Cryptography Exercises

Size: px
Start display at page:

Download "Cryptography Exercises"

Transcription

1 Cryptography Exercises 1

2 Contents 1 source coding 3 2 Caesar Cipher 4 3 Ciphertext-only Attack 5 4 Classification of Cryptosystems-Network Nodes 6 5 Properties of modulo Operation 10 6 Vernam Cipher 11 7 Public-Key Algorithms 14 8 Double Encryption 15 9 Vigenere Cipher and Transposition Permutation Cipher Substitution Cipher Substitution + Transposition Affine Cipher Perfect Secrecy Feistel Cipher Block Cipher Digital Encryption Standard (DES) Primitive Element Diffie-Hellman Key Exchange Pohlig-Hellman a-symmetric Encryption 58 2

3 21 ElGamal RSA System Euclid s algorithm Protocol Failure Complexity Authentication Protocols Hash Functions Cipher Modes Pseudo Random Number Generators Linear Feedback Shift Register Challenge Response Application of error correcting codes in biometric authentication General Problems 91 3

4 1 source coding Problem 1.1. We consider 64 squares on a chess board. (a) How many bits do you need to represent each square? (b) In a game on a chessboard one player has to guess where his opponent has placed the Queen. You are allowed to ask six questions which must be answered truthfully by a yes/no reply. Design a strategy by which you can always find the Queen. Show that you can not ensure the exact position when you are allowed to ask five questions. (c) How do you interpret your result in (b) together with your result in (a)? Problem 1.2. A language has an alphabet of five letters x i, i = 1, 2,..., 5, each occurring with probability 1. Find the number of bits needed of a 5 fixed-length binary code in which: (a) Each letter is encoded separately into a binary sequence. (b) Two letters at a time are encoded into a binary sequence. (c) Three letters at a time are encoded into a binary sequence. Which method is efficient in the sense of bit per letter? Problem 1.3. A language has an alphabet of eight letters x i, i = 1, 2,..., 8, with probabilities 0.25, 0.20, 0.15, 0.12, 0.10, 0.08, 0.05 and (a) Determine an efficient binary code for the source output. (b) Determine the average number of binary digits per source letter. Problem 1.4. Suppose a source outputs the symbols {a, b, c, d, e, f, g} with probability {0.4, 0.2, 0.1, 0.1, 0.1, 0.05, 0.05}. (a) Give a binary representation for these symbols and calculate the average representation length. (b) How do you know that your representation has minimum average length? 4

5 2 Caesar Cipher Problem 2.1. We consider a Caesar cipher and assume that the plaintext message is in English. Decrypt the following ciphertext by giving a brief explanation: KNXMNSLKW JXMBF Y JW GJSIXF IRNY XB T W IKNXMW F SIT AJW MJQRNSLF SDIF D Note: Use the following frequency distribution of the letters in the English language for the cryptanalysis: Table 1: a b c d e f g h i j k l m 8, 05 1, 62 3, 2 3, 65 12, 31 2, 28 1, 61 5, 14 7, 18 0, 1 0, 52 4, 03 2, 25 n o p q r s t u v w x y z 7, 19 7, 94 2, 29 0, 20 6, 03 6, 59 9, 59 3, 1 0, 93 2, 03 0, 2 1, 88 0, 09 (a) What can be the main drawback of the substitution cipher given above? (b) Caesar cipher is an example of classical cryptosystem. Is this statement true? Why or why not? (c) Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. Take the third letter in each word of the encrypted message above and find the emerging message. 5

6 3 Ciphertext-only Attack Problem 3.1. We consider a ciphertext-only attack on a substitution cipher and assume that the plaintext message is in English. Decrypt the following ciphertext by giving a brief explanation: XT HQT XJST RF Y Y JW MT BKF W What can be the main drawback of the substitution cipher given above? Problem 3.2. We consider a ciphertext-only attack on a substitution cipher and assume that the plaintext is in English. Decrypt the following ciphertext: ynyqj Hint: Use the frequency distributions of the letters in English language in table 1 for the analysis. 6

7 4 Classification of Cryptosystems-Network Nodes Problem 4.1. Suppose that we have the following network nodes A, B, C and D (Figure 1): Figure 1: A C B D (a) How many keys do we have to generate such that A, B and C can communicate with D in a bidirectional secure way using a symmetric encryption algorithm? (b) We replace the symmetric encryption algorithm with a public key system. How many public keys do we have to generate in this case such that A, B and C can communicate with D in a bi-directional secure way? (c) Suppose that we have 8 nodes in a network. How many symmetric keys do we need such that every pair of nodes can communicate in a safe way? Problem 4.2. (a) Suppose that we have a network with 10 nodes. How many different keys do we have to generate such that every pair of nodes can communicate in a bi-directional secure way using classical cryptosystem? (b) We replace classical system with a public key system. How many different keys do we have to generate such that every pair of nodes can communicate in a bi-directional secure way? (c) Suppose that we extend the network with one more node. How many new extra keys do we need to generate such that every pair of nodes 7

8 can communicate in a bi-directional secure way? (Calculate for classical and public cryptosystems). (d) What is your short conclusion or the interpretation of the results found above? Problem 4.3. (a) Suppose that we have a network with 6 nodes. How many keys do we have to generate such that every pair of nodes can communicate in a bi-directional secure way using the DES encryption algorithm? (b) Suppose that we extend the network with one more node. How many new DES keys do we need such that every pair of nodes can now communicate in a safe way? (c) Instead of DES, we want to use RSA. How many Public keys do we need such that every pair of nodes can now communicate in a safe way? Problem 4.4. (a) Suppose that we have a network with 6 nodes. How many keys do we have to generate such that every pair of nodes can communicate in a bi-directional secure way using the RSA encryption algorithm. (b) Suppose that we extend the network with one more node. How many new Public keys do we need such that every pair of nodes can now communicate in a safe way? (c) Instead of RSA, we want to use DES. How many keys do we need such that every pair of 7 nodes can communicate in a bi-directional safe way? Problem 4.5. Suppose that we have the following network nodes: A, B, C, D. Nodes can communicate over the links shown below (Figure 2). Q1: How many keys do we have to generate such that nodes can communicate over the given links in a bi-directional secure way using the DES encryption algorithm with node A and without node A? Q2: Instead of DES, we want to use ElGamal public key scheme. How many public keys do we have to generate such that nodes can communicate over the given links in a bi-directional secure way with node A and without 8

9 Figure 2: A B C D node A? Answer the above questions for the following network nodes (Figure 3): Figure 3: A B C D Problem 4.6. Consider the figure 4 of a network with nodes A, B, C, D and E. Arrows represent the communication in a bidirectional secure way. 9

10 Figure 4: A B E C D Q A ) How many keys do we have to generate such that the nodes can communicate over the arrows in a bidirectional secure way using a symmetric encryption algorithm? Q B ) We replace the symmetric encryption algorithm with a public key system. How many public keys do we have to generate in this case? 10

11 5 Properties of modulo Operation Problem 5.1. Calculate the modulo operations given below: mod 17 = 7 5 mod 15 = 12 8 mod 7 = 7559 mod 63 = 7559 mod 63 = mod 63 = mod 151 = mod 197 = mod 323 = mod 73 = 7 73 mod 71 = mod 167 = 2 32 mod 5 = 8 64 mod 9 = mod 25 = mod 23 = 4 15 mod 17 = 11

12 6 Vernam Cipher Problem 6.1. Consider a Vernam Cipher with the following encryption scheme (Figure 5): Figure 5: Key sequence K (random) Binary message M C=M K (xor operation) Assume that a language has only three letters A, B and C. Their binary representations are as follows: A = 000, B = 1111, C = Two words in the language are encrypted with the same key sequence: Determine the possible message pair. W 1 = W 2 = Problem 6.2. The Vernam cipher is an example of a perfect stream cipher (Figure 6): For the probability P (k i = 0) = 0.5 and P (x i = 0) = 0.25 calculate P (y i = 0) and P (y i = 1). For the probability P (k i = 0) = 0.4 and P (x i = 0) = 0.3 calculate P (y i = 0) and P (y i = 1). For the probability P (k i = 0) = 0.5 and P (y i = 0) = 0.25 calculate P (x i = 0) and P (x i = 1). For the probability P (k i = 0) = 0.4 and P (y i = 0) = 0.3 calculate P (x i = 0) and P (x i = 1). For the probability P (k i = 0) = 0.5 and P (x i = 0) = 0.4 calculate P (y i = 0) and P (y i = 1). For the probability P (k i = 0) = 0.4 and P (x i = 0) = 0.4 calculate P (y i = 0) 12

