1. Trang chủ
  2. » Giáo án - Bài giảng

Network systems security by mort anvari lecture3

36 138 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 36
Dung lượng 243 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Classical Substitution Ciphers  Letters of plaintext are replaced by other letters, by numbers, or by... Caesar Cipher Earliest known substitution cipher  Invented by Julius Caesar 

Trang 1

Cryptography

Network Systems Security

Mort Anvari

Trang 2

 Can be characterized by

 type of encryption operations used

 substitution / transposition / product

 number of keys used

 single-key or shared / two-key or public

 way in which plaintext is processed

 block / stream

Trang 3

Security of Cryptography

 Unconditional security

 no matter how much computer power is

available, the cipher cannot be broken since the ciphertext provides insufficient

information to uniquely determine the

corresponding plaintext

 Computational security

 given limited computing resources (eg time needed for calculations is greater than age

Trang 4

Cryptographic Tools To Be

Used

 Shared keys

 Public and private keys

 Hashing functions and message digest

 Nonces

Trang 5

Symmetric Encryption

 Sender and receiver share a common key

 All classical encryption algorithms

belong to this type

 Was only type prior to invention of

public-key in 1970’s

Trang 6

Basic Terminology

plaintext - the original message

ciphertext - the coded message

cipher - algorithm for transforming plaintext to

cryptography - study of encryption principles/methods

cryptanalysis (codebreaking) - the study of

principles/ methods of deciphering ciphertext without

knowing key

cryptology - the field of both cryptography and

cryptanalysis

Trang 7

Types of Cryptanalytic

Attacks

Ciphertext only

 only know algorithm, ciphertext, and statistics

 can identify plaintext

Trang 8

Symmetric Cipher Model

Trang 9

 Two requirements for secure use of

symmetric encryption

 a strong encryption algorithm

 a secret key K known only to sender and receiver

Y = E K (X)

X = D K (Y)

 Assume encryption algorithm is known

 Imply a secure channel used to

distribute key

Trang 10

Classical Substitution

Ciphers

 Letters of plaintext are replaced by

other letters, by numbers, or by

Trang 11

Caesar Cipher

 Earliest known substitution cipher

 Invented by Julius Caesar

 First attested use in military affairs

 Replace each letter by letter three

places down the alphabet

 For example,

meet me after the toga party

PHHW PH DIWHU WKH WRJD SDUWB

Trang 12

Mechanism of Caesar Cipher

 Can define transformation as

Trang 13

Cryptanalysis of Caesar

Cipher

 Only 26 possible ciphers

 “A” maps to “A”, “B”, “Z”

 Can easily break with brute-force

Trang 14

Monoalphabetic Cipher

 Rather than just shifting the alphabet

 Can shuffle the letters arbitrarily

 Each letter in plain alphabet maps to a different random letter in cipher

Trang 15

Monoalphabetic Cipher

Security

 Now have a total of 26! ≥ 4 x 1026 keys

 With so many keys, might think is

secure

 Still has problem: natural language

characteristics

Trang 16

Language Characteristics and Cryptanalysis

 Letters are not equally commonly used

 In English, “E” is by far the most

common letter, followed by “T”, “A”,

“O”, “I”, “N”, “S”, “H”, “R”

 Other letters “Z”, “J”, “K”, “Q”, “X” are rarely used

 Have tables of single, double & triple letter frequencies

Trang 17

English Letter Frequencies

Trang 18

Cryptanalysis of Caesar

Cipher and Monoalphabetic

Cipher

not change relative letter frequencies

 Discovered by Arabian scientists in 9 th

century

troughs

 peaks at: A-E-I triple, NO pair, RST triple

 troughs at: JK, X-Z

tables of common double/triple letters help

Trang 20

Playfair Cipher

 Not even the large number of keys in a monoalphabetic cipher provides security

 One approach to improving security was

to encrypt multiple letters

 Playfair cipher is an example

Trang 21

Playfair Key Matrix

 A 5X5 matrix of letters based on a

keyword

 Fill in letters of keyword (sans

duplicates)

 Fill rest of matrix with other letters

Eg using the keyword MONARCHY

M O N A R

C H Y B D

E F G I/J K

L P Q S T

Trang 22

Encrypting and Decrypting

 plaintext encrypted two letters at a

time

1 if a pair is a repeated letter, insert a filler like “X”

eg “balloon” encrypts as “ba lx lo on”

2 if both letters fall in the same row, replace each with letter to right (wrapping back to start from end)

eg “ar” encrypts as “RM”

3 if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) eg “mu” encrypts to “CM”

4 otherwise each letter is replaced by the one in its

row in the column of the other letter of the pair

eg “hs” encrypts to “BP”, and “ea”

to “IM” or “JM” (as desired)

Trang 23

Security of Playfair Cipher

 Security much improved over

monoalphabetic

 Have 26 x 26 = 676 digrams

 Would need a 676 entry frequency table

to analyze (verses 26 for a

Trang 24

 Use each alphabet in turn

 Repeat from start after end of key is reached

Trang 25

Vigenère Cipher

 Simplest polyalphabetic substitution

cipher which effectively multiply Caesar ciphers

 Key is multiple letters long K = k1 k2

kd

 i th letter specifies i th alphabet to use

 Use each key letter as a Caesar cipher key

Eg using keyword deceptive

key: deceptivedeceptivedeceptive

plaintext: wearediscoveredsaveyourself

Trang 26

Security of Vigenère

Ciphers

plaintext letter: obscure letter frequencies a bit

 see if look monoalphabetic or not

 if not, need to determine number of alphabets

which results in the same ciphertext (could

also be random fluke)

 Eg repeated “VTW” in previous example

suggests size of 3 or 9

Trang 27

Autokey Cipher

prefix keyword to message as key

Trang 28

 for any plaintext and any ciphertext there exists

a key mapping one to other

 Can only use the key once

Trang 30

Rail Fence Cipher

 Write message letters out diagonally

over a number of rows

 Then read off cipher row by row

 For example, write message out as

m e m a t r h t g p r y

e t e f e t e o a a t

and get ciphertext as

MEMATRHTGPRYETEFETEOAAT

Trang 31

Row Transposition Ciphers

 A more complex scheme

 Write letters of message out in rows

over a specified number of columns

 Then reorder the columns according to some key before reading off the rows

Trang 32

Product Ciphers

are not secure because of language

characteristics

succession to make it harder to break

 two substitutions make a more complex

substitution, but still a substitution

 two transpositions make a more complex

transposition, but still a transposition

 but a substitution followed by a transposition makes

a new much harder cipher

Trang 33

Rotor Machines

 Before modern ciphers, rotor machines were most common product cipher

 Were widely used in WW2

 German Enigma, Allied Hagelin, Japanese Purple

 Implement a very complex, varying

substitution cipher

 Use a series of cylinders, each giving one substitution, which rotate and

change after each letter was encrypted

 With 3 cylinders, have 263=17576

Trang 34

An Example of Rotor Machine

Trang 35

 using only a subset of letters/words in a

longer message marked in some way

 using invisible ink

 hiding in LSB in graphic image or sound file

 Has drawbacks

 high overhead to hide relatively few info bits

Trang 36

Next Class

 Block ciphers

 Modern symmetric encryption standard

Ngày đăng: 09/01/2018, 11:57

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN