Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Similar documents
Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

COMP4109 : Applied Cryptography

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

Cryptography Introduction to Computer Security. Chapter 8

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CSC 474/574 Information Systems Security

CSE 127: Computer Security Cryptography. Kirill Levchenko

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Public Key Cryptography

Introduction to Cryptography

Overview. Public Key Algorithms I

Classical Cryptography. Thierry Sans

Cryptography BITS F463 S.K. Sahay

Cryptography Part II Introduction to Computer Security. Chapter 8

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Study Guide to Mideterm Exam

Classical Encryption Techniques. CSS 322 Security and Cryptography

Lecture 1: Perfect Security

Classical Cryptography

Private-Key Encryption

Tuesday, January 17, 17. Crypto - mini lecture 1

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CSC 580 Cryptography and Computer Security

Introduction to Symmetric Cryptography

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

Public-Key Cryptography

Introduction to Cryptology. Lecture 2

Symmetric Cryptography

7. Symmetric encryption. symmetric cryptography 1

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Shared Secret = Trust

Worksheet - Reading Guide for Keys and Passwords

2.1 Basic Cryptography Concepts

Crypto Basics. Recent block cipher: AES Public Key Cryptography Public key exchange: Diffie-Hellmann Homework suggestion

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

A Tour of Classical and Modern Cryptography

EEC-484/584 Computer Networks

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Scanned by CamScanner

Computer Security CS 526

Goals of Modern Cryptography

Cryptography Functions

Lecture IV : Cryptography, Fundamentals

Classical Encryption Techniques

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Some Stuff About Crypto

Stream Ciphers. Koç ( ucsb ccs 130h explore crypto fall / 13

Stream Ciphers. Çetin Kaya Koç Winter / 13

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi

CPSC 467b: Cryptography and Computer Security

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

CSCE 813 Internet Security Symmetric Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Making and Breaking Ciphers

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CPSC 467: Cryptography and Computer Security

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Classic Cryptography: From Caesar to the Hot Line

Cryptography MIS

Lecture 1 Applied Cryptography (Part 1)

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

2 Secure Communication in Private Key Setting

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography. Andreas Hülsing. 6 September 2016

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Double-DES, Triple-DES & Modes of Operation

Public Key Algorithms

Public-key encipherment concept

Lecture 6 - Cryptography

Goals for Today. Substitution Permutation Ciphers. Substitution Permutation stages. Encryption Details 8/24/2010

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Cryptography and Network Security

Public Key Algorithms

ISA 562: Information Security, Theory and Practice. Lecture 1

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

... Assignment 3 - Cryptography. Information & Communication Security (WS 2016/17) Ahmed S. Yeusf, M.Sc.

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Chapter 9 Public Key Cryptography. WANG YANG

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

LECTURE 4: Cryptography

Computer Security: Principles and Practice

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Cryptography Intro and RSA

CS408 Cryptography & Internet Security

Transcription:

Lecture 2 Cryptography: History + Simple Encryption,Methods & Preliminaries 1 Cryptography can be used at different levels algorithms: encryption, signatures, hashing, RNG protocols (2 or more parties): key distribution, authentication, identification, login, payment, etc. systems: electronic cash, secure filesystems, smartcards, VPNs, e-voting, etc. attacks: on all the above 2

Some applications of cryptography network, operating system security protect Internet, phone, sattelite communications electronic payments (e-commerce) database security software/content piracy protection pay TV military communications voting 3 Open vs. closed design model Open design: algorithm, protocol, system design (and even possible plaintext) are public information. Only key(s) are kepp secret. Closed design: as much information as possible is kept secret. 4

The core issue: how to communicate securely? Alice Bob Note: even storage is a form of communication Eve Looks simple But, the devil is in the details 5 The biggest headache is that Good security must be Yet Effective Unobtrusive Because security is not a service but an enabler and an inhibitor! 6

Cryptography has been around Most CS sub-fields are fairly new: Graphics, compilers, software, CSCW, OS, architecture And, a few are quite old: Cryptography, database, networking 7 Some history: Caesar s cipher Homo Hominem Lupus! Krpr Krplqhp Oxsxv! 8

Some history: Rosetta Stone 9 Some history: Enigma 10

Historical (Primitive) Ciphers Shift (e.g., Caesar): Enc k (x) = x+k mod 26 Affine: Enc k1,k2 (x) = k1 *x + k2 mod 26 Substitution: Enc perm (x) = perm(x) Vigenere : Enc K (x) = ( X[0]+K[0], X[1]+K[1], ) Vernam: one-time pad (OTP) 11 Example: K = 11 Shift (Caesar) Cipher W E W I L L M E E T A T M I D N I G H T 22 4 22 8 11 11 12 4 4 19 0 19 12 8 3 13 8 6 7 19 7 15 7 19 22 22 23 15 15 4 11 4 23 19 14 24 19 17 18 4 H P H T W W X P P E L E X T O Y T R S E How many keys are there? How many trials are needed to find the key? 12

