Classical Encryption Techniques

Similar documents
Block Encryption and DES

2

Cryptography and Network Security Chapter 2

CSCE 715: Network Systems Security

Cryptography and Network Security

PART I Symmetric Ciphers

Chapter 2: Classical Encryption Techniques

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Information Systems Security

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography Symmetric Encryption Class 2

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques

Classical Cryptography. Thierry Sans

Overview of Conventional Encryption Techniques

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers.

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Software Security Crypto Basics (Chapter 2)

Network Security Essentials Chapter 2

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

ENGR/CS 101 CS Session Lecture 5

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Module 1: Classical Symmetric Ciphers

Computer Security Network Security Internet Security

Introduction to Cryptography. Vasil Slavov William Jewell College

CSC 474/574 Information Systems Security

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

CSC 580 Cryptography and Computer Security

Cryptography Introduction to Computer Security. Chapter 8

CSCE 813 Internet Security Symmetric Cryptography

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Classical Encryption Techniques

APNIC elearning: Cryptography Basics

Introduction to Cryptology. Lecture 2

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Nature Sunday Academy Lesson Plan

Modes of Operation. Raj Jain. Washington University in St. Louis

Cryptography and Network Security

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Introduction to information Security

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Cryptography Part II Introduction to Computer Security. Chapter 8

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Introduction to Cryptography

Cryptography MIS

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Computer Security: Principles and Practice

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

IS 2150 / TEL 2810 Information Security and Privacy

Geldy : A New Modification of Block Cipher

A (Brief) History of Cryptography

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Hardware Design and Software Simulation for Four Classical Cryptosystems

Introduction to Symmetric Cryptography

Introduction to Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

Lecture IV : Cryptography, Fundamentals

Classical Cryptography

Exploring Cryptography Using CrypTool

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

SKP Engineering College

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

CPSC 467b: Cryptography and Computer Security

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

CCNA Security 1.1 Instructional Resource

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Lecture 4: Symmetric Key Encryption

Symmetric Encryption Algorithms

Secret Key (symmetric) Cryptography

Lecture 3: Symmetric Key Encryption

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Key Management and Distribution

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptography. In the News: Hacker exposes embassies'

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

P2_L6 Symmetric Encryption Page 1

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

File and Disk Encryption

Transcription:

Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/ 2-1

Overview 1. Symmetric Cipher Model 2. Substitution Techniques 3. Transposition Techniques 4. Product Ciphers 5. Steganography These slides are based on Lawrie Brown Lawrie Brown s slides supplied with William Stalling s book Cryptography and Network Security: Principles and Practice, 5 th Ed, 2011. 2-2

Symmetric Cipher Model Y = E(K, X) X = D(K, Y) K=Secret Key Same key is used for encryption and decryption. Single-key or private key encryption. Example: Divide by 9. 480=53 9+3 531 2-3

Some Basic Terminology Plaintext - original message Ciphertext - coded message Cipher - algorithm for transforming plaintext to ciphertext Key - info used in cipher known only to sender/receiver Encipher (encrypt) - converting plaintext to ciphertext Decipher (decrypt) - recovering ciphertext from plaintext Cryptography - study of encryption principles/methods Cryptanalysis (code breaking) - study of principles/ methods of deciphering ciphertext without knowing key Cryptology - field of both cryptography and cryptanalysis 2-4

Cryptography Classification By type of encryption operations used Substitution: Meet Me Offu Of Transposition: Meet Me Me etm Product By number of keys used Single-key or Secret Key Two-key or Public Key By the way in which plaintext is processed Block: ABCD EFGH IJKL Stream: ABCDEFGHIJKL 2-5

Cryptanalysis Objective: To recover key not just message Approaches: Cryptanalytic attack Brute-force attack If either succeed all key use is compromised Brute-force attack: Key Size (bits) Number of Alternative Keys Time required at 1 decryption/µs Time required at 10 6 decryptions/µs 32 2 32 = 4.3 10 9 2 31 µs = 35.8 minutes 2.15 milliseconds 56 2 56 = 7.2 10 16 2 55 µs = 1142 years 10.01 hours 128 2 128 = 3.4 10 38 2 127 µs = 5.4 10 24 years 5.4 10 18 years 168 2 168 = 3.7 10 50 2 167 µs = 5.9 10 36 years 5.9 10 30 years 26 characters (permutation) 26! = 4 10 26 2 10 26 µs = 6.4 10 12 years 6.4 10 6 years 2-6

