1. Trang chủ
  2. » Giáo án - Bài giảng

mật mã va an ninh mạng nguyễn đức thái chương ter 02 symmetric ciphers sinhvienzone com

33 51 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 33
Dung lượng 1,89 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Symmetric Ciphers Lectured by Nguyễn Đức Thái SinhVienZone.com https://fb.com/sinhvienzonevn... Cryptographic SystemsThe type of operations used for transforming single-Asymmetric, key

Trang 1

Cryptography and Network Security

2 Symmetric Ciphers

Lectured by

Nguyễn Đức Thái

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 3

Symmetric Encryption

conventional encryption:

• We need a strong encryption algorithm

secret key in a secure fashion and must keep the key

secure If someone can discover the key and knows the algorithm, all communication using this key is readable.

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 4

Symmetric Cipher Model

Trang 5

Symmetric Encryption: Requirements

encryption:

 a secret key known only to sender / receiver

Y = E(K, X) = EK(X) = {X}K

X = D(K, Y) = DK(Y)

Assume encryption algorithm is known

 Kerckhoff’s Principle: security in secrecy of key alone, not

in obscurity of the encryption algorithm

Implies a secure channel to distribute key

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 6

 type of encryption operations used

o substitution

o transposition

o product: involve multiple stages of substitutions and transpositions.

 number of keys used

Trang 7

7Model of Symmetric Cryptosystem

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 8

Cryptographic Systems

The type of operations

used for transforming

single-Asymmetric, key, or public-key encryption

two-The way in which the plaintext is processed

Block cipher

Stream cipher

Trang 9

Cryptanalysis and Brute-Force Attacks

Cryptanalysis

• Attack relies on the nature of the

algorithm plus some knowledge of the

general characteristics of the plaintext

• Attack exploits the characteristics of

the algorithm to attempt to deduce a

specific plaintext or to deduce the key

being used

Brute-force attack

• Attacker tries every possible key on

a piece of ciphertext until an intelligible translation into plaintext

is obtained

• On average, half of all possible keys

must be tried to achieve success

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 10

Cryptanalysis Attacks

Trang 11

Cipher Strength

Unconditionally secure

the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the

corresponding plaintext

Computationally secure

calculations is greater than age of universe), the cipher

cannot be broken

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 12

Brute-Force Attacks

Involves trying every possible key until an intelligible

translation of the ciphertext into plaintext is obtained

On average, half of all possible keys must be tried to

Trang 13

Substitution Technique

substitution involves replacing plaintext bit patterns with ciphertext bit patterns

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 14

Transposition Techniques

symbol

performing some sort of permutation on the

plaintext letters

cipher

Trang 15

Transposition Techniques – Rail Fence

in which the plaintext is written down as a sequence

of diagonals and then read off as a sequence of

rows

after the toga party” with a rail fence of depth 2, we

write the following:

m e m a t r h t g p r y

e t e f e t e o a a t

MEMATRHTGPRYETEFETEOAATSinhVienZone.com https://fb.com/sinhvienzonevn

Trang 16

Caesar Cipher

cipher

the letter standing three places further down the

alphabet

following Z is A

Trang 17

Caesar Cipher Algorithm

 Can define transformation as:

• A shift may be of any amount, so that the general

Caesar algorithm is:

Trang 18

Sample of Compressed Text

Trang 20

Relative Freq of Letters in English Text

Trang 21

Monoalphabetic Ciphers

(homophones) for a single letter

Trang 22

Playfair Ciphers

translates these units into ciphertext digrams

constructed using a keyword

Army in World War I and the U.S Army and other

Allied forces during World War II

Trang 23

Playfair Key Matrix

top to bottom, then fill in the remainder of the

matrix with the remaining letters in alphabetic order

Trang 24

Encrypting and Decrypting

letter to right (wrapping back to start from end)

with the letter below it (wrapping to top from

bottom)

Otherwise each letter is replaced by the letter in the same row and in the column of the other letter of

the pair

Trang 26

Security of Playfair Ciphers

(versus 26 for a monoalphabetic) and

for many years eg by US & British military in WW1

Trang 27

Vigenère Cipher

substitution ciphers

substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25

ciphertext letter that substitutes for the plaintext

letter a

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 28

Vigenère Table

Trang 29

Example of Vigenère Cipher

as the message

message “we are discovered save yourself” is

Trang 30

• using only a subset of letters/words in a longer

message marked in some way

• using invisible ink

• hiding in LSB in graphic image or sound file

• hide in “noise”

• high overhead to hide relatively few info bits

Trang 31

Summary (1/2)

ciphertext using a secret key and an encryption

algorithm

plaintext is recovered from the ciphertext

are cryptanalysis, based on properties of the

involves trying all possible keys

SinhVienZone.com https://fb.com/sinhvienzonevn

Trang 32

Summary (2/2)

• Substitution techniques map plaintext elements (characters, bits) into ciphertext elements

• Transposition techniques systematically transpose the positions of plaintext elements

message within a larger one in such a way that

others cannot discern the presence or contents of

the hidden message

Trang 33

References

Cryptography and Network Security, Principles

and Practice, William Stallings, Prentice Hall,

Sixth Edition, 2013

SinhVienZone.com https://fb.com/sinhvienzonevn

Ngày đăng: 30/01/2020, 21:04

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm