JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World

Similar documents
CRYPTOGRAPHY. BY, Ayesha Farhin

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

PART I Symmetric Ciphers

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

CSCE 813 Internet Security Symmetric Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography

Chapter 2: Classical Encryption Techniques

CSCE 715: Network Systems Security

Classical Cryptography. Thierry Sans

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Information Systems Security

Cryptography and Network Security

2

Cryptography and Network Security Chapter 2

Classical Encryption Techniques

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

Classical Encryption Techniques

UNIT 2 CLASSICAL ENCRYPTION TECHNIQUES

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

ENGR/CS 101 CS Session Lecture 5

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Cryptography Intro and RSA

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Cryptosystems. Truong Tuan Anh CSE-HCMUT

Cryptography Part II Introduction to Computer Security. Chapter 8

LECTURE NOTES ON COMPUTER AND DATA SECURITY

CSC 580 Cryptography and Computer Security

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Cryptography MIS

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Cryptography Introduction to Computer Security. Chapter 8

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Survey: Recent Modifications in Vigenere Cipher

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Cryptography Symmetric Encryption Class 2

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Exploring Cryptography Using CrypTool

Classical Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Unit-II. Symmetric Ciphers. To emphasize the 2 categories of traditional ciphers:substitution and transposition ciphers.

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Cryptography and Network Security Chapter 1

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

A Modified Playfair Encryption Using Fibonacci Numbers

Block Encryption and DES

Introduction to Cryptology. Lecture 2

CSC 474/574 Information Systems Security

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

CSCD 303 Fall Lecture 19 Cryptography - Basics

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Security. Communication security. System Security

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

Overview of Conventional Encryption Techniques

CCNA Security 1.1 Instructional Resource

LECTURE 4: Cryptography

Innovation and Cryptoventures. Cryptology. Campbell R. Harvey. Duke University and NBER

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Conventional Encryption Principles Conventional Encryption Algorithms Cipher Block Modes of Operation Location of Encryption Devices Key Distribution

CPSC 467b: Cryptography and Computer Security

CRYPTOGRAPHY & DIGITAL SIGNATURE

Some Stuff About Crypto

Chapter 3. Cryptography. Information Security/System Security p. 33/617

Sirindhorn International Institute of Technology Thammasat University

Modern Cryptography Activity 1: Caesar Ciphers

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Network Security 網路安全. Lecture 3 March 16, 2015 洪國寶

Cryptography Worksheet

Worksheet - Reading Guide for Keys and Passwords

SKP Engineering College

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Study Guide to Mideterm Exam

Cryptanalysis. Ed Crowley

2.1 Basic Cryptography Concepts

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

(2½ hours) Total Marks: 75

Hardware Design and Software Simulation for Four Classical Cryptosystems

Transcription:

Cryptography and Network Security )(http:// ) Downloaded From (http://(http://

)(http:// ) Downloaded From (http://(http://

Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. --The art of War, Sun Tzu )(http:// ) Downloaded From (http://(http://

Information Transferring )(http:// ) Downloaded From (http://(http://

Attack: Interruption )(http:// ) Downloaded From (http://(http://

Attack: Interception )(http:// ) Downloaded From (http://(http://

Attack: Modification )(http:// ) Downloaded From (http://(http://

Attack: Fabrication )(http:// ) Downloaded From (http://(http://

Attacks, Services and Mechanisms! Security Attacks " Action compromises the information security! Security Services " Enhances the security of data processing and transferring! Security mechanism " Detect, prevent and recover from a security attack )(http:// ) Downloaded From (http://(http://

Important Features of Security! Confidentiality, authentication, integrity, non-repudiation, non-deny, availability, identification, )(http:// ) Downloaded From (http://(http://

! Passive attacks " Interception Attacks # Release of message contents # Traffic analysis! Active attacks " Interruption, modification, fabrication # Masquerade # Replay # Modification # Denial of service )(http:// ) Downloaded From (http://(http://

Network Security Model Trusted Third Party principal principal Security transformation Downloaded From (http://(http:// Security transformation opponent )(http:// )