13 Figure 6: Binary key k i Binary message x i y i = x i K i and P (y i = 1). For the probability P (k i = 0) = 0.6 and P (x i = 0) = 0.6 calculate P (y i = 0) and P (y i = 1). Problem 6.3. Suppose that we use the following simple encryption (Figure 7): Random bit stream R Figure 7: C= M R Binary message M A language has only two words: A = 111 and B = Two sentences in the language are encrypted with the same random binary sequence R. The first sentence S 1 is encrypted as and the second sentence S 2 is encrypted as Find good candidates for the original sentences. Problem 6.4. a) Consider the following letter encodings: 13

14 letter A E I M O R T V encoding A message M = M ARIO is Vernam encrypted into ciphertext C = AOAMV ; C = M K where shows modulo 2 XOR operation. Find the corresponding encryption key. Provide details of your cryptanalaysis. b) Consider the following two ciphertexts C 1 = IEEIA and C 2 = ORV RO that are obtained from messages M 1 and M 2 respectively under the vernam encryption and the same encryption key. Encrypted messages are two names. Let us denote with m i,k the kth letter in message M i. The following is known about messages (names): m 1,1 = R and m 2,4 = T. Using this information, try to recover messages M 1 and M 2, as well as the encryption key. Provide details of your cryptanalysis. 14

15 7 Public-Key Algorithms Problem 7.1. Encrypt the message encoding using the double Transposition. Choose Key1 and Key2 as exam and study. Problem 7.2. A double transposition cipher uses as first keyword exam and as second keyword topic. Find the plaintext corresponding to the ciphertext C = isthastties. Problem 7.3. Decrypt the ciphertext: HRDY MIP UUNEOBP Y EAMT P OAK using Double Transposition with keys K 1 = CRY P T O and K 2 = MONEY. 15

16 8 Double Encryption Problem 8.1. We consider double encryption of a private-key algorithm in order to increase the security, such that: y = e 2 (e 1 (M)). Assume two ciphers are given as: e 1 (x) = a 1.x + b 1 e 2 (z) = a 2.z + b 2 where x and z represent the input message, a {1,2} and b {1,2} are the coefficients. Show that there is a single cipher e 3 (M) = a 3.M + b 3 which performs exactly the same encryption (and decryption) as the combination e 2 (e 1 (M)). 16

17 9 Vigenere Cipher and Transposition Problem 9.1. (a) For a transposition cipher the letter frequency remains unchanged. (yes/no)? (b) The number of different transposition ciphers for a binary word of length 4 is (c) A transposition cipher destroys dependency between letters. Problem 9.2. Encrypt the message below using the following methods. Assume the English alphabet. Supplieswillarrivetonight 1. Vigenere with key=system. 2. Double Transposition with key1=make, key2=stand. What is the main advantage of Vigenere cipher over Caesar cipher? What is the main goal of the transposition? Why is it stronger to apply double transposition instead of single transposition? Problem 9.3. A Vigenere type of cipher is given as follows: Plaintext space X = {0,..., 25}. Ciphertext space Y = {0,..., 25}. Key space K = {0,..., 25}. Encryption function is defined by: E(X, K) = (X + K) mod n. The following alphabet X = {A, B,..., Z} are identified with the natural numbers. (a) Determine the decryption function. (b) Encrypt the following text by using the key hello and assuming (as usual) that n = 26. Write your answer with a block of length 5 and ignore spaces, dots and commas. (Show your steps briefly!) Mr. P resident, I am delighted to accept your offer. 17

18 Figure 8: modulo 26 Ciphertext Plaintext D D Delay elements Problem 9.4. Consider a Vigenere type of cipher with the encryption scheme given in Figure 8. (a) D represents the delay elements in time where C i and P i are the ciphertext and plaintext with the time index i. Write the encryption function from the figure 8. (b) Determine the decryption function. (c) Draw the equivalent decryption implementation. Problem 9.5. Suppose the message SSDT T RRNNRICNAW COILOAT HKIUSGY IT AT OAAEUN was encrypted using double transposition. Find the keys as well as the plaintext message. Hint: The keys belong to the set {SY ST EMS, ENGINEERING, UNIV ERSIT Y, ESSEN, DUISBURG, CRY P T OGRAP HY }. Problem 9.6. A vigenere type of cipher is given by the rule: C i = P i + P i 2 modulo 26 where C i and P i are ciphertext and plaintext symbols at time i, respectively. It is implemented with two delay elements as shown in figure 9. Give the rule for deciphering and draw the equivalent implementation to decipher the ciphertext. 18

