SlideShare une entreprise Scribd logo
1  sur  36
Cryptanalysis



                        Jonathan Rajewski



   © 2012 Jonathan T Rajewski               1
Overview
•   Thirty Five Slides of Lecture
•   Review Cryptology
•   Attacking Applications
•   Attacking the cyphers we discussed
•   FOR270 Crypto Challenge
    – Until we have a winner!



                      © 2012 Jonathan T Rajewski   2
The 3 Siezs




 © 2012 Jonathan T Rajewski   3
The Three C’s
• Cryptography
• Cryptanalysis
• Cryptology
                                          3 C’s

                  Crypto
                  © 2012 Jonathan T Rajewski      4
Basic Cryptanalysis




     © 2012 Jonathan T Rajewski   5
Quick Case Study




    © 2012 Jonathan T Rajewski   6
Case Study
When you enter your username and password
             what happens?




               © 2012 Jonathan T Rajewski   7
Case Study
       Authentication

Username + Password = Success




         © 2012 Jonathan T Rajewski   8
© 2012 Jonathan T Rajewski   9
© 2012 Jonathan T Rajewski   10
Attacking Applications


Learn how the application creates passwords!




                © 2012 Jonathan T Rajewski     11
FTP
                                                       Filezilla Graphical User
                                                       Interface




*Hypothetical Situation   © 2012 Jonathan T Rajewski                          12
FTP
 In our FTP client, user credentials are stored in an INI file.

 Boris is the target of the investigation. We currently have no
 idea how the application stores user credentials.

 We create a new profile named dummy with a password 1111.
 The PWD value appears similar to one byte per character in
 the password and, further, appears to look like the ASCII
 representation. What we find:

 Password:           1        1      1      1
 ASCII:             0x31     0x31   0x31   0x31
 PWD value:         0x31     0x32   0x33   0x34

 There is an obvious pattern!!!!

 Let's derive the other password....

 PWD value:         0x42     0x70   0x74   0x6C    0x77    0x4E
 ASCII:             0x42     0x6F   0x72   0x69    0x73    0x49
 Password:           B        o      r      i       s       I
© 2012 Jonathan T Rajewski                                    13
Let’s try it!
Password.ini file contains the following data.
          Decrypt the password

   PWD value:   0x70   0x62   0x75     0x76      0x7B   0x75   0x79   0x45
       ASCII:   0x     0x     0x       0x        0x     0x     0x     0x
    Password:




                         © 2012 Jonathan T Rajewski                          14
Let’s try it!
Password.ini file contains the following data.
          Decrypt the password

   PWD value:   0x70   0x62   0x75     0x76      0x7B   0x75   0x79   0x45
       ASCII:   0x70   0x61   0x73     0x73      0x77   0x70   0x73   0x4C
    Password:     P      A      S        S         W      O      R      D




                         © 2012 Jonathan T Rajewski                          15
Basic Cryptosystems
• Basic Ciphers
  – Substitution
     • Replacing one character with another “X”
  – Transposition
     • Rearranging the message




                      © 2012 Jonathan T Rajewski   16
Substitution Ciphers
• Most famous: Caesar's Cipher
   – Shift each letter to the right by 3
• ROT 13
                1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
    Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
    Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



• Substitute letters for others
   – A is T
   – B is R
   – C is B

                               © 2012 Jonathan T Rajewski                     17
Where are we seeing ROT13?


       NTUSER.datSoftwareMicrosoftWindows
         CurrentVersionExplorerUserAssist




         © 2012 Jonathan T Rajewski     18
Where are we seeing ROT13?




        http://www.csoonline.com/article/570813/data-exfiltration-how-data-gets-out


            © 2012 Jonathan T Rajewski                                                19
Tools to parse ROT13
• Volatility Plugin (Levy)
  – http://gleeda.blogspot.com/2011/04/volatility-14-
    userassist-plugin.html
• RegRipper (Carvy)
  – http://regripper.wordpress.com/
• ROT13.com



                    © 2012 Jonathan T Rajewski      20
How to parse ROT13 by hand
            1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



                       CipherText                PlainText

                           N                          A
                           C                          P
                           C                          P
                           Y                          L
                           R                          E
                               © 2012 Jonathan T Rajewski                 21
Breaking Basic Ciphers
• Simple (monoalphabetic) substitution ciphers
  easily broken with Frequency Analysis
Letters: E T O A N I R S H D L C W U M F Y G P B V K X Q J Z

Digraphs: TH HE IN ER ED AN ND AR RE EN ED TO NT EA OU NG ST AS

Trigraphs: THE AND ING HER NTH ENT THA INT ERE DTH EAR HAT OFT


• More complex (polyalphabetic) substitution
  ciphers use multiple alphabets!


                       © 2012 Jonathan T Rajewski                22
Columnar Transposition Cipher
• Disguising the message by rearranging the letters

   – Plaintext:
       • FOR270 IS SO MUCH FUN DONTCA THINK
            FOR270ISSOMU
            CHFUNDONTCHA
            THINKQWERTYU
       • cipher: fct ohh rfi 2un 7nk 0dq iow snr str oct mhy uau
       • cipher enhanced: fctohhrfi2un7nk0dqiowsnrstroctmhyuau




                                © 2012 Jonathan T Rajewski         23
Breaking the Columnar Transposition
               Cipher
  For all intensive purposes for this “cryptanalysis by hand in a
  quick timeframe” we are going to attempt to guess the rows
                          and columns

          cipher: dygi ioet dutx
cipher enhanced: dygiioetdutx


                         didyougetit


                         © 2012 Jonathan T Rajewski                 24
Vigenère Square

                    Ciphertext is intersection of key column and plaintext row.


                    Plaintext: DFIRISGREAT (Side)
                          Key: NTFSNTFSNTF (Top)
                           Ct: QYNJVLLYRTY (Intersect)




   © 2012 Jonathan T Rajewski                                                 25
Vigenère Square Decryption


                                 Ct: STYXMYYEGYRR (Intersect)
                                Key: FATFATFATFAT (Side)
                          Plaintext: NTFSMFTENTRY (Top)




         © 2012 Jonathan T Rajewski                        26
© 2012 Jonathan T Rajewski   27
Crypto Challenge
• Scenario
  – You work for the “SUPER SECRET 5 LETTER
    AGENCY”
  – An ultra sophisticated ciphertext was located on
    an internal server
  – Our team of cryptographers are actively working
    on breaking the code but we need your help!!!



                    © 2012 Jonathan T Rajewski         28
Phase 1
The following ciphertext was found by the
cryptographers. They believe it could have
 something to do with the userassist key.

            ovg_qbg_yl_fynfu_m7mKvx

            1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



                            © 2012 Jonathan T Rajewski                    29
Phase 1 Review
Did you get it?
  – ROT13 encryption.

         CT: ovg_qbg_yl_fynfu_m7mKvx
         PT: bit_dot_ly_slash_z7zXik
     PT Decoded: bit.ly/z7zXik




                   © 2012 Jonathan T Rajewski   30
Phase 2
We just learned from the cryptographers that
more this code may indicated a hidden key for
   the next aspect of the cryptanalysis….

   Visit this link and try to decode the data
                http://bit.ly/x2qppi



                  © 2012 Jonathan T Rajewski    31
Phase 2 Review

F   O   R   E     N      S      I      C




A   T   O R


                Forensicator




                  © 2012 Jonathan T Rajewski   32
Phase 3
   We identified the final encrypted string of
  ciphertext by analyzing ram using Volatility.
           Yay for open source tools!
Agency cryptologists believe that you will “crack
     the case” and reveal the cyber villain.

Please analyze:
  CT: ICLKGZMRUZ
  Key: FORENSICATOR (you wont need the entire key)
                       © 2012 Jonathan T Rajewski    33
Phase 3
                Please analyze:
                       CT: ICLKGZMRUZ (Intersect)
                       Key: FORENSICATOR (Side)
                       PT: (Top)

                       Hint – you wont need the entire Key




© 2012 Jonathan T Rajewski                                   34
Phase 3 Review
                          Ct: ICLKGZMRUZ(Intersect)
                         Key: FORENSICAT(Side)
                   Plaintext: DOUGTHEPUG(Top)




   © 2012 Jonathan T Rajewski                         35
Phase 4
 The end is here. This is the most complicated
 ciphertext yet. Doug the Pug “cracked” during
interrogation and revealed his secret partner in
                     crime.



