Introduction To Security and Privacy Einführung in die IT-Sicherheit I



Similar documents
How To Understand Cryptanalysis

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Priyanka et al. Page 17

Cyber Security Workshop Encryption Reference Manual

Introduction to Hill cipher

Network Security. HIT Shimrit Tzur-David

A Probabilistic Quantum Key Transfer Protocol

IT Networks & Security CERT Luncheon Series: Cryptography

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

CS 0427 Network Security. Slides Courtesy of William Stallings, Cryptography & Network Security, Pearson Education, 4th Edition

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security: Cryptography CS/SS G513 S.K. Sahay

Application Layer (1)

Cryptography & Network Security

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Lecture 9 - Network Security TDTS (ht1)

Solutions to Problem Set 1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

CIS433/533 - Computer and Network Security Cryptography

Introduction to Encryption

Chap 2. Basic Encryption and Decryption

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Database Security. The Need for Database Security

About the Tutorial. Audience. Prerequisites. Disclaimer & Copyright. Cryptography

Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography

Multiplicative Ciphers. Cryptography of Multiplicative Ciphers

The application of prime numbers to RSA encryption

1 Message Authentication

Advanced Topics in Cryptography and Network Security

An Introduction to Hill Ciphers Using Linear Algebra

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

24 th IEEE Annual Computer Communications Workshop (CCW)

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Chapter 2 Homework 2-5, 7, 9-11, 13-18, 24. (9x + 2)(mod 26) y 1 1 (x 2)(mod 26) 3(x 2)(mod 26) U : y 1 = 3(20 2)(mod 26) 54(mod 26) 2(mod 26) c

CSE/EE 461 Lecture 23

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Fundamentals of Computer Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CSCE 465 Computer & Network Security

Hill s Cipher: Linear Algebra in Cryptography

Cryptography & Digital Signatures

The New Approach of Quantum Cryptography in Network Security

Basic Algorithms In Computer Algebra

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Symmetric Key cryptosystem

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

CSCE 465 Computer & Network Security

1 Data Encryption Algorithm

Overview of Symmetric Encryption

CPSC 467b: Cryptography and Computer Security

Message Authentication Codes

How To Understand And Understand The History Of Cryptography

Physical-layer encryption on the public internet: A stochastic approach to the Kish-Sethuraman cipher

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

SRI VIDYA COLLEGE OF ENGINEERING & TECHNOLOGY - VIRUDHUNAGAR. Sri Vidya College of Engineering and Technology Department of Information Technology

Elliptic Curve Cryptography Methods Debbie Roser Math\CS 4890

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Modes of Operation of Block Ciphers

Page 1. Session Overview: Cryptography

Content Teaching Academy at James Madison University

Extension of Playfair Cipher using 16X16 Matrix

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

Properties of Secure Network Communication

Chapter 23. Database Security. Security Issues. Database Security

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Application Layer (1)

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

CS155. Cryptography Overview

Elements of Applied Cryptography Public key encryption

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

K80TTQ1EP-??,VO.L,XU0H5BY,_71ZVPKOE678_X,N2Y-8HI4VS,,6Z28DDW5N7ADY013

CS 758: Cryptography / Network Security

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

The Misuse of RC4 in Microsoft Word and Excel

CIS 5371 Cryptography. 8. Encryption --

Security in Distributed Systems. Network Security

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

Computer and Network Security. Alberto Marchetti Spaccamela

Authentication in WLAN

Cryptography and Network Security

Chapter 7: Network security

Public Key Cryptography and RSA. Review: Number Theory Basics

Encryption and Decryption for Secure Communication

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Transcription:

Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/ 1

Multiple letter ciphers 2

Playfair Cipher Drawback of monoalphabetic cipher: Not even the large number of keys provides security Only shuffles frequency distribution of letters Encryption of multiple letters: Instead of encrypting single letters, now encrypt pairs of letters. E.g. map pair th to pair XP The Playfair Cipher is an example History of Playfair: Invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair Standard cipher of British army in Word War 1 and still used in Word War 2 3

