Worksheet - Reading Guide for Keys and Passwords

Similar documents
CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Cryptography Lesson Plan

Lecture 1: Perfect Security

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computational Security, Stream and Block Cipher Functions

Activity Guide - Public Key Cryptography

Cryptography Worksheet

CSC 474/574 Information Systems Security

CSC 580 Cryptography and Computer Security

Authentication CHAPTER 17

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

2.1 Basic Cryptography Concepts

Classical Cryptography. Thierry Sans

Quantum Encryption Keys

Cryptography Introduction to Computer Security. Chapter 8

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Classic Cryptography: From Caesar to the Hot Line

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography (Overview)

Due: March 8, 11:59pm. Project 1

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Nature Sunday Academy Lesson Plan

Introduction to Cryptography in Blockchain Technology. December 23, 2018

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Introduction to Cryptography

Computers and Security

Classical Encryption Techniques. CSS 322 Security and Cryptography

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

CS61A Lecture #39: Cryptography

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Sending secret messages with cryptography. An activity by the Australian Computing Academy

COMP4109 : Applied Cryptography

ISA 562: Information Security, Theory and Practice. Lecture 1

Lecture 4: Symmetric Key Encryption

User Authentication. Modified By: Dr. Ramzi Saifan

Practical Aspects of Modern Cryptography

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

A Tour of Classical and Modern Cryptography

CS 100: Encryption and Passwords

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

CRYPTOGRAPHY Thursday, April 24,

CSE 127: Computer Security Cryptography. Kirill Levchenko

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Scanned by CamScanner

PASSWORDS & ENCRYPTION

Cryptography I ALFE APRTGHAL KAP BQQQ ADCQTPEMY KSANG A KGA-ETAM MFLK FQRUQY

ENGR/CS 101 CS Session Lecture 5

Shared Secret = Trust

Modern Cryptography Activity 1: Caesar Ciphers

Uses of Cryptography

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

Lecture 3: Symmetric Key Encryption

Cryptography (cont.)

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Ref:

User Authentication. Modified By: Dr. Ramzi Saifan

Encryption. INST 346, Section 0201 April 3, 2018

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Recap. Definition (Encryption: Caesar Cipher)

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

CPSC 467: Cryptography and Computer Security

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

EEC-484/584 Computer Networks

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Cryptanalysis. Ed Crowley

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CIS 6930/4930 Computer and Network Security. Project requirements

CCNA Security 1.1 Instructional Resource

Cryptography ThreeB. Ed Crowley. Fall 08

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Cryptography Functions

CS 332 Computer Networks Security

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Outline Key Management CS 239 Computer Security February 9, 2004

Security: Cryptography

Cryptography Introduction

Assignment 9 / Cryptography

Lesson 7a - Encryption and Decryption

(2½ hours) Total Marks: 75

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Goals of Modern Cryptography

PROJECT 2: Encoding Assistants CSE100/INFO100 Fluency with Information Technology Spring 2002

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Symmetric-Key Cryptography

18-642: Cryptography

Transcription:

Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret piece of information used to encrypt and decrypt. What makes encryption algorithms strong is how hard it is to guess the key, since you might assume that the enemy knows your algorithm. Keys we ve seen so far: In a Caesar cipher the key is how many letters to shift. In a random substitution cipher, the key is the list of which letters should be swapped with which. In the Vigenère cipher, the key is the list of characters used to define which row and column are used to lookup the ciphertext character. Keys and Passwords Your task Read Blown to Bits, Chapter 5, pp. 170-173: Start right after the picture of the Vigenère cipher grid. Stop at Lessons for the Internet Age. With a partner, answer the questions about the reading below. Questions: Read the text and answer the following questions along with a partner. 1. In cryptography, who are Alice, Bob and Eve? 2. How is an encrypted message like a lock box? 3. Yes or no: the Vigenère cipher is still used today in modern cryptography. Why or why not? 4. What is brute force decryption?

5. How long would a one-time pad need to be in order to encrypt a secret message that was 50 characters in length? 6. According to the reading, using modern cryptographic methods, if you increase the key length by 1 bit, how much more computation would be required to find (or crack ) the key? Cryptographic Keys and Your Passwords If you have ever joined a website where you had to create an account to login, you also had to create a password. That password is used as a key to do a variety of things at that site, but mostly it s used to authenticate (prove) who you are. When you created your password, the site may have presented you with some rules for your password, such as: must be at least 8 characters long must contain at least one number must contain at least one uppercase letter must contain at least one punctuation symbol (e.g. `-=[]\;,./~!@#$%^&*()_+{} : <>?) Question: Based on what you know about how keys work in cryptography, give a reason for why these rules require: a) a certain number of characters b) a mix of letters, numbers, uppercase and symbols? Try It Caution! Can you trust this site? In a separate tab or window: Go to: https://howsecureismypassword.net/ Before you type anything: open the Developer Tools in your browser and make sure you can see any network traffic. This website lets you test the strength of various passwords. As the website tells you: This site could be stealing your password... it's not, but it easily could be. Be careful where you type your password. By opening the developer tools to inspect the traffic, you can make sure that s true. In any event, if you want to be super careful, do not use any real password here. 2

Test some passwords For everything you try, make sure to: Click show details. Read the other statistics and facts about the password. Try different passwords to see what the tool tells you: Try typing common words from the dictionary or well-known names like apple or chicago. Try typing something that s over 16 characters. Try a string of 4 random words together, like AppleChicagoBalletTree. Type a 0. Then keep typing 0s and watch what happens to the statistics. (Actually, you might want to just hold 0 down for a while.) Try other things that interest you. 3

Answer these questions It s very common for websites to require a password of at least 8 characters. Let s explore how secure these passwords really are. Create a few passwords using 8 lowercase ASCII characters (a-z). What s the longest amount of time-tocrack you can generate? Using any characters on the keyboard, what s the longest amount of time-to-crack you can generate with an 8-character password? As you try passwords, what seems to be the single most significant factor in making a password difficult to crack? Why do you think this is? Opinion: Is an 8-character minimum a good password length for websites to require? Give your opinion, yes or no, and explain why you think that. The AP CS Principles framework contains the following statement: Implementing cybersecurity has software, hardware, and human components. Based on what you ve learned so far, describe at least one way that cybersecurity involves human components. Hopefully you can now appreciate this comic: http://xkcd.com/936/ 4

Reflection: 1. (Choose two.) Why is the Vigenère cipher hard to crack? a. One cannot solve using frequency analysis directly. b. Long keys create exponential growth possibilities. c. The key is always secret to both the sender and receiver of the message. d. A Vigenère cipher relies upon an "alphabet shift" algorithm. 2. What problems exist with encryption schemes such as the Vigenère cipher, even when strong encryption keys are used? 3. Why are computers better than humans at breaking encryptions such as the Vigenère? a. Computers are smarter than humans. b. Computers are faster than humans. c. The Vigenère was originally designed by a computer. d. They are not; humans are better as breaking Vigenère encryptions than computers. 4. Which makes for a password that is harder to crack? a. A word from the dictionary b. 8 random characters that include numbers and punctuation c. A 16-character password that is all letters of the alphabet d. A 32-character password that is all letters of the alphabet e. A 150-character password that is all the same character. 5