19 Figure 9: modulo 26 Ciphertext Plaintext D D Delay elements Problem 9.7. Decrypt the cipher text ICP EY DRCT EP DRHIEA using the following methods, and the given keys. The alphabet is given by A = 1, B = 2,..., Z = 26. (Note: The plain text may not be a readable message). (a) Vigenere (Key = CRY P T O). (b) Double Transposition (Key1 = CRY P T O, Key2 = ESSEN). Problem 9.8. We consider a Vigenere type block cipher system. You must choose your key according to the last 4 letters of your surname. (Ex: Name: Mengi, Key: engi) Encrypt the following given messages: 1. spyincountry 2. exam Hint: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z. (A=0,.., Z=25). Problem 9.9. A Vigenere type of cipher is given by the rule: C i = (P i + C i 1 +C i 2 ) modulo 26, where C i and P i are ciphertext and plaintext symbols at time i, respectively. It is implemented with 2 delay elements as shown in figure 10: 19

20 Plaintext Figure 10: + modulo 26 Ciphertext Delay elements Give the rule for deciphering and draw the equivalent implementation to decipher the cipher text. 20

21 10 Permutation Cipher Problem Encrypt the message spyarrivesonthursday using the double Transposition. Choose Key1 and Key2 as your first and second name. (Ex.: anil mengi, then the Key1=anil and Key2=mengi). 21

22 11 Substitution Cipher Problem (a) A substitution cipher destroys dependency between letters. (yes/no?) (b) The number of different substitution ciphers for binary words of length 4 is Problem In a substitution cipher we replace symbols by other symbols. Suppose that message symbols are elements from the set {0, 1, 2, 3, 4}. As an example the symbols {0, 1, 2, 3, 4} are replaced by {0, 4, 1, 2, 3}. Note: we assume that substitution from a set {0, 1, 2, 3, 4} to a set {0, 1, 2, 3, 4} is also valid. (a) How many different substitutions are possible for the alphabet with letters {0, 1, 2, 3, 4}. (b) Suppose that we implement a substitution system in a double encryption mode as given in figure 11. All the additions are modulo 5 addition. Figure 11: Message + Modulo 5 + Modulo 5 Cipher Key 1 Key 2 Given the message 2 and the corresponding cipher 4, what are the possible different keys? Problem In a substitution cipher we replace symbols by other symbols. As an example the symbols {00, 01, 10, 11} are replaced by {01, 10, 00, 11}. (a) How many different substitution ciphers are possible for binary words of length 2? 22

23 (b) The simple substitution ciphers can be realized with a table lookup, where rows correspond to messages and columns to keys. The entries in the table are the ciphers. What is the size of your table? (c) Suppose that we implement the substitution in simple way (Figure 12): Figure 12: binary message (a,b) cipher (a j,b k) is modulo 2 binary key K= (j,k) How many different substitutions are possible for this simple encryption? (d) We use this simple substitution cipher in a double encryption mode (Figure 13): Figure 13: Message substitution substitution Cipher Key K 1 Key K 2 Given the message (0, 1) the corresponding cipher is (1, 1). How many different solutions are possible for the key pair (K 1, K 2 )? Give an example. 23