Cryptography! Cryptography is the study of " Secret (crypto-) writing (-graphy)! Concerned with developing algorithms: " Conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or "Verify the correctness of a message to the recipient (authentication) "Form the basis of many technological solutions to computer and communications security problems )(http:// ) Downloaded From (http://(http://

! Cryptography Basic Concepts " The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form! Plaintext " The original intelligible message! Ciphertext " The transformed message )(http:// ) Downloaded From (http://(http://

! Cipher Basic Concepts " An algorithm for transforming an intelligible message into unintelligible by transposition and/or substitution! Key " Some critical information used by the cipher, known only to the sender & receiver! Encipher (encode) " The process of converting plaintext to ciphertext! Decipher (decode) " The process of converting ciphertext back into plaintext )(http:// ) Downloaded From (http://(http://

! Cryptanalysis Basic Concepts " The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking! Cryptology " Both cryptography and cryptanalysis! Code " An algorithm for transforming an intelligible message into an unintelligible one using a code-book )(http:// ) Downloaded From (http://(http://

Encryption and Decryption Plaintext Decipher P = D (K2) (C) Encipher C = E (K1) (P) K1, K2: from keyspace ciphertext Downloaded From (http://)

Security! Two fundamentally different security " Unconditional security # No matter how much computer power is available, the cipher cannot be broken " Computational security # Given limited computing resources (e.g time needed for calculations is greater than age of universe), the cipher cannot be broken )(http:// ) Downloaded From (http://(http://

! Ancient ciphers History " Have a history of at least 4000 years " Ancient Egyptians enciphered some of their hieroglyphic writing on monuments " Ancient Hebrews enciphered certain words in the scriptures " 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher " Roger bacon described several methods in 1200s )(http:// ) Downloaded From (http://(http://

! Ancient ciphers History " Geoffrey Chaucer included several ciphers in his works " Leon Alberti devised a cipher wheel, and described the principles of frequency analysis in the 1460s " Blaise de Vigenère published a book on cryptology in 1585, & described the polyalphabetic substitution cipher " Increasing use, esp in diplomacy & war over centuries )(http:// ) Downloaded From (http://(http://

Classical Cryptographic Techniques! Two basic components of classical ciphers: " Substitution: letters are replaced by other letters " Transposition: letters are arranged in a different order! These ciphers may be: " Monoalphabetic: only one substitution/ transposition is used, or " Polyalphabetic:where several substitutions/ transpositions are used! Product cipher: " several ciphers concatenated together )(http:// ) Downloaded From (http://(http://

Plaintext Encryption and Decryption ciphertext Encipher C = E (K) (P) Decipher P = D (K) (C) Key source )(http:// ) Downloaded From (http://(http://

Key Management! Using secret channel! Encrypt the key! Third trusted party! The sender and the receiver generate key " The key must be same )(http:// ) Downloaded From (http://(http://

! Recover the message Attacks! Recover the secret key " Thus also the message! Thus the number of keys possible must be large! )(http:// ) Downloaded From (http://(http://

! Ciphertext only " Algorithm, ciphertext! Known plaintext Possible Attacks " Algorithm, ciphertext, plaintext-ciphertext pair! Chosen plaintext " Algorithm, ciphertext, chosen plaintext and its ciphertext! Chosen ciphertext " Algorithm, ciphertext, chosen ciphertext and its plaintext! Chosen text " Algorithm, ciphertext, chosen plaintext and ciphertext )(http:// ) Downloaded From (http://(http://

Steganography! Conceal the existence of message " Character marking " Invisible ink " Pin punctures " Typewriter correction ribbon! Cryptography renders message unintelligible! )(http:// ) Downloaded From (http://(http://

Contemporary Equiv.! Least significant bits of picture frames " 2048x3072 pixels with 24-bits RGB info " Able to hide 2.3M message! Drawbacks " Large overhead " Virtually useless if system is known )(http:// ) Downloaded From (http://(http://

Caesar Cipher! Replace each letter of message by a letter a fixed distance away (use the 3rd letter on)! Reputedly used by Julius Caesar! Example: L FDPH L VDZ L FRQTXHUHG I CAME I SAW I CONGUERED " The mapping is ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC )(http:// ) Downloaded From (http://(http://

