Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Similar documents
CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Introduction to Cryptology. Lecture 2

Classical Cryptography. Thierry Sans

Goals of Modern Cryptography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

CSC 580 Cryptography and Computer Security

Ref:

Cryptography Math/CprE/InfAs 533

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

2.1 Basic Cryptography Concepts

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Some Stuff About Crypto

Cryptography Lesson Plan

Cryptography Intro and RSA

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

CSC 474/574 Information Systems Security

CSCE 813 Internet Security Symmetric Cryptography

Practical Aspects of Modern Cryptography

Homework 2: Symmetric Crypto Due at 11:59PM on Monday Feb 23, 2015 as a PDF via websubmit.

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Cryptanalysis. Ed Crowley

Cryptography Introduction to Computer Security. Chapter 8

Cryptography ThreeB. Ed Crowley. Fall 08

Lecture 1: Perfect Security

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

ISA 562: Information Security, Theory and Practice. Lecture 1

Introduction to Cryptography

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

CS 332 Computer Networks Security

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Classical Encryption Techniques

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

Lecture IV : Cryptography, Fundamentals

Encryption. INST 346, Section 0201 April 3, 2018

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

CSE 127: Computer Security Cryptography. Kirill Levchenko

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Channel Coding and Cryptography Part II: Introduction to Cryptography

CRYPTOGRAPHY. BY, Ayesha Farhin

Cryptography. Andreas Hülsing. 6 September 2016

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

ISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)

Foundations of Cryptography CS Shweta Agrawal

Classical Cryptography

APNIC elearning: Cryptography Basics

Information Security

Classical Encryption Techniques

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Introduction to Cryptography, Helger Lipmaa

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Chapter 9 Public Key Cryptography. WANG YANG

Lecture 3: Symmetric Key Encryption

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Block Encryption and DES

Computational Security, Stream and Block Cipher Functions

18-642: Cryptography 11/15/ Philip Koopman

CS 161 Computer Security

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Worksheet - Reading Guide for Keys and Passwords

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

Cryptographic Concepts

CS 6903: Modern Cryptography Spring 2011

Exploring Cryptography Using CrypTool

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

CS Computer Networks 1: Authentication

COMP4109 : Applied Cryptography

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Cryptography Today. Ali El Kaafarani. Mathematical Institute Oxford University. 1 of 44

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Introduction to Cryptography. Ramki Thurimella

symmetric cryptography s642 computer security adam everspaugh

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Introduction to Cryptography

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Information Systems Security

UNIT - IV Cryptographic Hash Function 31.1

Introduction to Cryptography (cont.)

ECEN 5022 Cryptography

Winter 2011 Josh Benaloh Brian LaMacchia

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Assignment 9 / Cryptography

Welcome to CS 395/495 Internet Security: A Measurement-based Approach

Transcription:

Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017

Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in 3407 AV Williams Our TA: Aria Shahverdi (ariash@terpmail.umd.edu)

Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in 3407 AV Williams Our TA: Aria Shahverdi (ariash@terpmail.umd.edu) TA Office hours: Thurs. 5-6pm in 3412 AV Williams. Class url: www.ece.umd.edu/~danadach/intro_crypto_spring_ 17

Syllabus Highlights cont d Small Quizzes/Class Exercises More on next slide Weekly homeworks (about 10-12 overall) Late homework not accepted Lowest grade will be dropped Grading Policy: Small Quizzes/Class Exercises 5% Homework 25% Midterm 35% Final 35% (not cumulative) **Extra credit opportunity relating to current events **Extra credit opportunity after the midterm Tentative midterm date: In class on Thursday, March 16.

Reading Assignment/Quizzes Upcoming: Review of basic math, discrete math (combinatorics, probability). Read Chapters 1,2,3,6,7 of Prof. Jonathan Gross s lecture notes (link on course webpage): 5 short 5-question quizzes on Canvas, one for each chapter. Each quiz will be approx..5% of total grade. ***Due on Feb. 14. Additional resources: Rosen, K. H. (2012) Discrete Mathematics and Its Applications. (7th ed.).

Goals of Modern Cryptography Providing information security: Data Privacy Data Integrity and Authenticity in various computational settings.

Data Privacy M Alice Bob The goal is to ensure that the adversary does not see or obtain the data (message) M. Example: M could be a credit card number being sent by shopper Alice to server Bob and we want to ensure attackers don t learn it.

