Criptografía Y Mecanismos De Seguridad

Total Page:16

File Type:pdf, Size:1020Kb

Criptografía Y Mecanismos De Seguridad Criptografía y mecanismos de seguridad Autor: Lucy Noemy Medina Velandia Criptografía y mecanismos de seguridad / Lucy Noemy Medina Velandia, / Bogotá D.C., Fundación Universitaria del Área Andina. 2017 978-958-5460-19-5 Catalogación en la fuente Fundación Universitaria del Área Andina (Bogotá). © 2017. FUNDACIÓN UNIVERSITARIA DEL ÁREA ANDINA © 2017, PROGRAMA INGENIERIA DE SISTEMAS © 2017, LUCY NOEMY MEDINA VELANDIA Edición: Fondo editorial Areandino Fundación Universitaria del Área Andina Calle 71 11-14, Bogotá D.C., Colombia Tel.: (57-1) 7 42 19 64 ext. 1228 E-mail: [email protected] http://www.areandina.edu.co Primera edición: noviembre de 2017 Corrección de estilo, diagramación y edición: Dirección Nacional de Operaciones virtuales Diseño y compilación electrónica: Dirección Nacional de Investigación Hecho en Colombia Made in Colombia Todos los derechos reservados. Queda prohibida la reproducción total o parcial de esta obra y su tratamiento o transmisión por cualquier medio o método sin autorización escrita de la Fundación Universitaria del Área Andina y sus autores. Criptografía y mecanismos de seguridad Autor: Lucy Noemy Medina Velandia i Índice UNIDAD 1 Criptografía Introducción 7 Metodología 8 Desarrollo temático 9 UNIDAD 1 Usos de la criptografía Introducción 24 Metodología 25 Desarrollo temático 26 UNIDAD 2 Herramientas de Desarrollo Disponibles Introducción 36 Metodología 37 Desarrollo temático 38 UNIDAD 2 Protocolos criptográficos Introducción 53 Metodología 54 Desarrollo temático 55 i Índice UNIDAD 3 Algoritmos de criptografía simétrica Introducción 75 Metodología 76 Desarrollo temático 77 UNIDAD 3 Algoritmos de criptografía simétrica Introducción 95 Metodología 96 Desarrollo temático 97 UNIDAD 4 Criptografía en la capa de aplicación Introducción 106 Metodología 107 Desarrollo temático 108 UNIDAD 4 Criptografía en la capa de aplicación Introducción 123 Metodología 124 Desarrollo temático 125 Bibliografía 140 UNIDAD1 1Unidad 1 Criptografía y Criptografía mecanismos de seguridad Autor: Lucy Medina Introducción Debido a la creciente incursión de los usuarios en la red y al gran volumen de información que se maneja, surge la eviden- te necesidad de ocultar cierta información que para algunas empresas o personas es relevante y de suma importancia. In- ternet es utilizado para compartir información y realizar tran- sacciones de toda índole, sobre todo las entidades financieras que realizan la mayor parte de sus operaciones en línea; pero la información que viaja través de las redes puede ser inter- ceptada y utilizada en contra del usuario o desfavoreciendo su bienestar. Por ello, asegurar la información se hace impe- rativo y qué mejor que a través de criptografía (que oculta mensajes), la esteganografía (que esconde la información de manera desapercibida) y el criptoanálisis (que reconstruye un mensaje cifrado) que dan la posibilidad de proteger los datos que viajan a través de la red. La idea de las técnicas mencionadas es que la información se vuelva confiable, fiable, íntegra y auténtica, por ello, es impor- tante aprender de dónde viene la criptografía, los métodos más utilizados y el futuro que se espera sobre esta materia. Fundación Universitaria del Área Andina Fundación Universitaria del Área Andina 37 U1 Metodología En este primer capítulo del módulo, se estudiarán las bases para entender los siguientes capítulos y tener claras las ideas que serán utilizadas. Se trabajarán conceptos desde qué es la criptografía, su finalidad, los métodos utilizados en la criptografía, la seguridad de la información y se estudiarán conceptos sobre la técnica llamada criptosistema, que no es otra cosa que un conjunto de