# Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Save this PDF as:

Size: px
Start display at page:

Download "Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g."

## Transcription

1 Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections & Introduction Simple Methods Asymmetric methods: public and private keys. Finance: many transactions encrypted, e.g. PIN on ATM card Commerce: sensitive negotiations, electronic commerce Military: battle plan, weapon control Diplomacy: sensitive negotiations In each case: Trying to communicate at a distance. Others could easily eavesdrop, or insert messages You don t want them to know the content of your message (e.g., credit card details; battle plan). 1 2 Secret Writing Methods Two alternatives: So use some secret writing technique(s) so the message can only be understood by intended recipient. Predates computing, although early computers were developed to break encryption, e.g. the Enigma code. Steganography: hidden writing, e.g. invisible ink, using low-definition bits of sound/graphics files. Big advantage: don t reveal to enemy that you have information to hide. Cryptology: scramble the message. Has two disciplines: Cryptography: developing codes/ciphers Cryptanalysis: breaking codes/ciphers 3 4

2 Cryptographic Terminology There are two main encryption methods: Transposition: reorder character/word by another Substitution: replace 1 character/word by another Either method can be applied to words or characters: Codes operate on words, where Ciphers operate on characters. Encryption methods may be Symmetric: same key used by sender and receiver. Hence vital that key doesn t get into hands of the enemy. Asymmetric: sender uses one key to encrypt, receiver uses another to decrypt. Hence senders key may be public. Encryption Example PLAINTEXT: attack at dawn KEY ===============> CIPHERTEXT / \ > / \ / \ \ / \ SENDER \ RECEIVER v / \ / \ ENEMY 5 6 A typical method: Sender transmits key to reciever (may need to be over a secure channel) Sender encrypts plaintext using key to produce ciphertext Sender transmits ciphertext over insecure channel Receiver uses key to decrypt ciphertext. Enemy or cryptanalyst intercepts message and attempts to break the encryption, i.e. decrypt it without the key. Must be sufficiently hard to break the encryption that it isn t worth the enemies time! Symmetric Methods Columnar Transposition Cipher To encrypt: Write the plaintext in columns of depth k (= key), padding (with *) the end as necessary, read off in rows, e.g. if key = 4. Plaintext: Transposition ciphers are easy! T s i n p s e s r p t _ h y a o i c e a e! n s o i r r a * Ciphertext: Tsinpsesrpt h yaoiceae!nsoirra* To decrypt: write ciphertext as rows of (message length/k), and read off columns. To break: try every key between 1 and message length (easy) 7 8

3 Better Method Caesar Cipher A Substitution Cipher Key = k (some small integer) To encrypt: replace Nth letter of alphabet with (N+k)th, e.g. k = 2 a b c d e f g h i j k l m n o p q r s t u v w x y z _ c d e f g h i j k l m n o p q r s t u v w x y z _ a b So plaintext attack is encrypted as cvvcem. To decrypt: Replace Nth letter by (N-k)th. To break: Try all values of k until get something meaningful (very easy!) To encrypt: Use a fixed permutation of the alphabet as the key, i.e. map each character to another e.g., a b c d e f g h i j k l m n o p q r s t u v w x y z _ q w e r t y u i o p a s d f g h j k l z x c v b n _ m So plaintext badly is encrypted as wqrsn. To break: You might think this would be hard to break: there is an enormous choice of keys (26!), but providing there s enough cipher text it s easy to break using simple statistical methods. The occurrence frequencies of each character in a language is well known, e.g. in English e is most common, then t etc. Also look for common short words, e.g. digrams ( an, at, as ) and trigrams ( the, and ) Exercise: Use the permutation above to encrypt 9 10 Vigenere Cipher Like simple Caeser cipher, but use a repeated key to specify k for each character in plaintext: key: abc = (k values 1, 2 3) three million plaintext: attack key abcabc.. k ciphertext: bvwben Harder to decrypt. Can t use character frequencies, and with long key, will take a long time to try all possible keys. Exercise: Use the Vignere cipher to encrypt three million using key bad 11 12

