CSC 580 Cryptography and Computer Security

Similar documents
Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography Introduction to Computer Security. Chapter 8

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

2.1 Basic Cryptography Concepts

Cryptography MIS

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Cryptography Introduction

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

COMP4109 : Applied Cryptography

Information Security CS526

Introduction to Cryptography. Lecture 1. Benny Pinkas. Administrative Details. Bibliography. In the Library

Introduction to Cryptography. Lecture 1

CSCE 813 Internet Security Symmetric Cryptography

Classical Cryptography. Thierry Sans

CSC 474/574 Information Systems Security

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Classical Encryption Techniques

CIT 380: Securing Computer Systems. Symmetric Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Worksheet - Reading Guide for Keys and Passwords

Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 24

Cryptography Part II Introduction to Computer Security. Chapter 8

Lecture 2: Secret Key Cryptography

ENGR/CS 101 CS Session Lecture 5

Overview. Recall Basic Idea. CSC 580 Cryptography and Computer Security. March 9, 2017

CPSC 467b: Cryptography and Computer Security

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques

ELECTRONICS DEPARTMENT

Introduction to Symmetric Cryptography

CS61A Lecture #39: Cryptography

Sirindhorn International Institute of Technology Thammasat University

Security. Communication security. System Security

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

APNIC elearning: Cryptography Basics

18-642: Cryptography 11/15/ Philip Koopman

Lecture 1: Perfect Security

Cryptography and Network Security

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Foundations of Cryptology

CSE 127: Computer Security Cryptography. Kirill Levchenko

Cryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi

Practical Aspects of Modern Cryptography

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Introduction to Cryptology. Lecture 2

CPSC 467b: Cryptography and Computer Security

Security: Cryptography

Study Guide to Mideterm Exam

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

P2_L6 Symmetric Encryption Page 1

1 Brief Overview Of the talk

Classical Cryptography

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

CPSC 467b: Cryptography and Computer Security

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Computer Security 3/23/18

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Network Security Essentials Chapter 2

Behrang Noohi. 22 July Behrang Noohi (QMUL) 1 / 18

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

File and Disk Encryption

Computational Security, Stream and Block Cipher Functions

Cryptography. Andreas Hülsing. 6 September 2016

Introduction to Cryptography. Vasil Slavov William Jewell College

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

18-642: Cryptography

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Cryptography BITS F463 S.K. Sahay

Cryptography and Network Security

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Information Security

Tuesday, January 17, 17. Crypto - mini lecture 1

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Information Security CS526

Lecture 2. Cryptography: History + Simple Encryption,Methods & Preliminaries. Cryptography can be used at different levels

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Module 1: Classical Symmetric Ciphers

Cryptography Math/CprE/InfAs 533

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Goals of Modern Cryptography

Scanned by CamScanner

Midterm Exam. CS381-Cryptography. October 30, 2014

Transcription:

CSC 580 Cryptography and Computer Security Encryption Concepts, Classical Crypto, and Binary Operations January 30, 2018

Overview Today: Cryptography concepts and classical crypto Textbook sections 3.1, 3.2 (except Hill cipher), 3.5 Working in Binary To do before Thursday: Study for quiz on HW1! Read Sections 4.1, 4.2, 4.4 Start talking to project team members to solidify project ideas

Introduction to Cryptography Confidentiality Protection for Messages Network Interface agxu4n<:1evxxyel4} 0h7dP6]%< Network Interface Encryption Function Pay with 1234 5678 9012 3456 Plaintext: The message the sender wants to send. Ciphertext: The data that is transmitted. Goal: Ciphertext should reveal no information about plaintext to anyone who doesn t have the decryption key. Decryption Function Pay with 1234 5678 9012 3456

Introduction to Cryptography Confidentiality Protection for Messages Network Interface agxu4n<:1evxxyel4} 0h7dP6]%< Network Interface Encryption Function Pay with 1234 5678 9012 3456 Keys the same or different? The same: Symmetric cipher Some algorithms: DES, AES, Blowfish, RC4 (probably best to avoid ) Best feature: fast! (AES-NI gives 5-10 Gbps) Worst feature: difficult key management. Decryption Function Pay with 1234 5678 9012 3456

Introduction to Cryptography Confidentiality Protection for Messages Network Interface agxu4n<:1evxxyel4} 0h7dP6]%< Network Interface Encryption Function Pay with 1234 5678 9012 3456 Keys the same or different? Different: Public-key crypto Some algorithms: RSA, ElGamal, ECC, Best feature: Simpler key management (can send to a stranger!) Worst feature: Slow (1-2 Mbps for 2048-bit RSA - others are a little faster ) Decryption Function Pay with 1234 5678 9012 3456

Some Terminology Cryptography: Making codes Cryptanalysis: Breaking codes Cryptology: The science of both (generally cryptography now) Participants traditionally given names: Alice and Bob are legitimate users Trent is a trusted third party Eve is a passive adversary (an eavesdropper) Mallory is an active adversary (malicious ) Encipher and encrypt are synonyms (also decipher/decrypt) Written as functions: C = E(K e, P) E : K P C P = D(K d, C) D : K C P K : Keyspace P : Plaintext space C : Ciphertext space

Kerckhoff s Principle The book (section 3.1) talks about two requirements for secure use of conventional encryption - these requirements are from: Kerckhoff s Principle (1883): The security of a cryptosystem depends on the strength of the algorithm and the secrecy of the key. Trying to keep algorithms secret ( security through obscurity ) almost never works. DVD Content Scrambling System (CSS) Mobil Speedpass Every digital rights management system ever (a slightly different issue) Remember design principles: Open Design Better to use a system that experts have pounded on (and failed to break)

