SlideShare a Scribd company logo
1 of 43
Download to read offline
CS595-Cryptography and Network Security
Cryptography and Network
Security
Xiang-Yang Li
CS595-Cryptography and Network Security
CS595-Cryptography and Network Security
Introduction
The art of war teaches us not on the likelihood
of the enemy’s not coming, but on our own
readiness to receive him; not on the chance of
his not attacking, but rather on the fact that
we have made our position unassailable.
--The art of War, Sun Tzu
CS595-Cryptography and Network Security
Information Transferring
CS595-Cryptography and Network Security
Attack: Interruption
CS595-Cryptography and Network Security
Attack: Interception
CS595-Cryptography and Network Security
Attack: Modification
CS595-Cryptography and Network Security
Attack: Fabrication
CS595-Cryptography and Network Security
Attacks, Services and Mechanisms
! Security Attacks
" Action compromises the information security
! Security Services
" Enhances the security of data processing and
transferring
! Security mechanism
" Detect, prevent and recover from a security
attack
CS595-Cryptography and Network Security
Important Features of Security
! Confidentiality, authentication, integrity,
non-repudiation, non-deny, availability,
identification, ……
CS595-Cryptography and Network Security
Attacks
! Passive attacks
" Interception
# Release of message contents
# Traffic analysis
! Active attacks
" Interruption, modification, fabrication
# Masquerade
# Replay
# Modification
# Denial of service
CS595-Cryptography and Network Security
Network Security Model
Trusted Third Party
principal principal
Security
transformation
Security
transformation
opponent
CS595-Cryptography and Network Security
Cryptography
! Cryptography is the study of
" Secret (crypto-) writing (-graphy)
! Concerned with developing algorithms:
" Conceal the context of some message from all except
the sender and recipient (privacy or secrecy), and/or
" Verify the correctness of a message to the recipient
(authentication)
" Form the basis of many technological solutions to
computer and communications security problems
CS595-Cryptography and Network Security
Basic Concepts
! Cryptography
" The art or science encompassing the principles and
methods of transforming an intelligible message into
one that is unintelligible, and then retransforming that
message back to its original form
! Plaintext
" The original intelligible message
! Ciphertext
" The transformed message
CS595-Cryptography and Network Security
Basic Concepts
! Cipher
" An algorithm for transforming an intelligible message
into unintelligible by transposition and/or substitution
! Key
" Some critical information used by the cipher, known
only to the sender & receiver
! Encipher (encode)
" The process of converting plaintext to ciphertext
! Decipher (decode)
" The process of converting ciphertext back into plaintext
CS595-Cryptography and Network Security
Basic Concepts
! Cryptanalysis
" The study of principles and methods of transforming an
unintelligible message back into an intelligible message
without knowledge of the key. Also called
codebreaking
! Cryptology
" Both cryptography and cryptanalysis
! Code
" An algorithm for transforming an intelligible message
into an unintelligible one using a code-book
CS595-Cryptography and Network Security
Encryption and Decryption
Plaintext ciphertext
Encipher C = E(K1)(P)
Decipher P = D(K2)(C)
K1, K2: from keyspace
CS595-Cryptography and Network Security
Security
! Two fundamentally different security
" Unconditional security
# No matter how much computer power is available,
the cipher cannot be broken
" Computational security
# Given limited computing resources (e.G time
needed for calculations is greater than age of
universe), the cipher cannot be broken
CS595-Cryptography and Network Security
History
! Ancient ciphers
" Have a history of at least 4000 years
" Ancient Egyptians enciphered some of their
hieroglyphic writing on monuments
" Ancient Hebrews enciphered certain words in the
scriptures
" 2000 years ago Julius Caesar used a simple substitution
cipher, now known as the Caesar cipher
" Roger bacon described several methods in 1200s
CS595-Cryptography and Network Security
History
! Ancient ciphers
" Geoffrey Chaucer included several ciphers in his works
" Leon Alberti devised a cipher wheel, and described the
principles of frequency analysis in the 1460s
" Blaise de Vigenère published a book on cryptology in
1585, & described the polyalphabetic substitution
cipher
" Increasing use, esp in diplomacy & war over centuries
CS595-Cryptography and Network Security
Classical Cryptographic Techniques
! Two basic components of classical ciphers:
" Substitution: letters are replaced by other letters
" Transposition: letters are arranged in a different order
! These ciphers may be:
" Monoalphabetic: only one substitution/ transposition is
used, or
" Polyalphabetic:where several substitutions/
transpositions are used
! Product cipher:
" several ciphers concatenated together
CS595-Cryptography and Network Security
Encryption and Decryption
Plaintext
ciphertext
Encipher C = E(K)(P) Decipher P = D(K)(C)
Key source
CS595-Cryptography and Network Security
Key Management
! Using secret channel
! Encrypt the key
! Third trusted party
! The sender and the receiver generate key
" The key must be same
CS595-Cryptography and Network Security
Attacks
! Recover the message
! Recover the secret key
" Thus also the message
! Thus the number of keys possible must be
large!
CS595-Cryptography and Network Security
Possible Attacks
! Ciphertext only
" Algorithm, ciphertext
! Known plaintext
" Algorithm, ciphertext, plaintext-ciphertext pair
! Chosen plaintext
" Algorithm, ciphertext, chosen plaintext and its ciphertext
! Chosen ciphertext
" Algorithm, ciphertext, chosen ciphertext and its plaintext
! Chosen text
" Algorithm, ciphertext, chosen plaintext and ciphertext
CS595-Cryptography and Network Security
Steganography
! Conceal the existence of message
" Character marking
" Invisible ink
" Pin punctures
" Typewriter correction ribbon
! Cryptography renders message
unintelligible!
CS595-Cryptography and Network Security
Contemporary Equiv.
! Least significant bits of picture frames
" 2048x3072 pixels with 24-bits RGB info
" Able to hide 2.3M message
! Drawbacks
" Large overhead
" Virtually useless if system is known
CS595-Cryptography and Network Security
Caesar Cipher
! Replace each letter of message by a letter a
fixed distance away (use the 3rd letter on)
! Reputedly used by Julius Caesar
! Example:
L FDPH L VDZ L FRQTXHUHG
I CAME I SAW I CONGUERED
" The mapping is
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
CS595-Cryptography and Network Security
Mathematical Model
! Description
" Encryption E(k) : i → i + k mod 26
" Decryption D(k) : i → i - k mod 26
CS595-Cryptography and Network Security
Cryptanalysis: Caesar Cipher
! Key space: 26
" Exhaustive key search
! Example
" GDUCUGQFRMPCNJYACJCRRCPQ
HEVDVHRGSNQDOKZBDKDSSDQR
" Plaintext:
JGXFXJTIUPSFQMBDFMFUUFSTKHYGYKUJVGRNCEGNG
VVGTU
" Ciphertext:
LIZHZLVKWRUHSODFHOHWWHUVMJAIAMWXSVITPEGI
PIXXIVW
CS595-Cryptography and Network Security
Character Frequencies
! In most languages letters are not equally common
" in English e is by far the most common letter
! Have tables of single, double & triple letter
frequencies
! Use these tables to compare with letter frequencies
in ciphertext,
" a monoalphabetic substitution does not change relative
letter frequencies
" do need a moderate amount of ciphertext (100+ letters)
CS595-Cryptography and Network Security
Letter Frequency Analysis
! Single Letter
" A,B,C,D,E,…..
! Double Letter
" TH,HE,IN,ER,RE,ON,AN,EN,….
! Triple Letter
" THE,AND,TIO,ATI,FOR,THA,TER,RES,…
CS595-Cryptography and Network Security
Modular Arithmetic Cipher
! Use a more complex equation to calculate
the ciphertext letter for each plaintext letter
! E(a,b) : i →a∗i + b mod 26
" Need gcd(a,26) = 1
" Otherwise, not reversible
" So, a≠2, 13, 26
" Caesar cipher: a=1
CS595-Cryptography and Network Security
Cryptanalysis
! Key space:23*26
" Brute force search
! Use letter frequency counts to guess a
couple of possible letter mappings
" frequency pattern not produced just by a shift
" use these mappings to solve 2 simultaneous
equations to derive above parameters
CS595-Cryptography and Network Security
Playfair Cipher
zyxwv
utrqo
nkhgf
dcbae
lpmi/js
Key: simple
Used in WWI and WWII
CS595-Cryptography and Network Security
Playfair Cipher
! Use filler letter to separate repeated letters
! Encrypt two letters together
" Same row– followed letters
# ac--bd
" Same column– letters under
# qw--wi
" Otherwise—square’s corner at same row
# ar--bq
CS595-Cryptography and Network Security
Analysis
! Size of diagrams: 25!
! Difficult using frequency analysis
" But it still reveals the frequency information
CS595-Cryptography and Network Security
Hill Cipher
! Encryption
" Assign each letter an index
" C=KP mod 26
" Matrix K is the key
! Decryption
" P=K-1C mod 26
CS595-Cryptography and Network Security
Analysis
! Difficult to use frequency analysis
! But vulnerable to known-plaintext attack
CS595-Cryptography and Network Security
Polyalphabetic Substitution
! Use more than one substitution alphabet
! Makes cryptanalysis harder
" since have more alphabets to guess
" and flattens frequency distribution
# same plaintext letter gets replaced by several
ciphertext letter, depending on which alphabet is
used
CS595-Cryptography and Network Security
Vigenère Cipher
! Basically multiple Caesar ciphers
! key is multiple letters long
" K = k1 k2 ... kd
" ith letter specifies ith alphabet to use
" use each alphabet in turn, repeating from start after d
letters in message
! Plaintext THISPROCESSCANALSOBEEXPRESSED
Keyword CIPHERCIPHERCIPHERCIPHERCIPHE
Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH
CS595-Cryptography and Network Security
One-time Pad
! Gilbert Vernam (AT&T)
! Encryption
" C=P⊕K
! Decryption
" P=C⊕K
! Difficulty: key K is as long as message P
CS595-Cryptography and Network Security
Transposition Methods
! Permutation of plaintext
! Example
" Write in a square in row, then read in column
order specified by the key
! Enhance: double or triple transposition
" Can reapply the encryption on ciphertext

More Related Content

What's hot

Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
Information and data security cryptanalysis method
Information and data security cryptanalysis methodInformation and data security cryptanalysis method
Information and data security cryptanalysis methodMazin Alwaaly
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniquesJay Nagar
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesramya marichamy
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesSarthak Patel
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 

What's hot (20)

Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Information and data security cryptanalysis method
Information and data security cryptanalysis methodInformation and data security cryptanalysis method
Information and data security cryptanalysis method
 
Classic Information encryption techniques
Classic Information encryption techniquesClassic Information encryption techniques
Classic Information encryption techniques
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cns Chapter 2
Cns Chapter 2Cns Chapter 2
Cns Chapter 2
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 

Viewers also liked

My Favorite Teacher
My Favorite TeacherMy Favorite Teacher
My Favorite Teacheradkin1lr
 
Marketing presentation
Marketing presentationMarketing presentation
Marketing presentationMyriad-wpi
 
Redes sociales
Redes sociales Redes sociales
Redes sociales OlallaDiez
 
Projects in defense 64 meerut road, delhi
Projects in defense 64 meerut road, delhiProjects in defense 64 meerut road, delhi
Projects in defense 64 meerut road, delhiWilliamjonesd
 
Avatars' in teaching the early experiences of [autosaved]new
Avatars' in teaching  the early experiences of [autosaved]newAvatars' in teaching  the early experiences of [autosaved]new
Avatars' in teaching the early experiences of [autosaved]newMartin Rieser
 
Uso de las tic en inglés
Uso de las tic en inglésUso de las tic en inglés
Uso de las tic en inglésSoapyMirage
 
08 Ace 2010 Aras Roadmap
08 Ace 2010 Aras Roadmap08 Ace 2010 Aras Roadmap
08 Ace 2010 Aras RoadmapProdeos
 
Condición física rober
Condición física roberCondición física rober
Condición física roberrojsago
 
Homeland security
Homeland securityHomeland security
Homeland securityJeff Taylor
 
International Customer Service Association Annual Conference 2013
International Customer Service Association Annual Conference 2013International Customer Service Association Annual Conference 2013
International Customer Service Association Annual Conference 2013Esker, Inc.
 