    Next class we will look at the ADFGVX


                  © 2012 Jonathan T Rajewski   36

Contenu connexe

En vedette

методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниkgospodinova89
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

En vedette (11)

методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данни
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similaire à Cryptanalysis Lecture

The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataAndy LoPresto
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconIoannis Psaras
 
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate UseHyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate UseRobert Tochman-Szewc
 
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa UrosevicDataScienceConferenc1
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec JourneySaumil Shah
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityCode Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityLuis Fraile
 
richard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdfrichard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdfRichard Rodger
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....Michele Orselli
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....Alessandro Cinelli (cirpo)
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Mario Heiderich
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노ethconkr
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerBlockstrap.com
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016Marshall Swatt
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublinDerek King
 
Padding oracle [opkoko2011]
Padding oracle [opkoko2011]Padding oracle [opkoko2011]
Padding oracle [opkoko2011]blaufish
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryDan Kaminsky
 

Similaire à Cryptanalysis Lecture (20)

The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
 
Node.js and Blockchain
Node.js and BlockchainNode.js and Blockchain
Node.js and Blockchain
 
Formal analysis-crypto-proto
Formal analysis-crypto-protoFormal analysis-crypto-proto
Formal analysis-crypto-proto
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness Beacon
 
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate UseHyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
 
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityCode Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
 
richard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdfrichard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdf
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Padding oracle [opkoko2011]
Padding oracle [opkoko2011]Padding oracle [opkoko2011]
Padding oracle [opkoko2011]
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Crypto
CryptoCrypto
Crypto
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
 

Dernier

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Dernier (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Cryptanalysis Lecture