24 Problem In a substitution cipher we replace symbols by other symbols. Suppose that message symbols are elements from the set {0, 1, 2, 3}. As an example the symbols {0, 1, 2, 3} are replaced by {1, 0, 3, 2}. (a) How many different substitutions are possible for the alphabet with letters {0, 1, 2, 3}? Suppose that we implement the substitution in a simple way using key symbols from the set {0, 1, 2, 3}. (b) We use the substitution cipher in a double encryption mode as shown in figure 14: Figure 14: Message substitution + substitution + Cipher Key K Key K 1 = ( j, k ) 2 = ( k, j ) Given the message (1, 2) and the corresponding cipher (3, 0), what is the number of possible keys? Give an example of a key K 1 = (j, k). Problem Given is the following string of ciphertext which was encrypted with substitution cipher: The encryption rule is given as asvphgyt C = (M + K) mod 26 where C is the ciphertext, M is the plaintext and K is the key. We assume that the plaintext is in English. You know that the first plaintext letter is a W. Find the key and decrypt the message. Problem In substitution cipher, we replace symbols by other symbols. The message and the key symbols are elements from the set {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. As an example the symbols {0, 6, 5, 2, 4, 0} are replaced by {1, 2, 3, 4, 5, 1}. 24

25 (Q1) How many different substitutions are possible for the alphabet with letters {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. Suppose that we implement the substitution in a simple way as given in figure 15. Key is given as {8, 5, 4, 6, 8, 2}. Assume that the message is the last 6 numbers of your matriculation number. (Ex.: m.n.= , then the message={4, 5, 7, 6, 5, 2}). (Q2) Calculate the cipher. Figure 15: message (a,b,c,..) + modulo 10 addition cipher=(a+j,b+k,c+l,...) modulo 10 key K=(j,k,l...) 25

26 12 Substitution + Transposition Problem Suppose that we have a binary-to-octal and octal-to-binary substitution followed by a binary transposition scheme as shown in figure 16: Figure 16: (a) How many different schemes can we construct by changing the mapping of the substitutions and transpositions? Hint: the order should be the same, i.e. Binary-to-octal and octal-tobinary substitution followed by a binary transposition scheme. (b) Assume a language with 8 letters: A, B, D, K, M, O, S, T where the decimal representation is A = 0, B = 1,..., T = 7. In order to encrypt a letter in this language, we convert the letter in binary form, apply the scheme above and convert them back into the corresponding letter. Encrypt the given word: BOST AK. Problem Suppose that we have the binary-to-octal and octal-tobinary substitutions followed by a binary transposition scheme shown in figure 17: Q1: How many different schemes can we construct by changing the substitutions and transpositions? (The order should be the same: Binary-to-octal and octal-to-binary substitutions followed by a binary transposition.) 26

27 Figure 17: Q2: Assume a language with 8 letters: A, B, C, K, L, O, T, Y. In order to encrypt a word in this language, we convert the letters into binary form, apply the scheme above and convert them back to corresponding letters. Encrypt the word: KAL. Hint: A=0, B=1, C=2, K=3, L=4, O=5, T=6, Y=7. 27

28 13 Affine Cipher Problem We consider the affine code that transforms a message M into ciphertext C as C = (19.M + 6) mod 31. In other words, M is multiplied with 19, 6 is added to the sum and modulo 31 is taken over the result. (Q 1 ) Encrypt M=29. (Q 2 ) The message can be recovered by an affine transformation of the form M = (a.c + b) mod 31. Determine the constants a and b. Problem The encryption for 128 different symbols is given by the following equation: C = (K 1 M + K 2 ) modulo 128; where C and M represent the cipher and the message, respectively. Q1: For K 1 = 11 and K 2 = 17, encrypt M = 70. Q2: Find the corresponding decryption function. Q3: Give the message that follows from C = 20 for the same K 1 and K 2 values. 28

29 14 Perfect Secrecy Problem Consider the cryptosystem with probability measures given in figure 18: Figure 18: Key K Message M + modulo 4 Cipher C where: (i) K {0, 1, 2, 3} and P (K = 0) = 1/3, P (K = 1) = P (K = 2) = 1/6. (ii) M {0, 1, 2, 3} and P (M = 0) = 1/7, P (M = 1) = 3/7 and P (M = 2) = 2/7. (iii) C = (M + K) modulo 4. (a) Calculate the corresponding probabilities: P (M = 3), P (K = 3), P (C = 0), P (C = 2), P (C = 2 M = 0), P (C = 0 M = 0). (b) What is the condition for perfect secrecy? (c) Does this cryptosystem provide perfect secrecy? mathematically. Prove your answer Problem Consider the cryptosystem with probability measures given as follows: Plaintext space X = {a, b, c}. Ciphertext space Y = {1, 2, 3, 4} 29