instrucciones para garantizar la seguridad de la información a través de técnicas criptográficas, las cuales utilizan las claves o llaves. Recomendaciones: ■ Realizar las lecturas asignadas. ■ Elaborar cada uno de los trabajos asignados. ■ Realizar las evaluaciones propuestas. ■ Cuando no entienda algo, comuníquese con su tutor. ■ No continúe con el siguiente tema, hasta que esté perfectamente claro el tema actual. ■ Siempre que lea, hágalo entendiendo las ideas. Fundación Universitaria del Área Andina 8 Fundación Universitaria del Área Andina 4 U1 Desarrollo temático puede sufrir dos eventos, el uno que llegue Historia de la criptografía al receptor y lo descifre o que el mensaje sea Para iniciar con la historia de la Criptografía, interceptado y los intrusos lo desencripten vale la pena entender lo que es. Básicamen- y puedan leer el mensaje. te, se trata de una herramienta de gran utili- dad para tener segura la información y que Mensaje ésta sea confiable, íntegra y esté disponible Mensaje cuando se necesite. En síntesis, la Criptogra- fía es una ciencia que apunta hacia la segu- ridad de los datos y los documentos, para ello, utiliza códigos o claves que permiten Ciframiento almacenar información secreta que pueda circular por medios públicos o privados y que para muchos pase desapercibida, solo la conocerá el emisor y el receptor siempre y Mensaje cuando sepan cómo traducir la información interceptado Criptograma Desencriptado para entenderla o cómo cifrarla para que otros no la comprendan. Es importante que el educando aprenda que la Criptografía tiene dos divisiones, de una parte, la Criptografía y de otra el Crip- Desciframiento Mensaje toanálisis. La primera, estudia las técnicas del cifrado de la información y la segunda, se dedica a todo lo contrario, es decir, a des- Figura 1. Ciclo de un mensaje secreto cifrar o decodificar esa información. Fuente: Propia. En la figura 1, se muestra lo que sucede Una vez entendidos los conceptos de cripto- cuando se envía un mensaje, este se cifra grafía y criptoanálisis, iniciemos con la histo- y continúa su viaje como un Criptograma, ria de la criptografía. o sea que hace referencia al mensaje cifra- do, es decir que no es entendible por quien La práctica del ciframiento, ha existido des- no conoce la clave para descifrarlo. En ese de épocas remotas, es el caso de la Mesopo- trayecto, el mensaje cifrado o Criptograma tamia, la India y la China, utilizaban métodos Fundación Universitaria del Área Andina 59 para que nadie supiera lo que ellos escon- En la india consideran el Kama Sutra como dían. De la misma manera, Julio César, mili- un técnica encriptada para que los amantes tar y político romano, utilizaba un método se comunicaran sin ser descubiertos. particular para cifrar mensajes, consistía en Criptografía medieval sustituir cada una de las letras de un men- saje por la tercera letra siguiente del alfa- Año 1000, se inventa la técnica del análisis beto. Posteriormente, durante la Primera de frecuencias con el objeto de romper o Guerra Mundial, la criptografía se convierte descifrar los cifrados por sustitución mo- en un arma útil para la comunicación, pero noalfabética, todo esto se realizó a partir los resultados no fueron los esperados, por del Corán, porque le hicieron un análisis ejemplo, en esta Primera Guerra Mundial se utilizó intensamente la criptografía; el códi- textual. go Ubchi fue desarrollado por los alemanes, En 1465 León Battista Alberti inventó el ci- el cual fue penetrado por los franceses, a frado polialfabético. la vez, los códigos de la fuerza naval de los alemanes fueron descifradas por Room 40, En 1510 se utiliza la criptografía en Japón, también conocido como 40 O.B., que era pero fue en 1860 que realmente se utiliza- una sección del Almirantazgo británico que ron las