4 Vernam Cipher (One time pad) Use above method, but with key as long as plaintext Only use it once! VERY secure; no way to decrypt as equally likely to end up with any message at all. Problems memorizing/distributing key. But useful in situations where a key can be sent ahead of time. Possible keys: A book: Alice in Wonderland, edition X, starting on page 102, line 4. Pads containing 100s of pages of keys. Simple Cryptanalysis Methods How do we break ciphertexts? Brute force: try all possible keys. Statistical: look at character frequencies. Cribs: Look for known parts of message e.g., /html header, date, time, spaces. Or a combination. Try all likely combinations, once other methods have suggested most likely ones. Exercise: Use the Vignere cipher to encrypt three million using key sadbadmadladhad Exercise: Is sadbadmadladhad a good key? Why? Pseudo keys How do we approximate the security of the one-time pad, without the overhead of needing a very long key? Generate a very long (longer than plaintext) key from a shorter ones, in a pseudo- random fashion. For example a simple encryption machine, takes the true key (cryptovariable): Generates long key from it as a stream of bits. XORs this with the binary of the plaintext. Exercise: Locate and experiment with a Java pseudorandom number generator true key: pseudokey: plaintext: ciphertext: Decrypt using exactly same method

5 DES Operation DES - The Data Encryption Standard The Data Encryption Standard, or DES, was the first official U.S. government cipher intended for commercial use. DES is the most widely used cryptosystem in the world. DES is a block cipher, which operates on 64-bit data fragments, using a 56-bit key. 64-bit Plaintext \/ 56-bit key Transposition 1 \/ \/ Substitution 1 < Pseudo Key Generator \/ /. /. / / Substitution 16<----- \/ Transposition 2 \/ Transposition 3 \/ 64-bit Ciphertext DES In Practice The substitution stages in DES re-arrange the order of the bits from the previous stage, and use XOR to combine them with the key. The effectiveness of DES is based on the complexity of the 19 stages. In the above diagram, two identical 64-bit plaintexts will result in identical ciphertexts. This is called the Electronic Code Book (ECB) mode of operation. The ECB mode of operation is now rarely used, since it is now generally agreed that it is breakable given sufficient resources In the Chain Block Cipher (CBC) mode, each block of plaintext is exclusive-ored with the ciphertext output from the previous encryption operation. Thus, the next block of ciphertext is a function of its corresponding plaintext, the 56-bit key and the previous block of ciphertext. Identical blocks of plaintext no longer generate identical ciphertext, which makes this system much more difficult to break. The CBC mode of DES is the normal method for encryption in modern business data communications

6 DES Evaluation The original (IBM) algorithm which was the basis of DES used a 128 bit key. The US government changed this to a 56 bit key. This made DES considerably less secure. Many people believe that the US government has a backdoor (or trapdoor) decryption technique which is infeasible at 128 bits, but possible with 56. This has never been confirmed. 56 bit key DES is nowadays regarded as probably crackable. A variation called triple encryption DES uses two keys (112 bits) and is currently considered sufficiently secure. The Advanced Encryption Standard Other encryption standards exist. The Advanced Encryption Standard (AES) is intended to be a cipher that will remain secure for several decades from now. AES supports key sizes of 128 bits, 192 bits, and 256 bits, in contrast to the 56-bit keys offered by DES. The AES algorithm was published in November 2002, and is now gaining widespread use, and superseding DES. See good article on Wikipedia Java Cryptography Engine Java programs execute over insecure networks, and hence are vulnerable to security attacks The Java Cryptography Engine(JCE) is part of the java.security package & contains methods to: Generate key pairs Construct cipher objects, with encryption/ decryption methods, e.g. Cipher ciph = Cipher.getInstance( DES ) Initialise cipher objects, e.g. ciph.initencrypt(keys) Encrypt/Decrypt the data, e.g. Asymmetric Methods: Public Key Cryptosystems How to safely send key from sender to receiver? Avoid problem by using different keys to decrypt/encrypt. Sender uses PUBLIC key to encrypt. Receiver uses PRIVATE key to decrypt. Ciphertext can NOT be decrypted using public key. So public key can be published, like telephone directory. Private keys never transmitted. byte[] ciphertext = ciph.crypt(cleartext) 23 24

7 Public Key Example Suppose you want to send a secret message M to John. Look up John s public key. Encrypt your message using it, and transmit to John. John then uses his private key to decrypt. More formally, given message M, public key P, and private key S, then encrypted message is P(M) and decrypted message is S(P(M)). We must guarantee that S(P(M))=M, and can t decrypt knowing P. Challenge: How do we come up with suitable public and private keys to make it work? RSA Public Key Encryption Developed by Rivest, Shamir and Aldeman at MIT around 1977, represents public and private keys as pairs of big numbers (N, P) and (N, S). Message also represented as a number M. Prime number theory used to find suitable values for S, N and P, as follows: Choose three prime numbers x,y,z (say 3, 5, 7). S=largest (i.e. 7) N=product of other two (i.e. 15) P chosen so PxS % (x-1)(y-1) = 1 i.e. 7P % 8=1. e.g. P= To encrypt: C = M P % N. e.g., M=2, C = 2 23 % 15 = 8 To decrypt: M = C S % N. e.g., = 8 7 % 15 = 2 To break: Very hard! We know from number theory that factoring the product of large primes is computationally very expensive. In practice keys are primes with hundreds of digits. As it s believed to be relatively secure, RSA is widely used: e.g. in Internet Browsers (e.g. Mozilla, Netscape) and PGP (Pretty Good Privacy). RSA Session Keys Although secure RSA encryption needs hard maths to construct the keys! Encryption/decryption time consuming. So method often used to encrypt keys not whole message. You send a message with an RSA encrypted KEY. Decode it using RSA to get ordinary key. Then decode message with the ordinary key using symmetric methods. The ordinary key is referred to as the session key. Can be randomly generated, and only used once

8 Internet Browser Encryption Browsers like Mozilla & Netscape use: RSA key encryption to encode a session key. Session key used to encrypt/decrypt subsequent messages. In practice: Client finds server s public key. Generates a random session key. Encrypts session key with server s public key (using RSA). Encrypts message with session key (using simpler methods) Sends encrypted session key + encrypted message. Server decrypts session key using private key. Decrypts message using session key. Social and Ethical Issues Encryption world is secretive: often organisations don t reveal if a code can be broken. Governments monitor communications, e.g. GCHQ and phone satellites scan phone calls and s for keywords like bomb Columbia, CIA seek to break codes Individuals have a right to privacy, and commonly available software, e.g. PGP freeware, secure communication, encrypted disks: disliked by governments. In the context of terrorism, crime, drug trafficking and money laundering should secure communication be widely available? Summary Simple Symmetric methods: Columnar trans. Caesar, Vernam Simple codes&ciphers broken using frequencies, cribs, brute force. Pseudo-keys: long keys generated from shorter ones; harder to break. Standards: DES, AES Asymmetric methods, e.g.rsa public key encryption: needn t transfer key. WWW: public key encryption of session keys. Social & Ethical Issues 31

### Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

### Today ENCRYPTION. Cryptography example. Basic principles of cryptography

Today ENCRYPTION The last class described a number of problems in ensuring your security and privacy when using a computer on-line. This lecture discusses one of the main technological solutions. The use

### Applied Cryptology. Ed Crowley

Applied Cryptology Ed Crowley 1 Basics Topics Basic Services and Operations Symmetric Cryptography Encryption and Symmetric Algorithms Asymmetric Cryptography Authentication, Nonrepudiation, and Asymmetric

### APNIC elearning: Cryptography Basics. Contact: esec02_v1.0

APNIC elearning: Cryptography Basics Contact: training@apnic.net esec02_v1.0 Overview Cryptography Cryptographic Algorithms Encryption Symmetric-Key Algorithm Block and Stream Cipher Asymmetric Key Algorithm

### Symmetric Key cryptosystem

SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

### Network Security. HIT Shimrit Tzur-David

Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

### Shift Cipher. Ahmet Burak Can Hacettepe University. Substitution Cipher. Enigma Machine. How perfect secrecy can be satisfied?

One Time Pad, Block Ciphers, Encryption Modes Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Basic Ciphers Shift Cipher Brute-force attack can easily break Substitution Cipher Frequency analysis

### Cryptography and Network Security

Cryptography and Network Security Xiang-Yang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his

### Lecture 5 - Cryptography

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

### Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

### Data Encryption A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. we would encrypt the string IDESOFMARCH as follows:

Data Encryption Encryption refers to the coding of information in order to keep it secret. Encryption is accomplished by transforming the string of characters comprising the information to produce a new

### uses same key for encryption, decryption classical, conventional, single-key encryption

CEN 448 Security and Internet Protocols Chapter 2 Classical Encryption Techniques Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University

### Cryptography and Cryptanalysis

Cryptography and Cryptanalysis Feryâl Alayont University of Arizona December 9, 2003 1 Cryptography: derived from the Greek words kryptos, meaning hidden, and graphos, meaning writing. Cryptography is

### IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

### Cryptography & Network Security

Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security

### Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

### 7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

### Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

### Properties of Secure Network Communication

Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

### Secure Network Communication Based on Text-to-Image Encryption

Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN

### Secret Writing. Introduction to Cryptography. Encryption. Decryption. Kerckhoffs s ( ) Principle. Security of Cryptographic System

Introduction to Cryptography ECEN 1200, Telecommunications 1 Secret Writing Cryptography is the science and study of secret writing. More specifically, cryptography is concerned with techniques for enciphering

### 159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

### 9/17/2015. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Cryptography Basics IT443 Network Security Administration Instructor: Bo Sheng Outline Basic concepts in cryptography system Secret cryptography Public cryptography Hash functions 1 2 Encryption/Decryption

### Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

### Network Security. Outline of the Tutorial

Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and

### Cryptography and Network Security

Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

### CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

### Chapter 8. Network Security

Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

### The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft

### Application Layer (1)

Application Layer (1) Functionality: providing applications (e-mail, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.)