30 Key space K = {K 1, K 2 } Encryption functions are defined by: a b c K K Plaintext and key distributions are defined by: a b c 1/4 1/4 1/2 K 1 K 2 1/4 3/4 (a) What is the condition for perfect secrecy? (b) Compute the corresponding probability measures on ciphertext (P (Y = i), i = 1, 2, 3, 4). (c) Check and prove whether this cryptosystem is secure. Problem A ternary source generates symbols M = {0, 1, 2} with probability P (M = 0) = 1, P (M = 1) = P (M = 2) = 1. Consider two 2 4 substitution ciphers given in A and B. Figure 19: K M + mod 3 C (A) We use a substitution cipher with an encryption rule C = (M + K) mod 3 (Figure 19), where K {0, 1} is the key with the probability P (K = 0) = P (K = 1) = 1/2 and C {0, 1, 2} is the ciphertext. Answer the following questions: (a) Calculate P (M = 0 C = 0) and P (C = 2). 30

31 (b) Does this scheme provide perfect secrecy? Motivate your answer mathematically! (B) Another substitution cipher calculates C = M + K (Figure 20), where now C {0, 1, 2, 3} and K {0, 1} with the probability P (K = 0) = P (K = 1) = 1. Answer the following questions: 2 Figure 20: K M + C (c) Calculate P (M = 0 C = 0) and P (C = 2). (d) Which scheme A or B gives better security? Why? Problem Consider the cryptosystem given in figure 21: Figure 21: Key K Message M Cipher C Where: 31

32 M {0, 1}, K {0, 1} : P (K = 0) = P (K = 1) = 1 2, C = M K (a) For a given probability P (M = 0) = 1 3 and P (M = 1) = 2 3, calculate the following probabilities: P (C = 0) =......, P (M = 0 C = 0) = (b) Does this cryptosystem provide perfect secrecy? mathematically! Prove your answer Problem Suppose that a sender and receiver use the encryption table in figure 22: Message x = 0 x = 1 Figure 22: key cipher We assume further that the keys are selected with equal probability and P (X = 0) = 1 P (X = 1) = 1 3. (a) A passive attacker observes the cipher 3. What is the probability that the transmitted message is 1, given the observed cipher is 3? (b) An active attacker changes an observed cipher 3 with 1. What is the probability that this cipher is accepted as valid by the receiver? (c) An active attacker injects the cipher 3. What is the probability that this cipher is accepted as valid by the receiver? Problem Suppose that we have the encryption scheme in figure 23: where (i) M {0, 1, 2} and P (M = 0) = P (M = 1) = P (M = 2) = 1 3, 32

33 Figure 23: Key K Message M + Cipher C (ii) K {0, 1} : P (K = 0) = P (K = 1) = 1 2, (iii) C = M + K modulo 3 Calculate the following probabilities: (a) P (C = 0) = (b) P (M = 0 C = 0) = Problem Consider the cryptosystem with probability measures given as follows: P (K 1 ) P (K 2 ) P (K 3 ) P (a) P (b) 1/4 1/2 1/4 1/4 3/4 Encryption function is given as: Answer the following questions: P (1) = P (2) = P (3) = P (4) = a b K K K Write down the condition for perfect secrecy. 33

34 Is this cryptosystem secure? Why or why not? Problem Consider the cryptosystem with probability measures given in figure 24: Figure 24: Key K Message M + modulo 3 Cipher C K {0, 1, 2} : P (K = 0) = 1/5, P (K = 1) = P (K = 2) = 2/5. M {0, 1, 2} : P (M = 0) = 1/7, P (M = 1) = 4/7. C = (M + K) modulo 3 Q1: Calculate the following probabilities: P (M = 2) = P (C = 0) = Q2: Write down the condition for perfect secrecy. Q3: Does this cryptosystem provide perfect secrecy? Prove your answer mathematically! Problem Suppose that a sender and receiver use the following encryption table: M 1 M 2 K K K K K

35 where M and K represent the message and the key, respectively. Let the keys be selected with equal probability. Probability distribution of the messages is not known. For each transmission the ciphertext is valid for the particular key which is known by both sides. Assume that an attacker knows the encryption table. (Q 1 ) Show mathematically that whether this system does provide perfect secrecy or not. (Q 2 ) An attacker changes an observed cipher 2 by the value 1. The probability that this cipher is accepted as valid by the receiver. (Q 3 ) An attacker changes an observed cipher 3 by the value 2. The probability that this cipher is accepted as valid by the receiver. Problem Suppose that a sender and receiver use the following encryption table: M 1 M 2 K K K K where M and K represent the message and the key respectively. We assume further that the keys and the messages are selected with probability P (M 1 ) = 1/4, P (M 2 ) = 3/4, P (K 1 ) = 1/2 and P (K 2 ) = P (K 3 ) = 1/6. (Q 1 ) Show mathematically that the given system does not provide perfect secrecy. (Q 2 ) Modify plaintext and/or key distribution in such a way that perfect secrecy is obtained. Explain your choice. Problem Consider the cryptosystem in figure 25 with probability measures given as follows: Key K {0, 1, 2} : P (K = 0) = 3/5, P (K = 1) = P (K = 2) = 1/5, Message M {0, 1, 2} : P (M = 0) = 3/7, P (M = 1) = 2/7, 35

36 Figure 25: K M + mod 3 C Cipher C = (M + K) modulo 3. Q1: Calculate the following probabilities. P (M = 2) =... P (C = 0) =... Q2: Write down the condition for perfect secrecy. Q3: Does this cryptosystem provide perfect secrecy? Prove your answer mathematically! Problem Suppose that a sender and receiver use the following encryption table: K 1 K 2 K 3 K 4 K 5 M M where M and K represent the message and the key, respectively. Let the keys be selected with equal probability. The probability distribution of the message is not known. The key and the message determine the ciphertext. Assume that the particular key and the encryption table are known by both sides. (Q 1 ) Show mathematically whether this system provides perfect secrecy or not. (Q 2 ) An attacker changes an observed cipher 4 by the value 1. Give the probability that this cipher is accepted as valid by the receiver. 36

37 (Q 3 ) An attacker changes an observed cipher 3 by the value 1. Give the probability that this cipher is accepted as valid by the receiver. Problem Consider the last 3 numbers of your matriculation number. For the simplicity, the last 3 numbers will be denoted as {mat 1, mat 2, mat 3 }. (Ex.: m.n.= , then the message={mat 1 = 6, mat 2 = 5, mat 3 = 2}). Figure 26: Key K Message M + modulo 12 Cipher C Consider the cryptosystem given in figure 26 where the message and the key are the elements from a set {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. The probability distribution of the message is given as follows, M p(m) 3/10 1/10 1/10 3/20 1/20 1/40 1/10 1/10 1/20 1/40 Keys are equally distributed. Cipher C is calculated as follows, (Q 1 ) Calculate the following probabilities: C = (M + K) modulo 12. (1) P (C = mat 3 ) = P (C = mat 2 M = 2) = P (M = 5 C = mat 1 ) = (Q 2 ) What is the condition for perfect secrecy? (Q 3 ) Prove mathematically whether this system provides perfect secrecy or not? 37

38 Problem The encryption/decryption of a sequence of letters from the alphabet {A, B} into a cipher with letters {a, b, c} is done according to the following table. Key A B 1 a b 2 b c 3 b a 4 c b The key letters {1, 2, 3, 4} have equal probability. An unauthorized person knows the table and can observe and modify the ciphertext. A modification is successful if the receiver accepts the modified cipher symbol, i.e. the ciphertext is valid for the particular key. Example: at time i: plaintext P i = B and K i = 3 gives C i = a. A modification may change a into b for a given K i = 3. Q1: Does the cipher provide perfect secrecy? YES/ NO? Q2: What is the probability of successful modification for an observed cipher b? P (success observed cipher= b) = Q3: What is the probability of successful modification for an observed cipher a? P (success observed cipher = a) = 38

39 15 Feistel Cipher Problem Consider the Feistel network structure in figure 27: Figure 27: Data L 8 bits K x Data R 8 bits bitwise XOR operator e(r,k x ) K y e(*,k y ) bitwise XOR operator Cipher L 8 bits * represents the incoming data Cipher R 8 bits (a) Write down the general mathematical expression for the outputs; cipher- L and cipher-r. (b) Linear feedback shift registers are used to generate random binary sequences. Consider the two LFSRs in figure 28 where D represents the delay elements. For an initial content (seed) of 1 and 0 for both LFSR s, write down the output sequences. (at least 8 bits.) Hint: first output should be the first bit of the sequence. (c) Consider again the Feistel Cipher. Encryption is done by simple XOR operation. We use LFSR-X to generate key sequence Kx (8 bits) and LFSR-Y to generate key sequence Ky (8 bits). Use the first 8 bits 39

