CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Similar documents
Classical Cryptography. Thierry Sans

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Classical Encryption Techniques

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

PART I Symmetric Ciphers

Chapter 2: Classical Encryption Techniques

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

CSCE 715: Network Systems Security

2

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

Classical Encryption Techniques

CSC 474/574 Information Systems Security

Classical Encryption Techniques. CSS 322 Security and Cryptography

Information Systems Security

Cryptography and Network Security

Nature Sunday Academy Lesson Plan

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Overview of Conventional Encryption Techniques

Cryptography and Network Security Chapter 2

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

Cryptography Introduction to Computer Security. Chapter 8

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

CSCE 813 Internet Security Symmetric Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Block Encryption and DES

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Introduction to Cryptography

Shared Secret = Trust

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Worksheet - Reading Guide for Keys and Passwords

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction to Cryptology. Lecture 2

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

Introduction to Symmetric Cryptography

Cryptography MIS

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

APNIC elearning: Cryptography Basics

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CRYPTOGRAPHY. BY, Ayesha Farhin

Cryptography and Network Security

Cryptographic Concepts

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Cryptography Functions

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Cryptography Part II Introduction to Computer Security. Chapter 8

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Cryptography Symmetric Encryption Class 2

Classic Cryptography: From Caesar to the Hot Line

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

Cryptography Introduction

CCNA Security 1.1 Instructional Resource

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

CNT4406/5412 Network Security

IS 2150 / TEL 2810 Information Security and Privacy

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Classical Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

PROTECTING CONVERSATIONS

CSC 580 Cryptography and Computer Security

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

ELECTRONICS DEPARTMENT

Cryptosystems. Truong Tuan Anh CSE-HCMUT

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

COMP4109 : Applied Cryptography

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Some Stuff About Crypto

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Garantía y Seguridad en Sistemas y Redes

LECTURE 4: Cryptography

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶

Ref:

7. Symmetric encryption. symmetric cryptography 1

CSC 774 Network Security

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Security: Cryptography

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University and NBER

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Exploring Cryptography Using CrypTool

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Introduction to Cryptography

Public Key Cryptography

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

CS 332 Computer Networks Security

Introduction to Software Security Crypto Basics (Chapter 2)

Introduction to Cryptography. Vasil Slavov William Jewell College

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Encryption. INST 346, Section 0201 April 3, 2018

Transcription:

CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58

Types of Cryptographic Private key (Symmetric) Public key (Asymmetric) Hash functions 59

CRYPTOGRAPHY Private Key (Secret Key) Symmetric Public Key Asymmetric Hash Function 60

Symmetric Cipher Model 61

Symmetric Cipher Model 62

Secret Key Cryptography (SKC) plaintext encryption ciphertext ciphertext key decryption plaintext Using a single key for encryption/decryption. The plaintext and the ciphertext having the same size. Also called symmetric key cryptography 63

SKC: Security Uses Transmitting over an insecure channel The transmitted message is encrypted by the sender and can be decrypted by the receiver, with the same key Prevent attackers from eavesdropping Secure storage on insecure media Data is encrypted before being stored somewhere Only the entities knowing the key can decrypt it 64

SKC: Security Uses Authentication Strong authentication: proving knowledge of a secret without revealing it. Alice challenge r A Bob response r A encrypted with K A,B r B r B encrypted with K A,B 65

SKC: Security Uses Integrity Check Noncryptographic checksum Using a well-known algorithm to map a message (of arbitrary length) to a fixed-length checksum Protecting against accidental corruption of a message Example: CRC Cryptographic checksum A well-know algorithm Given a key and a message The algorithm produces a fixed-length message authentication code (MAC) that is sent with the message 66

Classic ciphers substitution ciphers monoalphabetic ciphers polyalphabetic ciphers transposition (permutation) ciphers product ciphers using both substitution, and transposition 67

Classical Cryptography Monoalphabetic Ciphers Once a key is chosen, each alphabetic character of a plaintext is mapped onto a unique alphabetic character of a ciphertext. The Substitution Cipher (Caesar Cipher) 68

The Caesar cipher The Caesar cipher is a substitution cipher, named after Julius Caesar. Operation principle: each letter is translated into the letter a fixed number of positions after it in the alphabet table. the fixed number of positions is a key both for encryption and decryption. 69

The Caesar cipher Outer: plaintext Inner: ciphertext 70

The Caesar cipher K=3 71

Caesar Cipher Mathematically, map letters to numbers: a, b, c,..., x, y, z 0, 1, 2,..., 23, 24, 25 Then the general Caesar cipher is: c = E K (p) = (p + k) mod 26 p = D K (c) = (c k) mod 26 Can be generalized with any alphabet. 72

Classical Cryptography Polyalphabetic Ciphers Each alphabetic character of a plaintext can be mapped onto m alphabetic characters of a ciphertext. Usually m is related to the encryption key. The Vigenère Cipher The Permutation Cipher 73

Substitution Cipher For each letter, substitute some other letter(randomly) A key determines what the substitution is E.g., 4, 8, 1, 26,... 1 st letter in the alphabet will be represented by the 4 th letter A D 2 nd letter will be represented by the 8 th B H 3 rd letter will be represented by the 1 st C A 4 th letter will be represented by the 26 th D Z 74

Example of Vigenère Cipher Keyword: deceptive key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 1 0 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 2 0 2 1 2 2 2 3 2 4 2 5 75

Long Random Number Sequences Vernam Cipher A one-time Pad Cipher Use Numbers Mod 26 to represent Letters Use A two-digit Random Numbers Add the two numbers and take Mod 26 76

Vernam Cipher Example 77

Transpositions (Permutations) 78

Row Transposition Ciphers Plaintext is written row by row in a rectangle. Ciphertext: write out the columns in an order specified by a key. Key: 3 4 2 1 5 6 7 Plaintext: Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ 79 a t t a c k p o s t p o n e d u n t i l t w o a m x y z

Product Ciphers Uses a sequence of substitutions and transpositions Harder to break than just substitutions or transpositions ADFGVX Product Cipher This is a bridge from classical to modern ciphers. 80