CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Similar documents
Chapter 3 Traditional Symmetric-Key Ciphers 3.1

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Introduction to Cryptology. Lecture 2

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Classical Cryptography. Thierry Sans

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

CSCE 813 Internet Security Symmetric Cryptography

Classical Cryptography

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Cryptography Introduction to Computer Security. Chapter 8

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Classical Encryption Techniques. CSS 322 Security and Cryptography

CSC 580 Cryptography and Computer Security

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Introduction to Cryptography

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Classical Encryption Techniques

Chapter 2: Classical Encryption Techniques

Cryptanalysis. Ed Crowley

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

CPSC 467b: Cryptography and Computer Security

CSC 474/574 Information Systems Security

Cryptography ThreeB. Ed Crowley. Fall 08

Classical Encryption Techniques

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Worksheet - Reading Guide for Keys and Passwords

Introduction to Cryptology

2.1 Basic Cryptography Concepts

Some Stuff About Crypto

Ref:

Lecture IV : Cryptography, Fundamentals

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

A Tour of Classical and Modern Cryptography

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

ENGR/CS 101 CS Session Lecture 5

Cryptography. Andreas Hülsing. 6 September 2016

2

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Module 1: Classical Symmetric Ciphers

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

(8) Cryptanalysis. Close-up of the rotors in a Fialka cipher machine

Cryptography Part II Introduction to Computer Security. Chapter 8

Security: Cryptography

CIS 3362 Final Exam 12/4/2013. Name:

Scanned by CamScanner

Cryptography (Overview)

CCNA Security 1.1 Instructional Resource

1-7 Attacks on Cryptosystems

APNIC elearning: Cryptography Basics

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

PART I Symmetric Ciphers

Survey: Recent Modifications in Vigenere Cipher

File and Disk Encryption

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

Goals of Modern Cryptography

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

P2_L6 Symmetric Encryption Page 1

Grenzen der Kryptographie

Lecture 1: Perfect Security

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Nature Sunday Academy Lesson Plan

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

COMP4109 : Applied Cryptography

Cryptography Math/CprE/InfAs 533

Cryptosystems. Truong Tuan Anh CSE-HCMUT

CSCE 715: Network Systems Security

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Lesson 7a - Encryption and Decryption

CRYPTOGRAPHY. BY, Ayesha Farhin

Introduction to Symmetric Cryptography

Private-Key Encryption

Assignment 9 / Cryptography

ISA 562: Information Security, Theory and Practice. Lecture 1

Overview of Conventional Encryption Techniques

Digital Communications. Basic Concepts in Cryptography

Java Applets for a Cryptology Course. Ulrich A. Hoensch Rocky Mountain College Billings, Montana

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Secret Key Algorithms (DES)

Cryptographic Concepts

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Introduction to Cryptography

CPSC 467: Cryptography and Computer Security

Cryptography and Network Security

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

Transcription:

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY Badran Awad Computer Department Palestine Technical college

CHAPTER 1 Introduction Historical ciphers Information theoretic security Computational security Cryptanalysis techniques Security of Algorithms

INTRODUCTION Who has used cryptography? Within the last 10 minutes Today? In your whole life?

Cryptography: Multi-Disciplinary

Cryptography: Multi-Disciplinary Number Theory Probability Algebraic Geometry Complexity Coding Theory Engineering Security

Cryptography: Multi-Disciplinary Number Theory Probability Algebraic Geometry Complexity Coding Theory Engineering Security

What is cryptography about? Adversary: a clever person with powerful computer Main goals: Data privacy. Data integrity.

Data Privacy Adversary: does not learn any information about m. Example: m is a credit-card number sent to Bob, we want to make a sure Adversary does not learn it.

Data Integrity Goal: m really comes from Alice m has not modified in transit

Ideal World Kryptonite pipe Kryptonite pipe: cannot see inside or alter content. All our goals would be achieved. But: hard to implement in practice.

Cryptography!!!

Cryptographic Schemes Enc: encryption algorithm. Dec: decryption algorithm Ke: encryption key Kd: decryption key

Cryptographic Schemes Cryptographer goals: How to define security goals? How to define Enc, Dec? How to gain confidence that Enc, Dec achieve goals?

Encryption Schemes

Encryption Schemes

Encryption Schemes

Encryption Schemes

Encryption Schemes

Encryption Schemes

Encryption Schemes

Provable security

Provable security

Provable security

Provable security the motivation

Provable security the motivation

Provable security the motivation

Provable security the motivation

Provable security the motivation

Provable security the motivation

Kirchhoff's principle

Kirchhoff's principle

A more refined picture

A more refined picture

A more refined picture

Kirchhoff's principle

Kirchhoff's principle

Kirchhoff's principle

Kirchhoff's principle obscurity

A more mathematical view

A more mathematical view

A more mathematical view

A more mathematical view

A more mathematical view - refined

Shift Cipher

Shift Cipher

Security of the shift cipher

Security of the shift cipher

Security of the shift cipher

Substitution Cipher

Substitution Cipher

Substitution Cipher

How to break the substitution cipher? First successful formal attack on ciphers was established by Al-Kindi (801-873). It was probably religiously motivated textual analysis of the Qur'an which led to the invention of the frequency analysis technique for breaking monoalphabetic substitution ciphers by al-kindi sometime around AD 800.

How to break the substitution cipher? Brute force attack: 26! 1026 Use statistical patterns of the language. For example: the frequency tables Texts of 50 characters can be usually be broken this way. Look at the example from the textbook.

