Today. Network Security. Crypto as Munitions. Crypto as Munitions. History of Cryptography



Similar documents
IT Networks & Security CERT Luncheon Series: Cryptography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography & Network Security

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Application Layer (1)

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How To Understand And Understand The History Of Cryptography

Cyber Security Workshop Encryption Reference Manual

CSCE 465 Computer & Network Security

Network Security. HIT Shimrit Tzur-David

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Cryptography and Network Security

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

How To Understand Cryptanalysis

Introduction to Encryption

Network Security. Omer Rana

Network Security Technology Network Management

Application Layer (1)

CIS433/533 - Computer and Network Security Cryptography

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Lecture 9 - Network Security TDTS (ht1)


PAST, PRESENT, AND FUTURE METHODS OF CRYPTOGRAPHY AND DATA ENCRYPTION

Insight Guide. Encryption: A Guide

EXAM questions for the course TTM Information Security May Part 1

Security for Computer Networks

How To Encrypt With A 64 Bit Block Cipher

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Network Security: Cryptography CS/SS G513 S.K. Sahay

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

SeChat: An AES Encrypted Chat

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

SSL Firewalls

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

Domain 3: Cryptography

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Cryptography & Digital Signatures

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

The Misuse of RC4 in Microsoft Word and Excel

Secure Network Communication Based on Text-to-Image Encryption

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

SECURITY IN NETWORKS

Chap 2. Basic Encryption and Decryption

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Properties of Secure Network Communication

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 7: Network security

7! Cryptographic Techniques! A Brief Introduction

Split Based Encryption in Secure File Transfer

Overview of Symmetric Encryption

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

About the Tutorial. Audience. Prerequisites. Disclaimer & Copyright. Cryptography

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security - ISA 656 Introduction to Cryptography

Evaluation of the RC4 Algorithm for Data Encryption

Network Security. Chapter 1. Introduction

Message Authentication Codes

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

What is network security?

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY

CS155. Cryptography Overview

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CS 758: Cryptography / Network Security

The Advanced Encryption Standard: Four Years On

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Modes of Operation of Block Ciphers

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

Certificate in Cyber Security

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Cryptography and Network Security Chapter 3

(C) Global Journal of Engineering Science and Research Management

Implementation of Full -Parallelism AES Encryption and Decryption

Principles of Network Security

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Chapter 6 CDMA/802.11i

Network Security. Outline of the Tutorial

Table of Contents. Bibliografische Informationen digitalisiert durch

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

NXP & Security Innovation Encryption for ARM MCUs

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Chapter 8. Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

1 Data Encryption Algorithm

Priyanka et al. Page 17

ECE 428 Network Security

ICOM 5018 Network Security and Cryptography

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Keywords Web Service, security, DES, cryptography.

Transcription:

Network Security Symmetric Key Cryptography Today Substitution Ciphers Transposition Ciphers Cryptanalysis 1 2 Crypto as Munitions Does: protecting information kill enemies? failure to protect information kill friendlies? failure to "steal" enemy information kill friendlies? US Government decided that enough of the above were "yes" to declare crypto munitions 3 Crypto as Munitions Why are export restrictions a problem? Commercial applications of strong cryptography abound US Corporations cannot export products that use strong cryptography Foreign companies will take the market for crypto applications and all that goes with it 4 History of Cryptography Primary use: Military Romans (probably before) WWII (Ultra, Enigma, Japanese unbreakable codes) Data Encryption Standard History of Cryptography Substitution ciphers Transposition ciphers Codes Combinations 5 6 Public Key Cryptography Network Security and Formal Methods 1

