Cryptography Introduction

Similar documents
NETWORK SECURITY & CRYPTOGRAPHY

Cryptographic Concepts

2.1 Basic Cryptography Concepts

Public-key Cryptography: Theory and Practice

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CPSC 467: Cryptography and Computer Security

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

1-7 Attacks on Cryptosystems

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

ECEN 5022 Cryptography

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

CSC 580 Cryptography and Computer Security

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

CSC 474/574 Information Systems Security

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Network Security Issues and Cryptography

Cryptography MIS

CS669 Network Security

Cryptography and Network Security. Sixth Edition by William Stallings

Classical Cryptography. Thierry Sans

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Introduction to Public Key Cryptology. Classical Cryptology

Cryptography Introduction to Computer Security. Chapter 8

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Chapter 10 : Private-Key Management and the Public-Key Revolution

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

1. Diffie-Hellman Key Exchange

Cryptography Math/CprE/InfAs 533

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Ref:

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Lecture 6: Overview of Public-Key Cryptography and RSA

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. 5 March,

CSCE 813 Internet Security Symmetric Cryptography

Public Key Cryptography

Cryptography Introduction

Public Key Cryptography and RSA

CSC/ECE 774 Advanced Network Security

Module 1: Classical Symmetric Ciphers

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

PROTECTING CONVERSATIONS

Cryptography. Intercepting Information Scenario 1. Tuesday, December 9, December 9, Wireless broadcasts information using radio signals

Information Systems Security

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptanalysis. Ed Crowley

CIS 4360 Secure Computer Systems Applied Cryptography

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

BS801E-BSCS. Cryptography

Cryptography ThreeB. Ed Crowley. Fall 08

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptography Lesson Plan

KALASALINGAM UNIVERSITY

Foundations of Cryptology

CS61A Lecture #39: Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Chapter 9 Public Key Cryptography. WANG YANG

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Computer Security 3/23/18

Security. Communication security. System Security

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Chapter 3. Principles of Public-Key Cryptosystems

Computer Security: Principles and Practice

Quantum Encryption Keys

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Key Exchange. Secure Software Systems

APNIC elearning: Cryptography Basics

Classical Encryption Techniques. CSS 322 Security and Cryptography

Cryptography (Overview)

EEC-484/584 Computer Networks

Lecture III : Communication Security Mechanisms

Lecture IV : Cryptography, Fundamentals

CSC 774 Network Security

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Introduction to Cryptography. In the News: Hacker exposes embassies'

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CS 161 Computer Security

Symmetric, Asymmetric, and One Way Technologies

Introduction to Cryptography. Vasil Slavov William Jewell College

Secure Multiparty Computation

Applied Cryptography and Computer Security CSE 664 Spring 2018

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CS 161 Computer Security

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Transcription:

Cryptography Introduction

What Is Cryptography? We generally think of it as encrypting and decrypting.

What Is Cryptography? We generally think of it as encrypting and decrypting. I have a secret and I only want you to hear, so I am going to encode it and only you know how to decrypt it.

What Is Cryptography? We generally think of it as encrypting and decrypting. I have a secret and I only want you to hear, so I am going to encode it and only you know how to decrypt it. This lends itself to referencing an adversary with the point being that even if they steal the message or eavesdrop, they will be unable to understand it. But, the intended receiver will figure it out with relative ease.

Other Uses of Cryptography Another common use is authentification, whether or the message was a secret.

Other Uses of Cryptography Another common use is authentification, whether or the message was a secret. This is where the receiver wants to make sure the sender is the true sender and that the message has not been altered.

Other Uses of Cryptography Another common use is authentification, whether or the message was a secret. This is where the receiver wants to make sure the sender is the true sender and that the message has not been altered. When we are not concerned about the sender but only that the message has not been altered, we are looking at maintaining data integrity.

Where We See These Credit card numbers sent/received electronically

Where We See These Credit card numbers sent/received electronically Online orders - we want to be sure the person on the order actually placed the order

Where We See These Credit card numbers sent/received electronically Online orders - we want to be sure the person on the order actually placed the order Employee ID # s - only one # number is given to each employee and the number given is unique

Where We See These Credit card numbers sent/received electronically Online orders - we want to be sure the person on the order actually placed the order Employee ID # s - only one # number is given to each employee and the number given is unique When data is to be input as, say, an integer from 1-5, and no other values will be accepted

Digital Signatures This deals with the use of cryptography for issues of non-repudation.

Digital Signatures This deals with the use of cryptography for issues of non-repudation. This means that it must be impossible for the signer to later deny the signing.

Digital Signatures This deals with the use of cryptography for issues of non-repudation. This means that it must be impossible for the signer to later deny the signing. This beings up the difference between making cheating detectable v. impossible.

Terminology Definition A cryptosystem or cipher is a procedure to render messages unintelligible, except by the authorized recipient.

Terminology Definition A cryptosystem or cipher is a procedure to render messages unintelligible, except by the authorized recipient. Definition The encryption process, performed by the sender, is intended to make the message unintelligible to an eavesdropper or interceptor.

Terminology Definition A cryptosystem or cipher is a procedure to render messages unintelligible, except by the authorized recipient. Definition The encryption process, performed by the sender, is intended to make the message unintelligible to an eavesdropper or interceptor. Definition The decryption process is conducted by a legitimate receiver to recover the original message (plaintext) from the obscured version (ciphertext).