Viewers also liked (11)

My Favorite Teacher
My Favorite TeacherMy Favorite Teacher
My Favorite Teacher
 
Marketing presentation
Marketing presentationMarketing presentation
Marketing presentation
 
Redes sociales
Redes sociales Redes sociales
Redes sociales
 
Projects in defense 64 meerut road, delhi
Projects in defense 64 meerut road, delhiProjects in defense 64 meerut road, delhi
Projects in defense 64 meerut road, delhi
 
Avatars' in teaching the early experiences of [autosaved]new
Avatars' in teaching  the early experiences of [autosaved]newAvatars' in teaching  the early experiences of [autosaved]new
Avatars' in teaching the early experiences of [autosaved]new
 
Uso de las tic en inglés
Uso de las tic en inglésUso de las tic en inglés
Uso de las tic en inglés
 
08 Ace 2010 Aras Roadmap
08 Ace 2010 Aras Roadmap08 Ace 2010 Aras Roadmap
08 Ace 2010 Aras Roadmap
 
Blog
BlogBlog
Blog
 
Condición física rober
Condición física roberCondición física rober
Condición física rober
 
Homeland security
Homeland securityHomeland security
Homeland security
 
International Customer Service Association Annual Conference 2013
International Customer Service Association Annual Conference 2013International Customer Service Association Annual Conference 2013
International Customer Service Association Annual Conference 2013
 

Similar to Cns 1

Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network securityPriyanka Karancy
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryptionfaffyman
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Computer network
Computer networkComputer network
Computer networksnegacmr
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniquesbabak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 

Similar to Cns 1 (20)

Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer network
Computer networkComputer network
Computer network
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption TechniquesCns 13f-lec03- Classical Encryption Techniques
Cns 13f-lec03- Classical Encryption Techniques
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
5967073.ppt
5967073.ppt5967073.ppt
5967073.ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography
Cryptography Cryptography
Cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