! Description Mathematical Model " Encryption E (k) : i i + k mod 26 " Decryption D (k) : i i - k mod 26 )(http:// ) Downloaded From (http://(http://

Cryptanalysis: Caesar Cipher! Key space: 26 " Exhaustive key search! Example " GDUCUGQFRMPCNJYACJCRRCPQ HEVDVHRGSNQDOKZBDKDSSDQR " Plaintext: JGXFXJTIUPSFQMBDFMFUUFSTKHYGYKUJVGRNCEGNG VVGTU " Ciphertext: LIZHZLVKWRUHSODFHOHWWHUVMJAIAMWXSVITPEGI PIXXIVW )(http:// ) Downloaded From (http://(http://

Character Frequencies! In most languages letters are not equally common " in English e is by far the most common letter! Have tables of single, double & triple letter frequencies! Use these tables to compare with letter frequencies in ciphertext, " a monoalphabetic substitution does not change relative letter frequencies " do need a moderate amount of ciphertext (100+ letters) )(http:// ) Downloaded From (http://(http://

Letter Frequency Analysis! Single Letter " A,B,C,D,E,..! Double Letter " TH,HE,IN,ER,RE,ON,AN,EN,.! Triple Letter " THE,AND,TIO,ATI,FOR,THA,TER,RES, )(http:// ) Downloaded From (http://(http://

Modular Arithmetic Cipher! Use a more complex equation to calculate the ciphertext letter for each plaintext letter! E (a,b) : i a i + b mod 26 " Need gcd(a,26) = 1 " Otherwise, not reversible " So, a 2, 13, 26 " Caesar cipher: a=1 )(http:// ) Downloaded From (http://(http://

! Key space:23*26 " Brute force search Cryptanalysis! Use letter frequency counts to guess a couple of possible letter mappings " frequency pattern not produced just by a shift " use these mappings to solve 2 simultaneous equations to derive above parameters )(http:// ) Downloaded From (http://(http://

Playfair Cipher Used in WWI and WWII s e f o v i/j a g q w m b h r x Key: simple p c k t y Downloaded From (http://(http:// l d n u z )(http:// )

Playfair Cipher! Use filler letter to separate repeated letters! Encrypt two letters together " Same row followed letters # ac--bd " Same column letters under # qw--wi " Otherwise square s corner at same row # ar--bq )(http:// ) Downloaded From (http://(http://

Analysis! Size of diagrams: 25!! Difficult using frequency analysis " But it still reveals the frequency information )(http:// ) Downloaded From (http://(http://

! Encryption Hill Cipher " Assign each letter an index " C=KP mod 26 " Matrix K is the key! Decryption " P=K -1 C mod 26 )(http:// ) Downloaded From (http://(http://

Analysis! Difficult to use frequency analysis! But vulnerable to known-plaintext attack )(http:// ) Downloaded From (http://(http://

Polyalphabetic Substitution! Use more than one substitution alphabet! Makes cryptanalysis harder " since have more alphabets to guess " and flattens frequency distribution # same plaintext letter gets replaced by several ciphertext letter, depending on which alphabet is used )(http:// ) Downloaded From (http://(http://

Vigenère Cipher! Basically multiple Caesar ciphers! key is multiple letters long " K = k 1 k 2... k d " ith letter specifies ith alphabet to use " use each alphabet in turn, repeating from start after d letters in message! Plaintext THISPROCESSCANALSOBEEXPRESSED Keyword CIPHERCIPHERCIPHERCIPHERCIPHE Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH )(http:// ) Downloaded From (http://(http://

One-time Pad! Gilbert Vernam (AT&T)! Encryption " C=P K! Decryption " P=C K! Difficulty: key K is as long as message P )(http:// ) Downloaded From (http://(http://

Transposition Methods! Permutation of plaintext! Example " Write in a square in row, then read in column order specified by the key! Enhance: double or triple transposition " Can reapply the encryption on ciphertext )(http:// ) Downloaded From (http://(http://