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Symmetric Key cryptosystem

Symmetric Key cryptosystem SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Advanced Cryptography

Advanced Cryptography Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security,

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Overview of Symmetric Encryption

Overview of Symmetric Encryption CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send

More information

Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

More information

6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure

More information

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY

More information

Evaluation of the RC4 Algorithm for Data Encryption

Evaluation of the RC4 Algorithm for Data Encryption Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

1 Data Encryption Algorithm

1 Data Encryption Algorithm Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been

More information

Cryptography & Network Security

Cryptography & Network Security Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

CIS433/533 - Computer and Network Security Cryptography

CIS433/533 - Computer and Network Security Cryptography CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

1 Construction of CCA-secure encryption

1 Construction of CCA-secure encryption CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.

More information

How To Understand And Understand The History Of Cryptography

How To Understand And Understand The History Of Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

CIS 5371 Cryptography. 8. Encryption --

CIS 5371 Cryptography. 8. Encryption -- CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Basic Algorithms In Computer Algebra

Basic Algorithms In Computer Algebra Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay

Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

Public Key Cryptography Overview

Public Key Cryptography Overview Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014 Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes

More information

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security: Cryptography CS/SS G513 S.K. Sahay Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information

More information

Lecture 3: One-Way Encryption, RSA Example

Lecture 3: One-Way Encryption, RSA Example ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. Study Group 1 Variables and Types 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. 2. What does the byte 00100110 represent? 3. What is the purpose of the declarations

More information

How To Encrypt With A 64 Bit Block Cipher

How To Encrypt With A 64 Bit Block Cipher The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Network Security - ISA 656 Introduction to Cryptography

Network Security - ISA 656 Introduction to Cryptography Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1) Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm

Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Developing and Investigation of a New Technique Combining Message Authentication and Encryption Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.

More information

Lecture 6 - Cryptography

Lecture 6 - Cryptography Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about

More information

Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 -------------------------------------------------------------------------- Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------

More information

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people

More information

Network Security. Omer Rana

Network Security. Omer Rana Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption

More information

Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Massachusetts Institute of Technology Handout 13 6.857: Network and Computer Security October 9, 2003 Professor Ronald L. Rivest.

Massachusetts Institute of Technology Handout 13 6.857: Network and Computer Security October 9, 2003 Professor Ronald L. Rivest. Massachusetts Institute of Technology Handout 13 6.857: Network and Computer Security October 9, 2003 Professor Ronald L. Rivest Quiz 1 1. This quiz is intended to provide a fair measure of your understanding

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

SFWR ENG 4C03 - Computer Networks & Computer Security

SFWR ENG 4C03 - Computer Networks & Computer Security KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

How To Know If A Message Is From A Person Or A Machine

How To Know If A Message Is From A Person Or A Machine The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau

More information

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Princeton University Computer Science COS 432: Information Security (Fall 2013) Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable

More information

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5) Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain

More information

Solutions to Problem Set 1

Solutions to Problem Set 1 YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose

More information

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt

More information

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility

More information

Security in Computer Networks

Security in Computer Networks CHAPTER 8 Security in Computer Networks Way back in Section 1.6 we described some of the more prevalent and damaging classes of Internet attacks, including malware attacks, denial of service, sniffing,

More information

The application of prime numbers to RSA encryption

The application of prime numbers to RSA encryption The application of prime numbers to RSA encryption Prime number definition: Let us begin with the definition of a prime number p The number p, which is a member of the set of natural numbers N, is considered

More information

CrypTool. www.cryptool.de www.cryptool.com www.cryptool.org. Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

CrypTool. www.cryptool.de www.cryptool.com www.cryptool.org. Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy CrypTool A free software program for creating awareness of IT security issues for learning about and obtaining experience of cryptography for demonstrating encryption algorithms and analysis procedures

More information

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

More information

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631 Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.

More information

A PPENDIX G S IMPLIFIED DES

A PPENDIX G S IMPLIFIED DES A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information