técnicas avanzadas de criptografía, trabajaba con el criptoanálisis durante esta cuando el país se abrió hacia occidente. guerra mundial; esta intromisión dentro de los códigos navales alemanes, hizo que el Criptografía de 1800 a la Segunda Guerra Reino Unido tomara la delantera a Alemania Mundial y preparara batallas para combatirlos. Criptografía clásica En el siglo XIX se desarrollaron soluciones adecuadas para el cifrado y el criptoanálisis. Hace más de 4500 años en Egipto se inicia Se distinguieron Charles Babbage, que es- el uso de jeroglíficos tallados en monu- tudió el cifrado polialfabético. Esta fue una mentos. época que se distinguió porque la cripto- grafía constaba de reglas muy generales. Los hebreos utilizaron también los cifrados por sustitución monoalfabético. En el año 1840, otro personaje que se dis- tinguió en esta época fue Edgar Alan Poe, El número “666” denominado el número de quien desarrolló métodos sistemáticos la bestia es considerado como un criptogra- que resolvían cifrados, Poe a través de un ma que oculta algo peligroso. periódico invitada a las personas para que Los militares espartanos utilizaron el cifrado enviaran mensajes cifrados que él resolvía por transposición por medio de uno de los con facilidad, esto le trajo atracción por un primero dispositivos de cifrado como era la tiempo. Escitala. Antes de la segunda guerra mundial William Los romanos utilizaron el cifrado César y sus Friedman utilizó técnicas estadísticas para variaciones. desarrollar el criptoanálisis. Fundación Universitaria del Área Andina Fundación Universitaria del Área Andina 610 Criptografía en la Segunda Guerra Mun- A mediados de los años 70 se avanzó en dos dial aspectos, uno fue la propuesta que la IBM envió al Registro Federal una propuesta ti- Se empieza el uso de máquinas de cifrado tulada “Data Encryption Standard - DES-”, mecánicas y electromecánicas. con el fin de desarrollar sistemas de comu- nicación seguras para empresas financieras- Los alemanes utilizan bastante la máquina bancarias- y otras empresas. llamada Enigma del ejército alemán. En 1977, luego de realizar mejoras al escri- Una vez estalló la segunda guerra mundial, to antes mencionado, la NSA de los Estados Allan Turing y Gordon Welchman, progresa- Unidos, publica el “Federal Information Pro- ron bastante en la tecnología de descifrado cessing Standard”. de la máquina Enigma. En 2001 el DES fue reemplazado por el AES En 1940 los criptógrafos británicos y holan- -Advanced Encryption Standard- que es un deses rompieron los sistemas criptográficos algoritmo llamado Rijndael realizado por de la Armada japonesa. criptógrafos Bbelgas. De este algoritmo se han realizado variantes que hoy en día toda- Militares del ejército americano rompió el vía se utilizan.
Recommended publications
  • Historical Ciphers Part 2
    ECE 646 - Lecture 7 Required Reading • W. Stallings, Cryptography and Network Security, Historical Ciphers Chapter 3, Classical Encryption Techniques Part 2 • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development 1 2 14 Substitution Ciphers (2) 12 Character frequency 2. Polyalphabetic substitution cipher 10 in a long English 8 plaintext M = m1 m2 … md 6 m m … m d+1 d+2 2d 4 m2d+1 m2d+2 … m3d 2 ….. 0 a b c d e f g h i j k l m n o p q r s t u v w x y z C = f1(m1) f2(m2) … fd(md) Character frequency 14 in the corresponding f1(md+1) f2(md+2) … fd(m2d ) 12 ciphertext f1(m2d+1 ) f2( m2d+2) … fd(m3d ) 10 for a polyalphabetic ….. 8 substitution cipher d is a period of the cipher 6 1 4 × 100% » 3.8 % Key = d, f1, f2, …, fd 26 2 d 26 d Number of keys for a given period d = (26!) » (4 × 10 ) 0 a b c d e f g h i j k l m n o p q r s t u v w x y z 3 4 1 Polyalphabetic substitution ciphers Vigenère Cipher - Example Simplifications (1) Plaintext: TO BE OR NOT TO BE A. Vigenère cipher: polyalphabetic shift cipher Key: NSA Invented in 1568 Encryption: T O B E O R ci = fi mod d(mi) = mi + ki mod d mod 26 N O T T O B -1 mi = f i mod d(ci) = ci - ki mod d mod 26 E Key = k0, k1, … , kd-1 Number of keys for a given period d = (26)d 5 6 Vigenère Square Vigenère Square plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z 3 a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z b c d e