  • 1. Cryptanalysis Jonathan Rajewski © 2012 Jonathan T Rajewski 1
  • 2. Overview • Thirty Five Slides of Lecture • Review Cryptology • Attacking Applications • Attacking the cyphers we discussed • FOR270 Crypto Challenge – Until we have a winner! © 2012 Jonathan T Rajewski 2
  • 3. The 3 Siezs © 2012 Jonathan T Rajewski 3
  • 4. The Three C’s • Cryptography • Cryptanalysis • Cryptology 3 C’s Crypto © 2012 Jonathan T Rajewski 4
  • 5. Basic Cryptanalysis © 2012 Jonathan T Rajewski 5
  • 6. Quick Case Study © 2012 Jonathan T Rajewski 6
  • 7. Case Study When you enter your username and password what happens? © 2012 Jonathan T Rajewski 7
  • 8. Case Study Authentication Username + Password = Success © 2012 Jonathan T Rajewski 8
  • 9. © 2012 Jonathan T Rajewski 9
  • 10. © 2012 Jonathan T Rajewski 10
  • 11. Attacking Applications Learn how the application creates passwords! © 2012 Jonathan T Rajewski 11
  • 12. FTP Filezilla Graphical User Interface *Hypothetical Situation © 2012 Jonathan T Rajewski 12
  • 13. FTP In our FTP client, user credentials are stored in an INI file. Boris is the target of the investigation. We currently have no idea how the application stores user credentials. We create a new profile named dummy with a password 1111. The PWD value appears similar to one byte per character in the password and, further, appears to look like the ASCII representation. What we find: Password: 1 1 1 1 ASCII: 0x31 0x31 0x31 0x31 PWD value: 0x31 0x32 0x33 0x34 There is an obvious pattern!!!! Let's derive the other password.... PWD value: 0x42 0x70 0x74 0x6C 0x77 0x4E ASCII: 0x42 0x6F 0x72 0x69 0x73 0x49 Password: B o r i s I © 2012 Jonathan T Rajewski 13
  • 14. Let’s try it! Password.ini file contains the following data. Decrypt the password PWD value: 0x70 0x62 0x75 0x76 0x7B 0x75 0x79 0x45 ASCII: 0x 0x 0x 0x 0x 0x 0x 0x Password: © 2012 Jonathan T Rajewski 14
  • 15. Let’s try it! Password.ini file contains the following data. Decrypt the password PWD value: 0x70 0x62 0x75 0x76 0x7B 0x75 0x79 0x45 ASCII: 0x70 0x61 0x73 0x73 0x77 0x70 0x73 0x4C Password: P A S S W O R D © 2012 Jonathan T Rajewski 15
  • 16. Basic Cryptosystems • Basic Ciphers – Substitution • Replacing one character with another “X” – Transposition • Rearranging the message © 2012 Jonathan T Rajewski 16
  • 17. Substitution Ciphers • Most famous: Caesar's Cipher – Shift each letter to the right by 3 • ROT 13 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m • Substitute letters for others – A is T – B is R – C is B © 2012 Jonathan T Rajewski 17
  • 18. Where are we seeing ROT13? NTUSER.datSoftwareMicrosoftWindows CurrentVersionExplorerUserAssist © 2012 Jonathan T Rajewski 18
  • 19. Where are we seeing ROT13? http://www.csoonline.com/article/570813/data-exfiltration-how-data-gets-out © 2012 Jonathan T Rajewski 19
  • 20. Tools to parse ROT13 • Volatility Plugin (Levy) – http://gleeda.blogspot.com/2011/04/volatility-14- userassist-plugin.html • RegRipper (Carvy) – http://regripper.wordpress.com/ • ROT13.com © 2012 Jonathan T Rajewski 20
  • 21. How to parse ROT13 by hand 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m CipherText PlainText N A C P C P Y L R E © 2012 Jonathan T Rajewski 21
  • 22. Breaking Basic Ciphers • Simple (monoalphabetic) substitution ciphers easily broken with Frequency Analysis Letters: E T O A N I R S H D L C W U M F Y G P B V K X Q J Z Digraphs: TH HE IN ER ED AN ND AR RE EN ED TO NT EA OU NG ST AS Trigraphs: THE AND ING HER NTH ENT THA INT ERE DTH EAR HAT OFT • More complex (polyalphabetic) substitution ciphers use multiple alphabets! © 2012 Jonathan T Rajewski 22
  • 23. Columnar Transposition Cipher • Disguising the message by rearranging the letters – Plaintext: • FOR270 IS SO MUCH FUN DONTCA THINK FOR270ISSOMU CHFUNDONTCHA THINKQWERTYU • cipher: fct ohh rfi 2un 7nk 0dq iow snr str oct mhy uau • cipher enhanced: fctohhrfi2un7nk0dqiowsnrstroctmhyuau © 2012 Jonathan T Rajewski 23
  • 24. Breaking the Columnar Transposition Cipher For all intensive purposes for this “cryptanalysis by hand in a quick timeframe” we are going to attempt to guess the rows and columns cipher: dygi ioet dutx cipher enhanced: dygiioetdutx didyougetit © 2012 Jonathan T Rajewski 24
  • 25. Vigenère Square Ciphertext is intersection of key column and plaintext row. Plaintext: DFIRISGREAT (Side) Key: NTFSNTFSNTF (Top) Ct: QYNJVLLYRTY (Intersect) © 2012 Jonathan T Rajewski 25
  • 26. Vigenère Square Decryption Ct: STYXMYYEGYRR (Intersect) Key: FATFATFATFAT (Side) Plaintext: NTFSMFTENTRY (Top) © 2012 Jonathan T Rajewski 26
  • 27. © 2012 Jonathan T Rajewski 27
  • 28. Crypto Challenge • Scenario – You work for the “SUPER SECRET 5 LETTER AGENCY” – An ultra sophisticated ciphertext was located on an internal server – Our team of cryptographers are actively working on breaking the code but we need your help!!! © 2012 Jonathan T Rajewski 28
  • 29. Phase 1 The following ciphertext was found by the cryptographers. They believe it could have something to do with the userassist key. ovg_qbg_yl_fynfu_m7mKvx 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m © 2012 Jonathan T Rajewski 29
  • 30. Phase 1 Review Did you get it? – ROT13 encryption. CT: ovg_qbg_yl_fynfu_m7mKvx PT: bit_dot_ly_slash_z7zXik PT Decoded: bit.ly/z7zXik © 2012 Jonathan T Rajewski 30
  • 31. Phase 2 We just learned from the cryptographers that more this code may indicated a hidden key for the next aspect of the cryptanalysis…. Visit this link and try to decode the data http://bit.ly/x2qppi © 2012 Jonathan T Rajewski 31
  • 32. Phase 2 Review F O R E N S I C A T O R Forensicator © 2012 Jonathan T Rajewski 32
  • 33. Phase 3 We identified the final encrypted string of ciphertext by analyzing ram using Volatility. Yay for open source tools! Agency cryptologists believe that you will “crack the case” and reveal the cyber villain. Please analyze: CT: ICLKGZMRUZ Key: FORENSICATOR (you wont need the entire key) © 2012 Jonathan T Rajewski 33
  • 34. Phase 3 Please analyze: CT: ICLKGZMRUZ (Intersect) Key: FORENSICATOR (Side) PT: (Top) Hint – you wont need the entire Key © 2012 Jonathan T Rajewski 34
  • 35. Phase 3 Review Ct: ICLKGZMRUZ(Intersect) Key: FORENSICAT(Side) Plaintext: DOUGTHEPUG(Top) © 2012 Jonathan T Rajewski 35
  • 36. Phase 4 The end is here. This is the most complicated ciphertext yet. Doug the Pug “cracked” during interrogation and revealed his secret partner in crime. Next class we will look at the ADFGVX © 2012 Jonathan T Rajewski 36