### Cryptography and Network Security Chapter 2

Cryptography and Network Security Chapter 2 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 2 Classical Encryption Techniques "I am fairly familiar with all

### The Data Encryption Standard (DES)

The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

### Evaluation of the RC4 Algorithm for Data Encryption

Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,

### Chapter 10 Asymmetric-Key Cryptography

Chapter 10 Asymmetric-Key Cryptography Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10.1 Chapter 10 Objectives Present asymmetric-key cryptography. Distinguish

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

### Network Security - ISA 656 Introduction to Cryptography

Network Security - ISA 656 Angelos Stavrou September 18, 2007 Codes vs. K = {0, 1} l P = {0, 1} m C = {0, 1} n, C C E : P K C D : C K P p P, k K : D(E(p, k), k) = p It is infeasible to find F : P C K Let

### Network Security. Omer Rana

Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography

### Introduction to Symmetric and Asymmetric Cryptography

Introduction to Symmetric and Asymmetric Cryptography Ali E. Abdallah Birmingham CityUniversity Email: Ali.Abdallah@bcu.ac.uk Lectures are part of the project: ConSoLiDatE Multi-disciplinary Cooperation

### Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

### Cryptography and Network Security Block Cipher

Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit

### Cyber Security Workshop Encryption Reference Manual

Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics

### Introduction to Encryption

Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology

### Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

### Chap 2. Basic Encryption and Decryption

Chap 2. Basic Encryption and Decryption H. Lee Kwang Department of Electrical Engineering & Computer Science, KAIST Objectives Concepts of encryption Cryptanalysis: how encryption systems are broken 2.1

### Chapter 10 Asymmetric-Key Cryptography

Chapter 10 Asymmetric-Key Cryptography Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 10.1 Chapter 10 Objectives To distinguish between two cryptosystems: symmetric-key

### Cryptography Exercises

Cryptography Exercises 1 Contents 1 source coding 3 2 Caesar Cipher 4 3 Ciphertext-only Attack 5 4 Classification of Cryptosystems-Network Nodes 6 5 Properties of modulo Operation 10 6 Vernam Cipher 11

### Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology s.mahapatra15101987@gmail.com

Computing For Nation Development, March 10 11, 2011 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi A Comparative Evaluation of Various Encryptions Techniques Committing

### CRYPTOGRAPHIC ALGORITHMS (AES, RSA)

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA CRYPTOGRAPHIC ALGORITHMS (AES, RSA) A PAPER SUBMITTED TO PROFESSOR GILBERT S. YOUNG IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE COURSE CS530 : ADVANCED

### Cryptology introduction

Cryptology introduction Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2015/16) Content Introduction security requirements Encryption simple examples,

### Overview of Symmetric Encryption

CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send

### CRYPTOGRAPHIC PRIMITIVES AN INTRODUCTION TO THE THEORY AND PRACTICE BEHIND MODERN CRYPTOGRAPHY

CRYPTOGRAPHIC PRIMITIVES AN INTRODUCTION TO THE THEORY AND PRACTICE BEHIND MODERN CRYPTOGRAPHY Robert Sosinski Founder & Engineering Fellow Known as "America's Cryptologic Wing", is the only Air Force

### SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY

### CRYPTOGRAPHY IN NETWORK SECURITY

ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

### Chapter 10. Network Security

Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

### Advanced Analogue and Digital Encryption Methods. Presented by: Dr. S. Sarpal

Advanced Analogue and Digital Encryption Methods Presented by: Dr. S. Sarpal Background Term given to a mathematical algorithm OR a set of known sequences. Mixed with message to hide the meaning of content.