Terminology Definition A cryptosystem or cipher is a procedure to render messages unintelligible, except by the authorized recipient. Definition The encryption process, performed by the sender, is intended to make the message unintelligible to an eavesdropper or interceptor. Definition The decryption process is conducted by a legitimate receiver to recover the original message (plaintext) from the obscured version (ciphertext). This is accomplished by the recipient and sender sharing a key.

Kerchkoff s Principle Kerckhoff s Principle is named after Auguste Kerckhoff It was first stated in the 19 th century

Kerchkoff s Principle Kerckhoff s Principle is named after Auguste Kerckhoff It was first stated in the 19 th century Kerchkoff s Principle A cryptosystem should be secure even if everything about the system (besides the key) is public knowledge.

Kerchkoff s Principle Kerckhoff s Principle is named after Auguste Kerckhoff It was first stated in the 19 th century Kerchkoff s Principle A cryptosystem should be secure even if everything about the system (besides the key) is public knowledge. Most civilian cryptography follows this principle

Kerchkoff s Principle Kerckhoff s Principle is named after Auguste Kerckhoff It was first stated in the 19 th century Kerchkoff s Principle A cryptosystem should be secure even if everything about the system (besides the key) is public knowledge. Most civilian cryptography follows this principle military ciphers are kept entirely secretive

The Main Issue The main part of this that is of the most interest to us is that the system must be practically, if not mathematically, indecipherable.

The Main Issue The main part of this that is of the most interest to us is that the system must be practically, if not mathematically, indecipherable. An argument in favor of Kerckhoff s Principle is that the standardization of algorithms makes large-scale communication easier.

The Main Issue The main part of this that is of the most interest to us is that the system must be practically, if not mathematically, indecipherable. An argument in favor of Kerckhoff s Principle is that the standardization of algorithms makes large-scale communication easier. We assume that the mechanics of the cryptosystem in use is publicly known (this does not mean that the cipher used does not matter) but the key is secret. This makes the key distribution and management the main issue.

Clarification Code and cipher essentially mean the same thing in English but not in mathematics.

Clarification Code and cipher essentially mean the same thing in English but not in mathematics. Definition A code is a method for concealing the content of a message by exchanging words or phrases for different ones. The transformation depends to some extent on the meaning or grammar of the message.

Clarification Code and cipher essentially mean the same thing in English but not in mathematics. Definition A code is a method for concealing the content of a message by exchanging words or phrases for different ones. The transformation depends to some extent on the meaning or grammar of the message. Definition A cipher treats messages as streams of characters without reference to possible meaning.

More Terms Definition A classic cipher refers to one from before the advent of electronic computing machinery.

More Terms Definition A classic cipher refers to one from before the advent of electronic computing machinery. Definition A symmetric cipher is one in which knowledge of the encryption key is equivalent to knowing the decryption key. All classical ciphers are of this form.

More Terms Definition A classic cipher refers to one from before the advent of electronic computing machinery. Definition A symmetric cipher is one in which knowledge of the encryption key is equivalent to knowing the decryption key. All classical ciphers are of this form. Although they existed before the mid-1970 s, Merkle and Hellman conceived the first example of asymmetric ciphers, where knowledge of the encryption key gives little or no knowledge of the decryption key. The latter are of more interest mathematically.

Attacks on Cryptosystems 1 Ciphertext only: In this case, the person possesses a fragment of the encrypted message but has no knowledge of the plaintext or the key. The goal is either to decrypt using a particular method or to obtain the key.

Attacks on Cryptosystems 1 Ciphertext only: In this case, the person possesses a fragment of the encrypted message but has no knowledge of the plaintext or the key. The goal is either to decrypt using a particular method or to obtain the key. 2 Known plaintext: Here, the person has part of a plaintext and a corresponding ciphertext with a goal of deducing the key. Most classical ciphers are vulnerable to this type of attack.

Attacks on Cryptosystems 1 Ciphertext only: In this case, the person possesses a fragment of the encrypted message but has no knowledge of the plaintext or the key. The goal is either to decrypt using a particular method or to obtain the key. 2 Known plaintext: Here, the person has part of a plaintext and a corresponding ciphertext with a goal of deducing the key. Most classical ciphers are vulnerable to this type of attack. 3 Chosen plaintext: A person as some number of plaintexts that they can choose to see along with the corresponding encryptions. Classical ciphers are even more vulnerable to this type of attack.

Attacks on Cryptosystems 1 Ciphertext only: In this case, the person possesses a fragment of the encrypted message but has no knowledge of the plaintext or the key. The goal is either to decrypt using a particular method or to obtain the key. 2 Known plaintext: Here, the person has part of a plaintext and a corresponding ciphertext with a goal of deducing the key. Most classical ciphers are vulnerable to this type of attack. 3 Chosen plaintext: A person as some number of plaintexts that they can choose to see along with the corresponding encryptions. Classical ciphers are even more vulnerable to this type of attack. 4 Encryption key (relevant to asymmetric systems): Having the key does not give knowledge of the decryption key per se, but the goal is to obtain the decryption key prior to intercepting any ciphertext.