Documente Academic
Documente Profesional
Documente Cultură
Udayprakash.jntuhceh@gmail.com
misuse.
12/21/2012
Dept. of ECE
CRYPTOLOGY
Cryptology= cryptography + cryptanalysis. Cryptography Area of study of encryption &
decryption. Cryptanalysis Techniques used for deciphering a message without any knowledge of enciphering details i.e, studying ways for breaking the code. Encryption (Enciphering) Process of converting from plain text to cipher text. Decryption (Deciphering) Process of restoring the plain text from the cipher text.
Plain Text the original intelligible message. Cipher Text coded unintelligible message.
12/21/2012 Dept. of ECE Network Security & Cryptography 4
Roadmap of Cryptography
classical cryptography (--- 1920s) secret writing required only pen and paper Mostly: transposition, substitution ciphers Easily broken by statistics analysis (e.g., frequency) mechanical devices invented for encryption Rotor machines (e.g. Enigma cipher) 1930s-1950s featured in films, such as in the James Bond adventure From Russia with Love specification of DES and the invention of RSA (1970s) --modern ciphers Public key system, most notably Quantum Cryptography (future?)
12/21/2012 Dept. of ECE Network Security & Cryptography 5
History--Ancient Ciphers
Have a history of at least 4000 years Ancient Egyptians enciphered some of their hieroglyphic writing on monuments Ancient Hebrews enciphered certain words in the scriptures , and bible used a reverse-alphabet simple substitution cipher known as the ATBASH cipher 2000 years ago Julius Caesar used a simple substitution cipher, now known as the Caesar cipher Roger bacon described several methods in 1200s
12/21/2012 Dept. of ECE Network Security & Cryptography 6
History--Ancient Ciphers
Geoffrey Chaucer included several ciphers in his works. Leon Alberti devised a cipher wheel, and described the principles of frequency analysis in the 1460s Blaise de Vigenre published a book on cryptology in 1585, & described the polyalphabetic substitution cipher Increasing use, esp in diplomacy & war over centuries
12/21/2012 Dept. of ECE Network Security & Cryptography 7
12/21/2012
Dept. of ECE
1500 B.C.--Mesopotamia
A 3" x 2" Mesopotamian tablet contained an enciphered formula for making pottery glaze. Cuneiform signs were used in the least common syllabic values to attempt to hide secrets of the formula. About Cuneiform: Pictograms, or drawings representing actual things, were the basis for cuneiform writing.
12/21/2012
Dept. of ECE
12/21/2012
Dept. of ECE
10
Polybius Square
Polybius was responsible for
12/21/2012
Dept. of ECE
11
1000-Frequency Analysis
Frequency Analysis leading to techniques for breaking mono-alphabetic substitution ciphers. Frequency analysis is based on the fact that in any given stretch of a language, letters and combinations of letters occur with varying frequencies. In the English language for example, E is the most common letter, while X is rare. Its use spread, and was so widely used by European states by the Renaissance that several schemes were invented by cryptographers to defeat it. These included homophones, poly-alphabetic substitution and poly-graphic substitution schemes. It was the most fundamental cryptanalytic advance until WWII.
12/21/2012 Dept. of ECE Network Security & Cryptography 12
12/21/2012
Dept. of ECE
16
12/21/2012
Dept. of ECE
18
12/21/2012
Dept. of ECE
19
1918-1945
Mathematical methods proliferated in the period prior to World War II
(notably in William F. Friedman's application of statistical techniques to cryptanalysis and cipher development and in Marian Rejewski's initial break into the German Army's version of the Enigma system) in 1932.
12/21/2012
Dept. of ECE
20
1971 - Lucifer
Horst Feistel created Lucifer at IBMs Thomas J. Watson Laboratory. Lucifer was the name given to several of the earliest civilian block ciphers. It was a direct precursor to the Data Encryption Standard. 17 March 1975 --- DES draft
Federal Information Processing Standard Publication in 1977 (currently at FIPS 46-3)
12/21/2012 Dept. of ECE Network Security & Cryptography 22
12/21/2012
Dept. of ECE
23
2001--AES
In 2001 when NIST announced FIPS 197. After an open competition, NIST selected Rijndael, submitted by two Belgian cryptographers, to be the AES. Later evolved, Triple DES.
12/21/2012
Dept. of ECE
24
Modern Cryptanalysis
While modern ciphers like AES and the higher quality asymmetric ciphers are widely considered unbreakable,
poor designs and implementations are still sometimes adopted and there have been important cryptanalytic breaks of deployed crypto systems in recent years. Notable examples of broken crypto designs include DES, the first Wi-Fi encryption scheme WEP, the Content Scrambling System used for encrypting and controlling DVD use, the A5/1 and A5/2 ciphers used in GSM cell phones, Thus far, not one of the mathematical ideas underlying public key cryptography has been proven to be 'unbreakable
12/21/2012
Dept. of ECE
25
Symmetric Encryption
or conventional / private-key / single-key sender and recipient share a common key all classical encryption algorithms are private-key was only type prior to invention of public-key in 1970s Two basic components of classical ciphers:
Substitution: letters are replaced by other letters Transposition: letters are arranged in a different order
12/21/2012
Dept. of ECE
26
12/21/2012
Dept. of ECE
27
Key Management
Using secret channel Encrypt the key Third trusted party The sender and the receiver generate key
The key must be same We will talk more about how we can generate keys for two parties who are unknown of each other before, and want secure communication
12/21/2012 Dept. of ECE Network Security & Cryptography 28
Cryptanalysis
12/21/2012
29
Possible Attacks
Recover the message Recover the secret key Thus also the message Thus the number of keys possible must be large!
cipher text only only know algorithm / cipher text, statistical, can identify plaintext known plaintext know/suspect plaintext & cipher text to attack cipher chosen plaintext select plaintext and obtain cipher text to attack cipher chosen cipher text select cipher text and obtain plaintext to attack cipher chosen text select either plaintext or cipher text to en/decrypt to attack cipher
12/21/2012
Dept. of ECE
30
Security
No crime can be committed clueless. No Security service can be implemented flawless. There are TWO fundamentally different securities:
1. Unconditional Security
No matter how much computational power is available, the cipher cannot be broken.
2. Computational Security
Given limited computing resource, the cipher cant be broken within its lifetime.
12/21/2012
Dept. of ECE
31