Playfair Key Matrix Construction of Cipher: A 5X5 matrix of letters based on a keyword Fill in letters of keyword (MONARCHY) Fill rest of matrix with other letters E.g. using the keyword MONARCHY M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z 4

Encrypting and Decrypting Plaintext is encrypted two letters at a time 1. Repeated letters: insert filler like 'X 2. Letters in same row: replace each with letter to right (wrapping back to start from end) 3. Letters in same column: replace each with the letter below it (wrapping to top from bottom) 4. Otherwise: each letter is replaced by the letter in the same row and in the column of the other letter of the pair M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z 1. balloon -> BA LX LO ON 2. ar -> RM 3. mu ->CM 4. hs -> BP 5

Encrypting and Decrypting Plaintext is encrypted two letters at a time 1. Repeated letters: insert filler like 'X 2. Letters in same row: replace each with letter to right (wrapping back to start from end) 3. Letters in same column: replace each with the letter below it (wrapping to top from bottom) 4. Otherwise: each letter is replaced by the letter in the same row and in the column of the other letter of the pair M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z 1. balloon -> BA LX LO ON 2. ar -> RM 3. mu ->CM 4. hs -> BP 6

Encrypting and Decrypting Plaintext is encrypted two letters at a time 1. Repeated letters: insert filler like 'X 2. Letters in same row: replace each with letter to right (wrapping back to start from end) 3. Letters in same column: replace each with the letter below it (wrapping to top from bottom) 4. Otherwise: each letter is replaced by the letter in the same row and in the column of the other letter of the pair M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z 1. balloon -> BA LX LO ON 2. ar -> RM 3. mu ->CM 4. hs -> BP 7

Security of Playfair Cipher Positive: Security much improved over monoalphabetic, since have 26 x 26 = 676 digrams Would need a 676 entry frequency table to analyse (verses 26 for a monoalphabetic) And correspondingly more ciphertext Drawback: It can be broken, given a few hundred letters, since still has much of plaintext structure 8

Polyalphabetic ciphers 9

Polyalphabetic Ciphers Polyalphabetic substitution ciphers: Improve security using multiple cipher alphabets Make cryptanalysis harder with more alphabets to guess and flatter frequency distribution Use a key to select which alphabet is used for each letter of the message Use each alphabet in turn Repeat from start after end of key is reached 10

Vigenère Cipher Cipher: Simplest polyalphabetic substitution cipher Effectively multiple caesar ciphers key is multiple letters long k = k 1 k 2... k d i th letter specifies i th alphabet to use Use each alphabet in turn Repeat from start after d letters in message Decryption simply works in reverse 11

Example of Vigenère Cipher write the plaintext out write the keyword repeated above it use each key letter as a caesar cipher key encrypt the corresponding plaintext letter E.g. using keyword deceptive (3 4 2 4 15 19 8 21 4) key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext:zicvtwqngrzgvtwavzhcqyglmgj 12

Security of Vigenère Ciphers Positive: Have multiple ciphertext letters for each plaintext letter Hence letter frequencies are better obscured than using monoalphabetic ciphers Attack: Start with letter frequencies and see if look monoalphabetic or not (by letter distribution) If not, then need to determine number of alphabets, since then can attach each 13

Kasiski Method Find Keyword length: Method developed by Babbage / Kasiski Repetitions in ciphertext give clues to period Find same plaintext an exact period apart which results in the same ciphertext Of course, could also be random fluke Example: VTW is repeated after 9 letters in example Suggests keyword length is a devisor of 9, i.e. 3 or 9 Then attack each monoalphabetic cipher individually using same techniques as before key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext:zicvtwqngrzgvtwavzhcqyglmgj 14