Data Integrity and Authenticity M Alice Bob The goal is to ensure that M really originates with Alice and not someone else. M has not been modified in transit.

Data Integrity and Authenticity Alice Alice Transfer $100 to Charlie Bank Adversary Eve might Modify Charlie to Eve Modify $100 to $1000 Integrity prevents such attacks.

General Topics Explore how to define security What does it mean for something to be secure Defining a threat model, placing computational restrictions Explore how to prove security Mathematical proofs, proofs by reduction Computational assumptions Learn about tools for building secure schemes Tools for practical block-cipher constructions Tools from number theory See lots of constructions of cryptographic schemes: Symmetric key encryption, Message Authentication codes (MAC), Collision-resistant hash functions, Key exchange, Public key encryption, Digital signatures.

What we will be doing this semester Data Privacy (Encryption) Data Integrity and Authenticity Private Key setting Symmetric Key Encryption Ciphers Message Authentication Codes First half of semester Public Key setting Public Key Encryption Digital Signatures Second half of semester (requires basic number theory)

Today: We will start on symmetric key encryption (also called ciphers).

Symmetric Key Encryption (Historically called ciphers )

Kerckhoffs Principle (1800s) The cipher method must not be required to be secret, and it must be able to fall into the hands of the enemy without inconvenience. Today: Parties share a secret key which allows them to encrypt and decrypt, the scheme itself is public. m k ciphertext k m encryption decryption

Advantages of open crypto design: 1. More suitable for large-scale usage. All pairs of communicating parties can use the same scheme with different key. 2. Published designs undergo public scrutiny and are therefore likely to be stronger. 3. Public design enables the establishment of standards.

Historical Ciphers and their Cryptanalysis

For each cipher we discuss: What is the Encrypt algorithm? What is the Decrypt algorithm? What is the key space, key space size and secret key? How can it be broken?

Atbash Cipher (600 B.C.) From Wikipedia: Atbash is a simple substitution cipher for the Hebrew alphabet. It consists in substituting aleph (the first letter) for tav (the last), beth (the second) for shin (one before last), and so on, reversing the alphabet. In the Book of Jeremiah. helloworld SVOOLDLIOW

Shift/Caesar Cipher (100 B.C.) From textbook: One of the oldest recorded ciphers, known as Caesar s cipher is described in De Vita Caesarum, Divus Iulius ( The Lives of the Caesars, The Deified Julius ), written in approximately 110 C.E. Example: Caesar cipher with shift 19. Outer wheel is plaintext letter. Inner wheel is ciphertext letter.

Discussion Previous schemes: Either scheme is fixed (no secret key) or key space is small. If cipher method is public (as prescribed by Kerckhoffs) then these are completely broken by brute force search. Conclusion: key space must be large for cipher to be secure against brute force search. Is large key space sufficient for security?

Scytale Cipher (600 B.C.) From Wikipedia: From indirect evidence, the scytale was first mentioned by the Greek poet Archilochus, who lived in the 7th century BC. Other Greek and Roman writers during the following centuries also mentioned it, but it was not until Apollonius of Rhodes (middle of the 3rd century BC) that a clear indication of its use as a cryptographic device appeared. A description of how it operated is not known from before Plutarch (50-120 AD): Thin sheet of papyrus wrapped around staff. Messages are written down the length of the staff. In order to recover the message, a staff of equal diameter must be used.

Monoalphabetic Substitution (800 A.D.) Each plaintext character is mapped to a different ciphertext character in an arbitrary manner. a b c d e f g h i j k l m n o p q r s t u v w x y z X E U A D N B K V M R O C Q F S Y H W G L Z I J P T tellhimaboutme GDOOKVCXEFLGCD Size of key space? 26! 2 88 Brute force search is intractable, but is there a better way to break this cipher?

Frequency Analysis If plaintext is known to be grammatically correct English, can use frequency analysis to break monoalphabetic substitution ciphers:

An Improved Attack on Shift/Caeser Cipher using Frequency Analysis Associate letters of English alphabet with numbers 0...25 Let p i denote the probability of the i-th letter in English text. Using the frequency table: 25 p 2 i=0 i 0.065 Let q i denote the probability of the i-th letter in this ciphertext 25 Compute I j = i=0 p i q i+j mod 26 for each value of j Output the value j for which I j is closest to 0.065.