Substitution Caesar Cipher: : Replaces each letter by 3rd letter on Example: meet me after the toga party PHHW PH DIWHU WKH WRJD SDUWB Can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Then have Caesar cipher as: c = E(k, p) ) = (p( + k) ) mod (26) p = D(k, c) = (c k) ) mod (26) Weakness: Total 26 keys 2-7

Substitution: Other forms Random substitution: Plain: abcdefghijklmnopqrstuvwxyz Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN The key is 26 character long => 26! (= = 4 x 10 26 ) Keys in place of 26 keys Letter frequencies to find common letters: E,T,R,N,I,O,A,S 2-8

Substitution: Other forms (Cont) Use two-letter combinations: Playfair Cipher Use multiple letter combinations: Hill Cipher 2-9

Poly-alphabetic Substitution Ciphers Use multiple ciphers. Use a key to select which alphabet (code) is used for each letter of the message Vigenère Cipher: Example using keyword deceptive key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext:zicvtwqngrzgvtwavzhcqyglmgj 2-10

One-Time Pad If a truly random key as long as the message is used, the cipher will be secure Called a One-Time pad Is unbreakable since ciphertext bears no statistical relationship to the plaintext Since for any plaintext & any ciphertext there exists a key mapping one to other Can only use the key once though Problems in generation & safe distribution of key 2-11

Transposition (Permutation) Ciphers Rearrange the letter order without altering the actual letters Rail Fence Cipher: Write message out diagonally as: m e m a t r h t g p r y e t e f e t e o a a t Giving ciphertext: MEMATRHTGPRYETEFETEOAAT Row Transposition Ciphers: Write letters in rows, reorder the columns according to the key before reading off. Key: 4312567 Column Out 4 3 1 2 5 6 7 Plaintext: a t t a c k p o s t p o n e d u n t i l t w o a m x y z Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ 2-12

Product Ciphers Use several ciphers in succession to make harder, but: Two substitutions make a more complex substitution Two transpositions make more complex transposition But a substitution followed by a transposition makes a new much harder cipher This is a bridge from classical to modern ciphers 2-13

Rotor Machines Before modern ciphers, rotor machines were most common complex ciphers in use Widely used in WW2 German Enigma, Allied Hagelin, Japanese Purple Implemented a very complex, varying substitution cipher Used a series of cylinders, each giving one substitution, which rotated and changed after each letter was encrypted Hagelin Rotor Machine 2-14

Rotor Machine Principle A becomes Y (First rotor). Y becomes R (2 nd rotor). R becomes B (3 rd rotor). After each letter, first rotor moves 1 position. After each full rotation of 1 st rotor, 2 nd rotor moves by 1 position. Cycle length = 26 3 2-15

Steganography Hide characters in a text, hide bits in a photograph Least significant bit (lsb( lsb) ) of a digital photograph may be a message. Drawback: high overhead to hide relatively few info bits Advantage: Can obscure encryption use Ref: http://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano/index.html 2-16

Summary 1. The key methods for cryptography are: Substitution and transposition 2. Letter frequency can be used to break substitution 3. Substitution can be extended to multiple letters and multiple ciphers. Mono-alphabetic=1 cipher, Poly-alphabetic=multiple ciphers 4. Examples: Caesar cipher (1 letter substitution), Playfair (2- letter), Hill (multiple letters), Vigenere (poly-alphabetic). 5. Multiple stages of substitution and transposition can be used to form strong ciphers. 2-17

Homework 2 Submit solution to problem 2.18 2.18 This problem explores the use of a one-time pad version of the Vigenere cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5, then the first letter of the plaintext is encrypted with a shift of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. A. Encrypt the plain text sendmoremoney with the key stream 9 0 1 7 23 15 21 14 11 11 2 8 9 B. Using the ciphertext produced in part (a), find a key so that the cipher text decrypts to the plain text cashnotneeded. 2-18