    [Show full text]
  • Historical Ciphers • A
    ECE 646 - Lecture 6 Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques Historical Ciphers • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development Why (not) to study historical ciphers? Secret Writing AGAINST FOR Steganography Cryptography (hidden messages) (encrypted messages) Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances modern ciphers can be Substitution Transposition Long abandoned Ciphers reduced to historical ciphers Transformations (change the order Influence on world events of letters) Codes Substitution The only ciphers you Ciphers can break! (replace words) (replace letters) Selected world events affected by cryptology Mary, Queen of Scots 1586 - trial of Mary Queen of Scots - substitution cipher • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against 1917 - Zimmermann telegram, America enters World War I her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about 1939-1945 Battle of England, Battle of Atlantic, D-day - a reign of Elisabeth I, a Protestant ENIGMA machine cipher • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth 1944 – world’s first computer, Colossus - • Put on trial for treason by a court of about German Lorenz machine cipher 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own 1950s – operation Venona – breaking ciphers of soviet spies letters sent from prison to her co-conspirators stealing secrets of the U.S. atomic bomb in the encrypted form – one-time pad 1 Mary, Queen of Scots – cont.
    [Show full text]
  • I Islander Readers I Say the Damdest I Things... 7A ARTS » LEISURE: Life's
    mm ARTS » LEISURE: EVERY WEEK: i Islander readers Life's a beach 1B Calendar 27A I say the damdest Ostrich eggs, . Classifieds 18C i things... 7A anyone? 4B Island map 25A 1961-1986 Still first after 25 years VOL. 26, NO. 13 TUESDAY, MARCH 3>, 1987 THREE SECTIONS, 76 PAGES 50 CENTS Who's the wiser? Michael Welngart, staff member at Care and ed howl back in Its nest on Captiva last weekend. The strong winds last week. Story on page 1C. Photo by Rehabilitation of Wildlife, placed this baby great horn- owl was one of two that was blown from the nest by Rlcki Kosakow Cooper. INDEX2 •-,•.•. ALSO THIS WEEK How do you Executive women Westall isn't discouraged Arts-Leisure 4B organize new chapter when osprey parents Brldae 13B combine computers Club news 14B with seashells? of service club on Sanibel vent their indignation Fishing tips 10C Long-time Island, shellers President Kappy King Cole in- In his first osprey chick banding Nature programs 3C Margaret Thorsen and Ede vites interested Island business expedition of the season, Mark Obituary 15A Mugridge have found a way - and women to learn more about the "Bird" Westall suffered minor in- juries to his arm when an angry Police beat 4A their efforts will benefit the Sanibel fledgling Sanibel-Captiva Zonta Club. osprey mother dove at him. Shelling tips 11C Shell Museum and Research Foundation. 23B 10A The ISLANDER Tuesday, March 31, 1987 3A City hopes to gain endorsement of Realtors Tuesday for sales tax to help purchase sensitive wetlands 2A Island Shorts March 31,1987 By BARBARA BRUNDAGE directors, as do city councilmen, view a recreational facilities would not be inherent obligation and responsibility Islander staff writer real estate transaction tax as the most included.
