Making and Breaking Ciphers

Similar documents
Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 3/23/18

Cryptography MIS

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Symmetric Cryptography

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Chapter 3 Block Ciphers and the Data Encryption Standard

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Encryption. INST 346, Section 0201 April 3, 2018

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Cryptography Functions

Network Security Essentials Chapter 2

Introduction to Cryptography. Vasil Slavov William Jewell College

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Symmetric Cryptography. Chapter 6

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Lecture 3: Symmetric Key Encryption

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Lecture 4: Symmetric Key Encryption

Security: Cryptography

Modern Block Ciphers

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Computer and Data Security. Lecture 3 Block cipher and DES

Introduction to Symmetric Cryptography

LECTURE 4: Cryptography

CSE 127: Computer Security Cryptography. Kirill Levchenko

CRYPTOGRAPHY & DIGITAL SIGNATURE

Public-Key Cryptography

Overview. Public Key Algorithms I

Symmetric Encryption Algorithms

Cryptography (Overview)

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

David Wetherall, with some slides from Radia Perlman s security lectures.

Key Exchange. Secure Software Systems

Some Stuff About Crypto

7. Symmetric encryption. symmetric cryptography 1

Public Key Algorithms

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

APNIC elearning: Cryptography Basics

Kurose & Ross, Chapters (5 th ed.)

EEC-484/584 Computer Networks

Ref:

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Chapter 9. Public Key Cryptography, RSA And Key Management

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Encryption 2. Tom Chothia Computer Security: Lecture 3

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Symmetric Cryptography. CS4264 Fall 2016

Public Key Algorithms

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

COMP4109 : Applied Cryptography

Goals of Modern Cryptography

Encryption Algorithms

Cryptography and Network Security Chapter 3. Modern Block Ciphers. Block vs Stream Ciphers. Block Cipher Principles

Computational Security, Stream and Block Cipher Functions

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography [Symmetric Encryption]

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

CSCE 813 Internet Security Symmetric Cryptography

Conventional Encryption: Modern Technologies

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Tuesday, January 17, 17. Crypto - mini lecture 1

Cryptography III: Symmetric Ciphers

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

CS 161 Computer Security

Network Security. Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar

Network Security Essentials

Computer Security: Principles and Practice

CPSC 467: Cryptography and Computer Security

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CS 332 Computer Networks Security

2.1 Basic Cryptography Concepts

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

Chapter 9 Public Key Cryptography. WANG YANG

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

CS61A Lecture #39: Cryptography

1.264 Lecture 28. Cryptography: Asymmetric keys

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Crypto CS 485/ECE 440/CS 585 Fall 2017

SECURITY IN NETWORKS

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Cryptology. An introduction. by Ulf Lindqvist translated and processed by Erland Jonsson

CIS 6930/4930 Computer and Network Security. Project requirements

Cryptographic Systems

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

18-642: Cryptography 11/15/ Philip Koopman

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Symmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.

Public Key Cryptography

Transcription:

Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009

2009 Ralph Morelli You are free to reuse and remix this presentation under a creative commons license provided you give credit to the author. http://creativecommons.org/licenses/by/3.0/us/ This presentation was created using Open Office 3.0, free and open source software. http://www.openoffice.org/

Part III: Computerized Cryptology

Outline Vernam Cipher perfect secrecy Computerization: From Letters to Bits DES The Key Exchange Problem Public Key Cryptography Quantum Cryptography

Perfect Secrecy

Vernam Cipher Gilbert S. Vernam, AT&T, 1919 Morse code 5 pulses per character. A = (mark mark space space space) Vernam's: Add a key tape to the message: Plaintext Key Ciphertext mark mark space mark space mark space mark mark space space space Reversible, one-step encryption and decryption using a key loop tape. Flaw: repeating key is polyalphabetic. D C

One Time Pad Generalization of Vernam: make the key as long as the message. Provably perfect secrecy (Claude Shannon, 1942): Example: Secret key. Of truly random characters. As long as the message. Key 1 Used only once and then discarded. 0 Plain 1 0 0 1 1 0 Cipher XOR Operation Encrypt Plaintext: 01101 10101 01111 10110 10101 Key: 01010 10100 11101 01011 10110 Ciphertext: 00111 00001 10010 11101 00011 Decrypt Key: 01010 10100 11101 01011 10110 Plaintext: 01101 10101 01111 10110 10101

Theoretical Principles Claude Shannon, 1949, Communication Theory of Secrecy Systems, Bell Labs. Perfect secrecy property. Confusion maximum complexity between the key and ciphertext. Diffusion plaintext uniformities (statistics) are dissipated in the ciphertext. A cipher system should be secure even if its algorithm is known (Kerchoff's principle).