Block vs Stream Ciphers Key Plaintext Input 01101 1101 Block Cipher 11010...0110 Ciphertext Output Stream Ciphers Block Ciphers Must be given a minimum amount of data Typical symmetric cipher blocks: 64 or 128 bits If not enough data to fill a block, must either Wait for more data, or Pad the block with extra bits Work in small units - bits or bytes Bit-oriented stream cipher: one bit in, one bit out Consider interactive terminal session... Key 1 0 1 : 1 0 Stream Cipher 1 1 0 : 1 1

Attacker Information/Access What information/access does the attacker have? Ciphertext Only Attackers often here Increasing Attacker Power Known Plaintext Chosen Plaintext Chosen Ciphertext Design for this Real-world examples for all models Interesting point: In the 2014 movie The Imitation Game, breakthrough in cracking German code was basically shifting model from ciphertext only to known plaintext

Types of Attacks Cryptanalysis Analyzes ciphertext/algorithm for patterns or structural properties to get information Example: If most keys used by a cipher result in a being replaced by M, then that s a big clue! Can lead to very fast attacks on weak encryption algorithms! Brute Force Try every possible key to see which produces a sensible plaintext Need to distinguish sensible plaintext from non-sensible Average tests required to break: K / 2 (half the keyspace size) Question: Given a baseline of 1 billion tests/second, how big does the keyspace need to be for brute force to be impractical (use powers of 2).

Classical Cryptography Generalized Caesar Cipher Generalized Caesar Cipher: Shift by k places Example: Shift k = 5 places Plaintext: Ciphertext: A B C D E F... X Y Z F G H I J K... C D E Keyspace size: K = 26 Trivial size to brute force, looking for sensible English.

Classical Cryptography Arbitrary Monoalphabetic Substitution Arbitrary substitute: Any one-to-one mapping can be used Example: Plaintext: Ciphertext: A B C D E F... X Y Z P F J Y N L... O D M Keyspace size: K = 26! = 403,291,461,126,605,635,584,000,000 4 x 10 26 Testing 1 billion keys / second takes 4 x 10 20 sec = 128 million centuries And yet. People solve these all the time for fun (Cryptograms) - how? Cryptanalysis! Letter frequencies, patterns,...

Classical Cryptography Vigenère Polyalphabetic Substitution Idea: Have a sequence of shifts (k 1, k 2,..., k p ) as key After all p are used, start over with k 1 p is the period of the cipher Since different positions use different substitutions, evens out frequencies Example with key (4,1,22,12): Questions for the class to answer: If our alphabet has 64 values (26 upper case, 26 lower, 10 digits, 2 punctuation), what is keyspace size a given p? How large does p have to be for this to be out of range of brute force attacks? Important: Don t use, even with large p - not stuck with brute force, as there are good cryptanalytic attacks.

Classical Cryptography One-Time Pad - On Letters Idea: Vigenère key repeats after p positions. So don t repeat! Requires key to be as long as plaintext Key should be picked randomly (uniform distribution) Example: Use http://www.braingle.com/brainteasers/codes/onetimepad.php Ciphertext: Key test 1: Key test 2: Question: What is the probability that test key 1 is used by sender? What about test key 2? Any reason to believe, as the attacker, that one is more probable than the other? Recall from brute-force: Need to distinguish sensible plaintext from non-sensible More on one-time pad security after talking about binary operators...

Binary Operations AND and OR Recall basic bitwise operations (Operands are really symmetric, but often thought of as data and mask ) AND operation: 0 position in mask are cleared 1 position in mask are copied OR operation: 0 position in mask are copied 1 position in mask are set Widely used (with shift operators) for manipulating individual bits or packing small data fields into single bytes/words.

Binary Operations Exclusive OR XOR operation: 0 position in mask are copied 1 position in mask are flipped Writing as a formula: for bytes/words/bitvectors and, use Question 1: What do you think (( is? Question 2: If y is chosen as a completely random bitvector: What is the probability that the first bit of is 0? Is 1? What is the probability that the last bit of is 0? Is 1?

One-Time Pad On Bytes Idea: Same as with letters, but use XOR instead of alphabet shift Let m be a b-bit long plaintext message Let k be a b-bit long random bitvector (uniformly distributed) Calculate ciphertext Consider captured ciphertext and to possible plaintext messages and 1 2 No a priori reason to think or is more likely 1 2 Possibility 1: was the message - key is 1 Possibility 2: was the message - key is 2 Bottom line: Every b-bit long message is possible, each with equally likely keys Perfect confidentiality - as long as you never re-use any portion of the key! Example of failure to use properly: Venona

One-Time Pad Is perfect confidentiality perfect security? Scenario of an instructor sending a grade to registar using OTP: Alice (instructor) sends a message containing grade F : char value 0x46 Uses OTP key 0xD9 ciphertext is 0x9F Mallory intercepts message (0x9F) and XORs with F A = 0x46 0x41 = 0x07 0x9F 0x07 = 0x98 Bob (registrar) receives message 0x98 and XORs with OTP key 0xD9 0x98 0xD9 = 0x41 = A OTP is a malleable cipher: An active attacker can make a change to the ciphertext that will make a predictable change in the plaintext recovered by the receiver. Bottom line: OTP has perfect confidentiality, but is very hard to use (key management) and is very weak with respect to message integrity.

Steganography Hiding the existence of a message This picture has a secret message embedded.

Steganography Hiding the existence of a message The message was On the Internet, nobody knows you re a dog. It was embedded using the steganography software.