Substitution Cipher Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z X N Y A H P O G Z Q W B T S F L R C V M U E K J D I KEY W E W I L L M E E T A T M I D N I G H T K H K Z B B T H H M X M T Z A S Z O G M How many keys are there? How many trials are needed to find the key? 13 Substitution Cipher Cryptanalysis 0.14 0.12 0.127 Probabilities of Occurrence 0.1 0.08 0.06 0.04 0.02 0 0.082 0.015 0.028 0.043 0.022 0.02 0.07 0.061 0.002 0.008 0.04 0.024 0.075 0.067 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0.019 0.001 0.06 0.063 0.091 0.028 0.01 0.023 0.001 0.02 0.001 14

Substitution Cipher Cryptanalysis 3.5 3 Frequency of some common digrams 3.05 3.21 2.5 2 1.81 1.5 1.51 1.32 1.53 2.13 1.36 2.3 1.83 1.28 1.9 1.22 1.3 1.28 1 0.5 0 AN AT ED EN ER ES HE IN ON OR RE ST TE TH TI 15 VERNAM One-Time Pad: world s best cipher Plaintext = { p,..., p One - time pad stream = { otp,..., otp Ciphertext = { c,..., c where : c i = p C = A! B C! B = A i 0 0 0 n# 1 n# 1 " otp! 0 < i < i } } n# 1 } n 16

VERNAM One-Time Pad: world s best cipher Vernam offers perfect information-theoretic security, but: How long does the OTP keystream needs to be? How do Alice and Bob exchange the keystream? 17 Encryption Principles A cryptosystem has (at least) five ingredients: Plaintext Secret Key Ciphertext Encryption algorithm Decryption algorithm Security usually depends on the secrecy of the key, not the secrecy of the algorithm 18

Crypto Basics 19 Key Size (bits) Average time required for exhaustive key search (for brute force attacks) Number of Alternative Keys Time required at 10 6 Decr/µs 32 2 32 = 4.3 x 10 9 2.15 milliseconds 56 2 56 = 7.2 x 10 16 10 hours 128 2 128 = 3.4 x 10 38 5.4 x 10 18 years 168 2 168 = 3.7 x 10 50 5.9 x 10 30 years 20

Types of Attainable Security Perfect, unconditional or information theoretic : the security is evident free of any assumptions Reducible or provable : security can be shown to be based on some common (often unproven) assumptions, e.g., the conjectured difficulty of factoring large integers Ad hoc: the security seems good often snake oil Take a look at: http://www.ciphersbyritter.com/glossary.htm 21 Computational Security Encryption scheme is computationally secure if cost of breaking it (via brute force) exceeds the value of the encrypted information; or time required to break it exceeds useful lifetime of the encrypted information Most modern schemes we will see are considered computationally secure Usually rely on very large key-space, impregnable to brute force Most advanced schemes rely on lack of knowledge of effective algorithms for certain hard problems, not on a proven inexistence of such algorithms reducible security! Such as: factorization, discrete logarithms, etc. 22

Conventional Encryption Principles 23 Cryptosystems Classified along three dimensions: Type of operations used for transforming plaintext into ciphertext Binary arithmetic: shifts, XORs, ANDs, etc. Typical for conventional encryption Integer arithmetic Typical for public key encryption Number of keys used Symmetric or conventional (single key used) Asymmetric or public-key (2 keys: 1 to encrypt, 1 to decrypt) How plaintext is processed: One bit at a time A string of any length A block of bits 24

Complexity reminder/re-cap P: problems that can be solved in polynomial time, i.e., problems that can be solved/decided efficiently NP: broad set of problems that includes P; answers can be verified efficiently ; solutions can t always be efficiently found. NP-complete: the believed-to-be-hard decision problems in NP, they appear to have no efficient solution; answers are efficiently verifiable, solution to one is never much harder than a solution to another NP-hard: hardest; cannot be solved by a non-deterministic TM. Many computation version of NP-complete problems are NP-hard. Examples: Factoring, discrete log are in NP, not know if in NP-complete or in P Primality testing was recently shown to be in P Knapsack is in NP-complete For more info, see: http://www.nist.gov/dads/html 25 Readings for this week Chapters 1 and 2 in KPS book Optional: Ch 1 in Stinson 26