Unconditional Security 15

Unconditional Security One time pad Vigenère with plaintext space = ciphertext space = key space For any plaintext & any ciphertext there exists a key mapping one to other Key can be used only once Mathematically: Let P, C, K = {0,1} n be domain of p,c,k, where P = C = K p,c,k {0,1} n, key chosen randomly and uniformly distributed Encryption: c = p k, where is exclusive or Decryption: p = c k Example: key: 101011 plaintext: 011001 ciphertext: 110010 = 16

Unconditional Security Unconditional secure Cipher Insecure Cipher Plaintext p Key k Ciphertext c Plaintext p Key k Ciphertext c 00 00 00 00 01 01 01 01 10 10 10 10 11 11 11 11 k i {0,1} 2, i {1,..,4} k 1 = 01 k 2 = 11 Unconditional security Ciphertext should not provide any new information about plaintext p c P(p c) = P(p), i.e. probability of plaintext p given that ciphertext c is known is the same as directly guessing p Such a system is unbreakable, given any computing time and memory 17

Bayes Probability Theorem Conditional Probability: Let Ω be event space, i.e. set of all elementary events Let A, E 1 Ω be events P(A E 1 ) is prob. of event A given event E 1 (i.e. A conditioned on E 1 ) Bayes theorem: P( A E1) P( A E1) = P( E ) 1 Bayes theorem: Given: Pairwise stochastic independent events E 1, E 2,.., E n E 1,.., E n covers all possible outcomes, i.e. E 1.. E n = Ω and P(E 1.. E n ) = 1 For any even A: P( A) = n i= 1 P( A E ) P( i E i ) P(Ω) = 1 18

Proof Show: Pr(p c) = Pr(p) c is uniformly distributed, because each key is equally likely used p can be arbitrary distributed Plaintext c Key k Ciphertext p 00 01 10 k 1 k 2 k 3 k 4 00 01 10 Pr( p c) Pr( p c) = Pr( c) Pr( c p) Pr( p) = Pr( c) = = = = Pr( p) Pr( c p) Pr( p) Pr( p ) Pr( c p P i Pr( p)2 Pr( p p P i Pr( p) Pr( p p P i i n i i )2 ) n p i ) 11 11 19

Drawback of One-Time-Pad Generation of large quantity of random key is expensive Secure distribution of key But there seems to be a way out by quantum cryptography 20

One-Time-Pad & Quantum Cryptography (Excursion)_ Quantum cryptography Use quantum mechanical effects polarisation of light (photon) Heisenberg uncertainty principle no cloning theory to generate random numbers securely transfer secret key (eavesdropping of key detectable) Commercially available for banking: Id Quantique, Siemens IT Solutions, MagiQ 1. Alice defines: - 0: / or - 1: \ or random base x or + 2. Choose base x or + 50% correct base 3. Eavesdropping cause additional errors (no cloning theorem) 21

One-Time-Pad & Quantum Cryptography (Excursion) Definition: Base: Determine linear polarisation axes of photons. Two bases are possible, either x or + \, / : Possible polarisation directions of a photon using base x, : Possible polarisation directions of a photon using base + Example: Assume base + is used to send photon with polarisation direction If receiver uses base + to measure photon polarisation, then he receives, i.e. original polarisation If receiver uses base x to measure photon polarisation, then he randomly receives in 50% of the cases \ In 50% of the cases / 22

One-Time-Pad & Quantum Cryptography (Excursion) Alice: Sends the base she used for each transmitted bit to Bob, e.g. through the Internet Bob: Drops all the bits where his base is distinct to Alice s base If no eavesdropper: non-dropped bits error free If eavesdropper exists: non dropped bits contain errors. Can be verified by sending checking-bit encrypted with a non-dropped bit Eve: If chooses the same base as Alice to measure polarisation, then no additional error is caused. Only in 50% of the cases If no error detected, then Alice and Bob use one-time-pad and exchanged key for confidential data transmission 23