Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Similar documents
CS150 Assignment 7 Cryptography

Lorenz Cipher. Menu. Class 4: Modern Cryptography. British Cipher Machine. German Code-Breaking Efforts. Some loose ends on WWII Maurice Burnett

APNIC elearning: Cryptography Basics

CSC 474/574 Information Systems Security

Cryptography (Overview)

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

PROTECTING CONVERSATIONS

Quantum Encryption Keys

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

CS61A Lecture #39: Cryptography

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptographic Concepts

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

18-642: Cryptography 11/15/ Philip Koopman

Cryptography: Matrices and Encryption

Public Key Cryptography and the RSA Cryptosystem

18-642: Cryptography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

CIS 3362 Final Exam. Date: 12/9/2015. Name:

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Ref:

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Cryptography. Andreas Hülsing. 6 September 2016

Introduction to Cryptography

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Cryptography Lesson Plan

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Classical Cryptography

Encryption. INST 346, Section 0201 April 3, 2018

Introduction to Cryptology

Secrets & Lies, Knowledge & Trust. (Modern Cryptography) COS 116 4/20/2006 Instructor: Sanjeev Arora

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Modern Cryptography Activity 1: Caesar Ciphers

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Cryptography Worksheet

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

CS 332 Computer Networks Security

CSCE 813 Internet Security Symmetric Cryptography

Uzzah and the Ark of the Covenant

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Introduction to Cryptography. Vasil Slavov William Jewell College

A Tour of Classical and Modern Cryptography

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Security: Cryptography

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Introduction to Cryptography. --- Foundations of computer security ---

EEC-484/584 Computer Networks

Computers and Security

Introduction to Symmetric Cryptography

Cryptography Introduction

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

Security in Distributed Systems. Network Security

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Cryptography Introduction

Worksheet - Reading Guide for Keys and Passwords

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Public Key Cryptography

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

A (Brief) History of Cryptography

Classical Cryptography. Thierry Sans

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

CRYPTOGRAPHY. BY, Ayesha Farhin

Crypto: Symmetric-Key Cryptography

Authentication CHAPTER 17

CS 161 Computer Security

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Key Exchange. Secure Software Systems

Network Security. Chapter 8. MYcsvtu Notes.

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Verification of security protocols introduction

CSC 8560 Computer Networks: Network Security

CPSC 467b: Cryptography and Computer Security

Recap. Definition (Encryption: Caesar Cipher)

CSC 774 Network Security

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES

Network Layer, Link Layer, and Network Security Summary

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Block Ciphers. Advanced Encryption Standard (AES)

Introduction to Modern Cryptography. Lecture 2. Symmetric Encryption: Stream & Block Ciphers

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

COMPLEXITY ACROSS DISCIPLINES

RSA Cryptography in the Textbook and in the Field. Gregory Quenell

Shared Secret = Trust

Transcription:

Cryptography December 9, 2008 1 Intercepting Information Scenario 1 Wireless broadcasts information using radio signals Any computer on a wireless network CAN listen to any network traffic http://www.geeksquad.com/ uploadedimages/ wwwgeeksquadcom/tools/ Tech_Articles/ going_wireless_1.jpg A computer SHOULD only listen to traffic addressed to it It is impossible to know if anyone is eavesdropping 2

Intercepting Information Scenario 2 Internet Mail server Your laptop Spam filter reads a mail message to decide if it is spam What could an unscrupulous person do when he/she writes a spam filter? 3 Cryptography 4

Caesar Cipher Example Ciphertext: 5 Caesar Cipher Example Ciphertext: P 6

Caesar Cipher Example Ciphertext: PR 7 Caesar Cipher Example Ciphertext: PRX 8

Caesar Cipher Example Ciphertext: PRXQ 9 Caesar Cipher Example Ciphertext: PRXQW 10

Caesar Cipher Example Ciphertext: PRXQW KROBRNH 11 General Letter Substitution Algorithm: Substitute 1 letter for another Key PLAINTEXT LETTER A B C D E F G H I J K L M CIPHERTEXT LETTER G J A O U N E Z Y P H S T PLAINTEXT LETTER N O P Q R S T U V W X Y Z CIPHERTEXT LETTER V W L M I B D C R K F Q X Ciphertext: LUGAU 12

WWII Cryptography Enigma machine Used by Germans in World War II Led to great success for Uboats - sunk 50 ships every month! Broken by British, led by Alan Turing http://upload.wikimedia.org/wikipedia/commons/a/ae/enigma.jpg 13 Enigma Machine Top shows A being typed and encoding to G Typing a letter also moves the rotors. Next time, shown on the bottom, A encodes to C. http://upload.wikimedia.org/wikipedia/commons/thumb/6/6c/enigma-action.svg/ 527px-Enigma-action.svg.png 14

An Enigma Codebook http://upload.wikimedia.org/wikipedia/commons/thumb/8/82/ Kenngruppenheft.jpg/800px-Kenngruppenheft.jpg 15 Alan Turing Group at Bletchley Park in England figured out the algorithm Claim they shortened the war by 2 years! Father of computer science Turing machines Turing test http://encyclozine.com/history/biography/turing/turing.jpg 16

Symmetric Key Cryptography Problem: Sender and receiver must agree on the algorithm and key 17 Public Key Cryptography Keys come in pairs: Public key - anyone can see Private key - must be kept secret Anything encrypted with public key can be decrypted with the private key and vice versa 18

Secret vs. Public Key Shared key Secret key Text Public key Bob s public key Bob s private key 19 Ecommerce Application Your credit card number Your computer Ciphertext Encrypt with Amazon s public key Internet Decrypt with Amazon s private key Your credit card number Amazon s computer 20

Public key challenges What algorithm would use separate keys for encoding and decoding? Why isn t the decoding key guessable if you know what the encoding key is? RSA algorithm depends on the fact that it is very difficult to factor large numbers 21 Client Secure Socket Layer (SSL) Server Server public key CONNECT No encryption Symmetric key Encrypted with server public key Real communication Encrypted with symmetric key 22

Digital Signature Digital signature uses the sender s keys Alice s private key Alice s public key 23 What s next? Quantum computing Computers based on quantum physics Expect that quantum computers will ultimately break RSA Encryption with quantum computers might also be able to detect eavesdropping 24