Cns 1

  • 1. CS595-Cryptography and Network Security Cryptography and Network Security Xiang-Yang Li
  • 3. CS595-Cryptography and Network Security Introduction The art of war teaches us not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. --The art of War, Sun Tzu
  • 4. CS595-Cryptography and Network Security Information Transferring
  • 5. CS595-Cryptography and Network Security Attack: Interruption
  • 6. CS595-Cryptography and Network Security Attack: Interception
  • 7. CS595-Cryptography and Network Security Attack: Modification
  • 8. CS595-Cryptography and Network Security Attack: Fabrication
  • 9. CS595-Cryptography and Network Security Attacks, Services and Mechanisms ! Security Attacks " Action compromises the information security ! Security Services " Enhances the security of data processing and transferring ! Security mechanism " Detect, prevent and recover from a security attack
  • 10. CS595-Cryptography and Network Security Important Features of Security ! Confidentiality, authentication, integrity, non-repudiation, non-deny, availability, identification, ……
  • 11. CS595-Cryptography and Network Security Attacks ! Passive attacks " Interception # Release of message contents # Traffic analysis ! Active attacks " Interruption, modification, fabrication # Masquerade # Replay # Modification # Denial of service
  • 12. CS595-Cryptography and Network Security Network Security Model Trusted Third Party principal principal Security transformation Security transformation opponent
  • 13. CS595-Cryptography and Network Security Cryptography ! Cryptography is the study of " Secret (crypto-) writing (-graphy) ! Concerned with developing algorithms: " Conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or " Verify the correctness of a message to the recipient (authentication) " Form the basis of many technological solutions to computer and communications security problems
  • 14. CS595-Cryptography and Network Security Basic Concepts ! Cryptography " The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form ! Plaintext " The original intelligible message ! Ciphertext " The transformed message
  • 15. CS595-Cryptography and Network Security Basic Concepts ! Cipher " An algorithm for transforming an intelligible message into unintelligible by transposition and/or substitution ! Key " Some critical information used by the cipher, known only to the sender & receiver ! Encipher (encode) " The process of converting plaintext to ciphertext ! Decipher (decode) " The process of converting ciphertext back into plaintext
  • 16. CS595-Cryptography and Network Security Basic Concepts ! Cryptanalysis " The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called codebreaking ! Cryptology " Both cryptography and cryptanalysis ! Code " An algorithm for transforming an intelligible message into an unintelligible one using a code-book
  • 17. CS595-Cryptography and Network Security Encryption and Decryption Plaintext ciphertext Encipher C = E(K1)(P) Decipher P = D(K2)(C) K1, K2: from keyspace
  • 18. CS595-Cryptography and Network Security Security ! Two fundamentally different security " Unconditional security # No matter how much computer power is available, the cipher cannot be broken " Computational security # Given limited computing resources (e.G time needed for calculations is greater than age of universe), the cipher cannot be broken
  • 19. CS595-Cryptography and Network Security History ! Ancient ciphers " Have a history of at least 4000 years " Ancient Egyptians enciphered some of their hieroglyphic writing on monuments " Ancient Hebrews enciphered certain words in the scriptures " 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher " Roger bacon described several methods in 1200s
  • 20. CS595-Cryptography and Network Security History ! Ancient ciphers " Geoffrey Chaucer included several ciphers in his works " Leon Alberti devised a cipher wheel, and described the principles of frequency analysis in the 1460s " Blaise de Vigenère published a book on cryptology in 1585, & described the polyalphabetic substitution cipher " Increasing use, esp in diplomacy & war over centuries
  • 21. CS595-Cryptography and Network Security Classical Cryptographic Techniques ! Two basic components of classical ciphers: " Substitution: letters are replaced by other letters " Transposition: letters are arranged in a different order ! These ciphers may be: " Monoalphabetic: only one substitution/ transposition is used, or " Polyalphabetic:where several substitutions/ transpositions are used ! Product cipher: " several ciphers concatenated together
  • 22. CS595-Cryptography and Network Security Encryption and Decryption Plaintext ciphertext Encipher C = E(K)(P) Decipher P = D(K)(C) Key source
  • 23. CS595-Cryptography and Network Security Key Management ! Using secret channel ! Encrypt the key ! Third trusted party ! The sender and the receiver generate key " The key must be same
