anyone who sends a recognizable message should be the person they say they are Or are they?

Asymmetric Encryption With an asymmetric key pair, any message encrypted with the private key can only be decrypted with the public key Since only the person should know their private key, only they could send a message Must make sure the public key is valid

Conclusion

Cryptography In The Future Quantum computers will eventually change the algorithms we use Continue to find ways to securely communicate And validate life choices of math majors Questions?