Other famous historical cipher

The Vigenere Cipher (Polyalphabetic) The Vigenere Cipher (Polyalphabetic) It uses 2 or more cipher alphabets, switching between them during encryption, thereby confusing potential cryptanalysis. Able to produce different cipher for same alphabet. Blaise de Vigenere (1523 1596) The Vigenere square can be used for encryption and decryption. Leon Battista Alberti (1404-1472)

The Vigenere Cipher First one choose a keyword, example LEMON. Then one writes it over and over again on the plaintext. PLAINTEXT: KEYWORD: ATTACKATDAWN LEMONLEMONLE CIPHERTEXT: LXFOPVEFRNHR

The Vigenere Cipher So, is it still secure???? No. In 1854 Charles Babbage developed a test that succeeded to attack this cipher. In 1863 Friedrich Kasiski was the first to publish a successful attack on the Vigenere cipher. The primary weakness of the Vigenere cipher is the repeating nature of its key. This cipher was secure from about 1553 till 1854 (301 years!!!) What s next????

The Enigma machine.

The Enigma machine.

The Enigma machine.

Exercises Write a program that can encrypt and decrypt using the general Caesar cipher. Write a program that can perform a letter frequency attack on an additive cipher without human intervention. Your software should produce possible plaintexts in rough order of likelihood. It would be good if your user interface allowed the user to specify give me the top 10 possible plaintexts. Write a program that can perform a letter frequency attack on any mono-alphabetic substitution cipher without human intervention. Your software should produce possible plaintexts in rough order of likelihood. It would be good if your user interface allowed the user to specify give me the top 10 possible plaintexts.

How to define security of an encryption scheme?

How to define security of an encryption scheme?

How to define security of an encryption scheme?

How to define security of an encryption scheme?

Idea 1

Idea 1

Idea 2

Idea 2

Idea 3

Idea 3

Idea 4

Idea 4

How to formalize the Idea 4?

What does it mean to achieve secure encryption? Adversary cannot find the secret key. Adversary cannot find plaintext corresponding to ciphertext. Adversary cannot determine any character of plaintext that corresponds to the ciphertext. Adversary cannot determine any meaningful information about plaintext from ciphertext. Adversary cannot compute any function of plaintext from ciphertext.

Cryptographic goals Confidentiality to keep the content of information from al but those who are authorized to have them. Data integrity to be able to detect alteration of data. Authentication to be able to identify entities in communication. Non-repudiation to prevent an entity from denying previous commitments or actions.

Types of attacks (cryptanalysis techniques) 1. Ciphertext only attack The cryptanalyst has the ciphertext of several messages, which are encrypted using the same algorithm. The cryptanalyst job is to: Deduce the plaintext Or better deduce the key used to encrypt the message in order to decrypt other messages encrypted with the same keys. That is, Given : Deduce : C 1 = Ek P 1, C 2 = Ek P 2,, Ci = Ek(Pi) P 1, P 2,, Pi or k

Types of attacks (cryptanalysis techniques) 2. Known plaintext attack The cryptanalyst has access to not only the ciphertext of several messages, but also to the plaintext of those messages. The cryptanalyst job is to: Deduce the key(s) used to encrypt the messages. Deduce the algorithm to decrypt any new messages encrypted with the same key (from step (a)) That is, Given: P 1, C 1 = Ek P 1,, Pi, Ci = Ek(Pi) Deduce : Either k or an algorithm to infer P i + 1 from C i + 1 = Ek(Pi + 1)

Types of attacks (cryptanalysis techniques) 3. Chosen plaintext attack The cryptanalyst not only has access to the ciphertext and associated plaintext for several messages, but he also chooses the plaintext to be encrypted. The cryptanalyst job is to: Deduce the key(s) used to encrypt the messages Deduce the algorithm to decrypt any new messages encrypted with the same key (from step (a)) That is, Given: P 1, C 1 = Ek P 1,, Pi, Ci = Ek Pi Where the cryptanalyst gets to choose P 1, P 2,, Pi Deduce: Either k or an algorithm to infer P i + 1 from C i + 1 = Ek(Pi + 1)

Types of attacks (cryptanalysis techniques) 4. Chosen ciphertext attack The cryptanalyst can choose different ciphertext to be decrypted and has access to the decrypted plaintext. The cryptanalyst job is to: Deduce the key That is, Given : C 1, P 1 = Dk C 1,, Ci, Pi = Dk(Ci) Deduce : k

Types of attacks (cryptanalysis techniques) 5. Chosen key attack The cryptanalyst has SOME knowledge about the relationship between different keys. Not practical. 6. Brute force attack The cryptanalyst will try every possible key one-by-one and checking whether the resulting plaintext is meaningful. 7. Rubber hose attack Torture, blackmail etc.

Security of Algorithms Different algorithms offer different degrees of security. Cost to break algorithm > value of data (SAFE) Time to break algorithm > time encrypted data must remain secret (SAFE) Amount of data encrypted with a single key < amount of data necessary to break the algorithm (SAFE)

Complexity of an attack One can measure the complexity of an attack in different ways: Data complexity: The amount of data needed as input to the attack. Processing complexity: The time needed to perform the attack. Also known as work factor. Storage requirements: The amount of memory needed to do the attack.

Exercises Read about The Wassenaar Arrangement and International Traffic in Arms Regulation (ITAR) then answer these questions. Has it always been legal for American to teach cryptography outside of US? And Why? Give me a Case Study. From regulations mentioned in question 1, what is the maximum key length allowed to be embedded on exported cryptography machine? What is the minimum key length for a cryptography systems to be secure if based on the Discrete Log Problem? Solve the exercises at the end of chapter 1.