  • 24. CS595-Cryptography and Network Security Attacks ! Recover the message ! Recover the secret key " Thus also the message ! Thus the number of keys possible must be large!
  • 25. CS595-Cryptography and Network Security Possible Attacks ! Ciphertext only " Algorithm, ciphertext ! Known plaintext " Algorithm, ciphertext, plaintext-ciphertext pair ! Chosen plaintext " Algorithm, ciphertext, chosen plaintext and its ciphertext ! Chosen ciphertext " Algorithm, ciphertext, chosen ciphertext and its plaintext ! Chosen text " Algorithm, ciphertext, chosen plaintext and ciphertext
  • 26. CS595-Cryptography and Network Security Steganography ! Conceal the existence of message " Character marking " Invisible ink " Pin punctures " Typewriter correction ribbon ! Cryptography renders message unintelligible!
  • 27. CS595-Cryptography and Network Security Contemporary Equiv. ! Least significant bits of picture frames " 2048x3072 pixels with 24-bits RGB info " Able to hide 2.3M message ! Drawbacks " Large overhead " Virtually useless if system is known
  • 28. CS595-Cryptography and Network Security Caesar Cipher ! Replace each letter of message by a letter a fixed distance away (use the 3rd letter on) ! Reputedly used by Julius Caesar ! Example: L FDPH L VDZ L FRQTXHUHG I CAME I SAW I CONGUERED " The mapping is ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC
  • 29. CS595-Cryptography and Network Security Mathematical Model ! Description " Encryption E(k) : i → i + k mod 26 " Decryption D(k) : i → i - k mod 26
  • 30. CS595-Cryptography and Network Security Cryptanalysis: Caesar Cipher ! Key space: 26 " Exhaustive key search ! Example " GDUCUGQFRMPCNJYACJCRRCPQ HEVDVHRGSNQDOKZBDKDSSDQR " Plaintext: JGXFXJTIUPSFQMBDFMFUUFSTKHYGYKUJVGRNCEGNG VVGTU " Ciphertext: LIZHZLVKWRUHSODFHOHWWHUVMJAIAMWXSVITPEGI PIXXIVW
  • 31. CS595-Cryptography and Network Security Character Frequencies ! In most languages letters are not equally common " in English e is by far the most common letter ! Have tables of single, double & triple letter frequencies ! Use these tables to compare with letter frequencies in ciphertext, " a monoalphabetic substitution does not change relative letter frequencies " do need a moderate amount of ciphertext (100+ letters)
  • 32. CS595-Cryptography and Network Security Letter Frequency Analysis ! Single Letter " A,B,C,D,E,….. ! Double Letter " TH,HE,IN,ER,RE,ON,AN,EN,…. ! Triple Letter " THE,AND,TIO,ATI,FOR,THA,TER,RES,…
  • 33. CS595-Cryptography and Network Security Modular Arithmetic Cipher ! Use a more complex equation to calculate the ciphertext letter for each plaintext letter ! E(a,b) : i →a∗i + b mod 26 " Need gcd(a,26) = 1 " Otherwise, not reversible " So, a≠2, 13, 26 " Caesar cipher: a=1
  • 34. CS595-Cryptography and Network Security Cryptanalysis ! Key space:23*26 " Brute force search ! Use letter frequency counts to guess a couple of possible letter mappings " frequency pattern not produced just by a shift " use these mappings to solve 2 simultaneous equations to derive above parameters
  • 35. CS595-Cryptography and Network Security Playfair Cipher zyxwv utrqo nkhgf dcbae lpmi/js Key: simple Used in WWI and WWII
  • 36. CS595-Cryptography and Network Security Playfair Cipher ! Use filler letter to separate repeated letters ! Encrypt two letters together " Same row– followed letters # ac--bd " Same column– letters under # qw--wi " Otherwise—square’s corner at same row # ar--bq
  • 37. CS595-Cryptography and Network Security Analysis ! Size of diagrams: 25! ! Difficult using frequency analysis " But it still reveals the frequency information
  • 38. CS595-Cryptography and Network Security Hill Cipher ! Encryption " Assign each letter an index " C=KP mod 26 " Matrix K is the key ! Decryption " P=K-1C mod 26
  • 39. CS595-Cryptography and Network Security Analysis ! Difficult to use frequency analysis ! But vulnerable to known-plaintext attack
  • 40. CS595-Cryptography and Network Security Polyalphabetic Substitution ! Use more than one substitution alphabet ! Makes cryptanalysis harder " since have more alphabets to guess " and flattens frequency distribution # same plaintext letter gets replaced by several ciphertext letter, depending on which alphabet is used
  • 41. CS595-Cryptography and Network Security Vigenère Cipher ! Basically multiple Caesar ciphers ! key is multiple letters long " K = k1 k2 ... kd " ith letter specifies ith alphabet to use " use each alphabet in turn, repeating from start after d letters in message ! Plaintext THISPROCESSCANALSOBEEXPRESSED Keyword CIPHERCIPHERCIPHERCIPHERCIPHE Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH
  • 42. CS595-Cryptography and Network Security One-time Pad ! Gilbert Vernam (AT&T) ! Encryption " C=P⊕K ! Decryption " P=C⊕K ! Difficulty: key K is as long as message P
  • 43. CS595-Cryptography and Network Security Transposition Methods ! Permutation of plaintext ! Example " Write in a square in row, then read in column order specified by the key ! Enhance: double or triple transposition " Can reapply the encryption on ciphertext