ASCII Code Developed from telegraph codes. 1963 Standard 1966 chart A=100 0001 B=100 0010 C=100 0011 1000011 1010010 1011001 1010000 1010100 1011111 C R Y P T O

Transposition and Substitution C R Y P T O 1000011 1010010 1011001 1010000 1010100 1011111 100001110100101011001 101000010101001011111 Transposition 101000010101001011111 100001110100101011001 Substitution (Swap 0s and 1s) 010111101010110100000 011110001011010100110 0101111 0101011 0100000 0111100 0101101 0100110 / + SP < - &

XOR: Substitution with a Key Plain Message C R Y P T O ASCII 1000011 1010010 1011001 1010000 1010100 1011111 KEY= ABCDEF 1000001 1000010 1000011 1000100 1000101 1000110 msg XOR key 0000010 0010000 0011010 0010100 0010001 0011001 A B A B 0 0 0 0 1 1 1 0 1 1 1 0 Crypto Message KEY= ABCDEF 0000010 0010000 0011010 0010100 0010001 0011001 1000001 1000010 1000011 1000100 1000101 1000110 Plain Message 1000011 1010010 1011001 1010000 1010100 1011111 C R Y P T O

Data Encryption Standard (DES) Early 1970s: IBM and NSA Collaboration. 1976: Adopted as the federal IP standard. Controversial among cryptographers. Key too short. Classified elements in the algorithm. NSA backdoor? 1999: EFF broke it in 23 hours (brute force). 2002: Replaced after public competition by Advanced Encryption Standard (AES)

DES Algorithm (Trasposition & Substitution) 64-bit block cipher 56-bit key (+ 8 bits parity) Feistel mixing: 16 cycles of transposing and XORing with 48-bit subkeys (K 1...K 16 ) Source: FIPS PUB 46-2http://www.itl.nist.gov/fipspubs/fip46-2.htm

EFF's DES Deep Crack Specialized chips $250,000 1998 56 hours. 1999 22.25 hrs. with distributed.net. 1999: DES reaffirmed as the standard with Triple-DES recommended.

Symmetric vs. Asymmetric Keys Symmetric Key Same key used for encryption and decryption. Must be shared by Alice and Bob. Key exchange problem. Asymmetric Key Different keys used for encryption and decryption. No key exchange problem.

The Key Exchange Problem Alice Bob Eve

Private Asymmetric Keys Shared Shared Shared Private Alice Bob Eve??

Diffie-Hellman Key Exchange Invented in 1976 Modular arithmetic: (8 + 7) mod 12 = 3 8 AM + 7 hours = 3 PM 8 + 7 = 15 mod 12 = 1 Rmdr = 3 (8 * 7) mod 12 = 56 mod 12 = 4 Rmdr = 8 One-way function 3 x = 1 (mod 4) What is x? {2, 4, 6, }

Diffie-Hellman Key Exchange Alice's secret number is a and Bob's secret number is b. They agree on the base g and prime number p and the function g x (mod p). They exchange A = g a (mod p) and B = g b (mod p). They derive the same key K because g ab (mod p) = g ba (mod p). Eve can't easily derive K without knowing a and b.

Public Key Cryptography 1984 Rivest-Shamir-Adelman Algorithm (RSA) Based on the difficulty of computing prime factors. Asymmetric key (public/private part) vs. symmetric key (shared by Alice and Bob) 101001010010010101 101001010101001010 010100101001010100 Key Generator Private Key Public Key Large random number

Public Key Encryption/Decryption Hi Bob RSA Encrypt 101001010010010101 101010101001010100 Alice Bob's Public Key RSA Decrypt Bob's Private Key Hi Bob Bob

Alice Public Key Signature I am Alice RSA Sign (Encrypt) 101001010010010101 101010101001010100 Alice's Private Key RSA Verify (Decrypt) Alice's Public Key I am Alice Bob

RSA Details Alice picks two huge prime numbers, p and q. Alice computes N = p x q. Alice picks another number e relatively prime to (p-1) x (q-1). Alice calculates her private key d as: d x e = 1 (mod (p-1) * (q-1)) Alice publishes (N, e) as her public key. Encrypt message to Alice, M: C = M e (mod N) Alice decrypts message, C: M = C d (mod N)

RSA Security Given N = p x q, why can't we just figure out the primes p and q? Factorization of N: For each prime number, n i check if it divides N. How big is N? ~ 10 308 for bank transactions. Best estimate: 100 million computers working together would take more than 1000 years (Simson Garfinkel, as reported in Singh).

Internet Security Transport Layer Security (Secure Sockey Layer) Client (user's browser) and server (e.g., user's bank) communication protocol. Phase 1: Client and server negotiate which algorithms will be used for key exchange and authentication (typically public key algorithms). Phase 2: A symmetric key is exchanged and authenticated. Phase 3: Encrypted, efficient communication using the symmetric key.

Transport Layer Security

Quantum computation: A quantum computer could easily break a factorization problem.

Quantum Cryptography BB84 Protocol: Charles H. Bennet and Gilles Brassard, 1984. (IBM, University of Montreal) Exchange random bit stream for use in one-time pad. Possible to detect an eavesdropper. Implementations: Exchange secure keys over optical fiber at 1 Mbit/s (10 km) and 10 kbits/s 100 km. Much research (IBM, NEC, HP, Toshiba, Mitsubishi) Four commercial companies

Perfect Secrecy!? Source: http://xkcd.com/