Substitution Cipher bmddmg replacement Each letter is replaced by another letter Caesar cipher Rot13 CIPHERTEXT D E F G H I J K L M N O P Q R S T U V W X Y Z A B C CIPHERTEXT N O P Q R S T U V W X Y Z A B C D E F G H I J K L M Twenty six letter key 7 CIPHERTEXT Random selection of order Transposition Cipher a l b k a s b l t e b a s k e t b a l l 8 Transposition Ciphers Word embcrals Key = 7523461 Blocks 1 2 3 4 5 6 7 7 5 2 3 4 6 1 t h i s i s a a i h i s s t n e x a m p l l m e x a p n e o f a t r a a t o f a r e n s p o t i o o t s p o i n n c i p h e r r h c i p e n 9 Transposition Ciphers Word = timbers Key = beimrst 7 byte blocks 1 2 3 4 5 6 7 4 5 2 3 6 7 1 t h i s i s a s i h i s a t n e x a m p l a m e x p l n e o f a t r a a t o f r a e n s p o t i o o t s p i o n n c i p h e r p h c i e r n 10 Transposition Cipher Plaintext: Roses are red Violets are blue 2. Alphabetize the letters in the key. 3. Scramble the plaintext according to the key. 4. Generate the ciphertext by reading down the columns. 71 AR RE VR RT E 62 OC E US 43 MI RS DL AL Key: ROMANTIC 1. Choose a key with no repeating letters and arrange the plaintext as below. 14 MA ES VD AR 5 N S I E 86 OT AO BS 37 RI R RL LT E Ciphertext: EVR EEU RLL SDA SIE S RRTE AOB 28 CT AE UB 11 Codes Words/phrases are substituted with other words, phrases, or numbers Code books are required. Advantages/disadvantages 12 Network Security and Formal Methods 2

Attack Retreat Defend Defend at all costs Surrender Codes Sunrise Sunset Rain Snow Notinyourlifetime Substitute, Transpose, Codes Unbreakable Japanese code in WW II Combination is foundation of modern crypto 13 14 Cryptography Paradigms Symmetric Key Cryptography Private/Secret Key Cryptography Encrypt/decrypt with the same key Asymmetric Key Cryptography Public/Private Key Cryptography Encrypt/decrypt with different keys Hash: Creates a message digest More Cipher Techniques Reverse Cipher Railfence Cipher Syctale Cipher Geometric Figure Nilhilist Cipher Feistel Structures Signature: Foundation of nonrepudiation 15 16 Reverse Cipher Reverse the order of the letters in a message. egassemanisrettelehtforedroehtesrever Rail Fence Cipher Write the message alternating letters in two rows w i e h m s a e n w r w r t t e e s g i t o o s Write the ciphertext from the rows wiehmsaenwrwr t teesgi toos 17 18 Network Security and Formal Methods 3

Scytale Cipher An early Greek transposition cipher A strip of paper was wound round a staff message written along staff in rows, then paper removed leaving a strip of seemingly random letters Not very secure as key was width of paper & staff 19 Nihilist Cipher Combines row and column transposition Write message in rows in order controlled by the key Read off by rows, but in order controlled by the key Plaintext: NOWISTHETIMEFORALLGOODMEN 1 2 3 4 5 1 N O W I S 2 T H E T I 3 M E F O R 4 A L L G O 5 O D M E N 2 1 3 5 4 2 H T E I T 1 O N W S I 3 E M F R O 5 D O M N E 4 L A L O G Ciphertext: HTEIT ONWSI EMFRO DOMNE LALOG 20 Product Ciphers Ciphers based on just substitutions or just transpositions are not secure Two substitutions are really only one more complex substitution Two transpositions are really only one more complex transposition What about when we combine the two? Substitute Transpose Substitute Transpose Etc. Round one Round two 21 Machine Ciphers Jefferson cylinder 22 Machine Ciphers Wheatstone Disc 23 Enigma Rotor machine It allowed encryption of a large volume of data Utilized several wheels (rotors) placed adjacent to one another. Each performed a monoalphabetic substitution. Similar to a "souped up" Vigenere cipher 24 Network Security and Formal Methods 4

Stream Ciphers Data is encrypted a bit or byte at a time Confusion sequence is created at encryption time and is combined with the plaintext to form the ciphertext stream. The key allows recreation of the confusion sequence for recreation of Confusion Sequence Random Number Stream Generate one random bit at a time & XOR One time pad, with all its up and down sides Substitution Cipher Substitute a byte at a time Keyed Random Number Generator Use the same RNG and the same IV key the plaintext at the receiving end 25 26 One Stream Cipher Parties share key k. RC4 is a random number generator that deterministically generates a string of random bits given two parameters An initialization vector is created by the originator CT = PT RC4(IV, k) Transmit (CT,IV) 27 v Stream Cipher with RC4 Plaintext RC4 (v,k) Ciphertext RC4 (v,k) Plaintext CRC CRC 28 Review Substitution Ciphers Transposition Ciphers Stream Ciphers 29 Network Security and Formal Methods 5