### Cryptographic process for Cyber Safeguard by using PGP

Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

### Cryptography. some history. modern secret key cryptography. public key cryptography. cryptography in practice

Cryptography some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) modern secret key cryptography DES, AES public key cryptography RSA, digital signatures cryptography in practice

### Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

### Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

### Crypto Basics. Ed Crowley. Spring 2010

Crypto Basics Ed Crowley Spring 2010 Kerckhoff s Principle Symmetric Crypto Overview Key management problem Attributes Modes Symmetric Key Algorithms DES Attributes Modes 3DES AES Other Symmetric Ciphers

### Application Layer (1)

Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number

### 1 Data Encryption Algorithm

Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been

### Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

### Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

### Cryptography and Network Security

Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 1: Introduction Ion Petre Department of IT, Åbo Akademi University January 10, 2012 1 Motto Unfortunately, the technical

### Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1

Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You

### Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle

CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational

### Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What

### Security and Cryptography 1. Stefan Köpsell, Thorsten Strufe. Module 4: Basic Crypto, Stream Ciphers

Security and Cryptography 1 Stefan Köpsell, Thorsten Strufe Module 4: Basic Crypto, Stream Ciphers Disclaimer: Günter Schäfer, Mark Manulis, large parts from Dan Boneh Dresden, WS 16/17 Reprise from the

### Network Security Technology Network Management

COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

### CSE/EE 461 Lecture 23

CSE/EE 461 Lecture 23 Network Security David Wetherall djw@cs.washington.edu Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data

### 1 Simple substitution ciphers

Date: Monday, September 16, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Classic encipherment methods 1 Simple substitution ciphers The message encipherment

### Lecture 13. Transport Layer Security/ Secure Socket Layer (TLS/SSL) (Chapter 9 in KPS)

Lecture 13 Transport Layer Security/ Secure Socket Layer (TLS/SSL) (Chapter 9 in KPS) SSL: Secure Sockets Layer vwidely deployed security protocol supported by almost all browsers, web servers the s in

### FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people

### CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

CSE331: Introduction to Networks and Security Lecture 20 Fall 2006 Announcements Homework 2 has been assigned: **NEW DUE DATE** It's now due on Friday, November 3rd. Midterm 2 is Friday, November 10th

### Basics of Cryptography

Basics of Cryptography What is Cryptography? Cryptography is an applied branch of mathematics In some situations it can be used to provide Confidentiality Integrity Authentication Authorization Non-repudiation

### SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

### Stream Ciphers. Example of Stream Decryption. Example of Stream Encryption. Real Cipher Streams. Terminology. Introduction to Modern Cryptography

Introduction to Modern Cryptography Lecture 2 Symmetric Encryption: Stream & Block Ciphers Stream Ciphers Start with a secret key ( seed ) Generate a keying stream i-th bit/byte of keying stream is a function

### Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India sd_patil057@rediffmail.com Modern College of Engineering,

### CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

### Insight Guide. Encryption: A Guide

Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your

### Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

### Security usually depends on the secrecy of the key, not the secrecy of the algorithm (i.e., the open design model!)

1 A cryptosystem has (at least) five ingredients: 1. 2. 3. 4. 5. Plaintext Secret Key Ciphertext Encryption algorithm Decryption algorithm Security usually depends on the secrecy of the key, not the secrecy

### Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.

About the Tutorial This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting

### Cryptography. Helmer Aslaksen Department of Mathematics National University of Singapore

Cryptography Helmer Aslaksen Department of Mathematics National University of Singapore aslaksen@math.nus.edu.sg www.math.nus.edu.sg/aslaksen/sfm/ 1 Basic Concepts There are many situations in life where

### CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher

### The Mathematics of RSA

The Mathematics of RSA Dimitri Papaioannou May 24, 2007 1 Introduction Cryptographic systems come in two flavors. Symmetric or Private key encryption and Asymmetric or Public key encryption. Strictly speaking,

### ... Assignment 3 - Cryptography. Information & Communication Security (SS 2016) M.Sc. Welderufael B. Tesfay

Assignment 3 - Cryptography Information & Communication Security (SS 2016) M.Sc. Welderufael B. Tesfay Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M.

### Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain

### CIS433/533 - Computer and Network Security Cryptography

CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and

### An Introduction to RSA Public-Key Cryptography

An Introduction to RSA Public-Key Cryptography David Boyhan August 5, 2008 According to the U.S. Census Bureau, in the 1st quarter of 2008, approximately \$33 billion worth of retail sales were conducted

6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure

### Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

### Chapter 23. Database Security. Security Issues. Database Security

Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

### Safer data transmission using Steganography

Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

### CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

### Introduction to Cryptography. By Marcus K. G. Adomey Chief Operations Manager AfricaCERT

Introduction to Cryptography By Marcus K. G. Adomey Chief Operations Manager AfricaCERT Email: marcus.adomey@africacert.org OVERVIEW Cryptography Definition Terminology History Goal and Services Types