    [Show full text]
  • %E Morse Magazine
    1'£um6er 23 - f£aster 1992 ... %e Morse. Magazine.. - MORSUM MAGNIFICAT was [lTst published in Holland, in 1983, by the late Rinus Helkmons PAOBFN. Now published in Britain, it aims to provide international coverage of all aspects of Morse telegraphy, past present and future. MORSUM MAGNIFICAT is for all Morse enthusiasts, amateur or professional, active or retired. It brings together material which would otherwise be lost to posterity, providing an invaluable source of interest, reference and record relating to the traditions and practice of Morse. SUBSCRIPTIONS: For one year (four issues) United Kingdom: £8.50 per annwn, post-paid Europe, including Eire: £8.50 sterling Other countries: Surface mail- £9.00 sterling (or US $17.00 cash only) Ainnail- £11.00 sterling (or US $21.00 cash only) Cheques payable to 'G C Arnold Partners'. Payment by Access, Eurocard, Master­ card or Visa is also accepted; quote your card nwnber and expiry date. Please note that, owing to very high bank charges for currency exchange, we are unable to accept overseas cheques, drafts, money orders, etc., unless payable in sterling. Overseas cheques and drafts must be drawn on a London clearing bank. EDITORIAL AND SUBSCRIPTION OmCES: Morswn Magnificat. 9 Wetherby Close, Broadstone, Dorset BH18 8JB, England Telephone: Broadstone (0202) 658474; International +44 202658474 EDITOR Geoff Arnold G3GSR CONSULTANT EDITOR Tony Smith G4FAI, 1 Tash Place, London NIl IPA, England. Tel: 081-3684588 © G C Arnold Partners 1992 ISSN 0953-6426 Printed by Hertfordshire Display Company, Ware, Herts. ON OUR FRONT COVER A GNT Undulator in working condition. Photo by Dennis Goacher G3L1.Z Contents IRST OF ALL, AN APOLOOY to all of you 2 News F who were confused by the fact that they hadn't 6 Clandestine Radio - 2 had a ChrisbnaS issue of MM.
    [Show full text]
  • Historical Ciphers
    ECE 646 - Lecture 6 Historical Ciphers Required Reading • W. Stallings, Cryptography and Network Security, Chapter 2, Classical Encryption Techniques • A. Menezes et al., Handbook of Applied Cryptography, Chapter 7.3 Classical ciphers and historical development 1 Why (not) to study historical ciphers? AGAINST FOR Not similar to Basic components became modern ciphers a part of modern ciphers Under special circumstances Long abandoned modern ciphers can be reduced to historical ciphers Influence on world events The only ciphers you can break! Secret Writing Steganography Cryptography (hidden messages) (encrypted messages) Substitution Transposition Transformations Ciphers (change the order of letters) Codes Substitution Ciphers (replace words) (replace letters) 2 Selected world events affected by cryptology 1586 - trial of Mary Queen of Scots - substitution cipher 1917 - Zimmermann telegram, America enters World War I 1939-1945 Battle of England, Battle of Atlantic, D-day - ENIGMA machine cipher 1944 – world’s first computer, Colossus - German Lorenz machine cipher 1950s – operation Venona – breaking ciphers of soviet spies stealing secrets of the U.S. atomic bomb – one-time pad Mary, Queen of Scots • Scottish Queen, a cousin of Elisabeth I of England • Forced to flee Scotland by uprising against her and her husband • Treated as a candidate to the throne of England by many British Catholics unhappy about a reign of Elisabeth I, a Protestant • Imprisoned by Elisabeth for 19 years • Involved in several plots to assassinate Elisabeth • Put on trial for treason by a court of about 40 noblemen, including Catholics, after being implicated in the Babington Plot by her own letters sent from prison to her co-conspirators in the encrypted form 3 Mary, Queen of Scots – cont.
    [Show full text]
  • Island Is a Specially Designed Comrruni'y That Compliments Mturt
    L island REPORTER SANIBBL & CAPTIVA, FLORIDA I Volume Ntmihci Dale Li E ANDCAPTIVA FLORIDA* February 7 1985 island VOLJWE U *• MBEfl 3 J 'Sanibel is not a destination xm shopping area' --CITYCGUMCIL tebn tfV ? I'A'JT I \Jn6 K< potii the island eye Ancient art of Chinese great dates SUuU its m hanne layering \to >d s Itrst grade class nt S iwbtl February \ earn the meienl htcmentaru SIAJU/ art of Chincst lajtr en crrunicttnq Hi'thdaj of John l)t< re ll-thrum 7 ing r ich Wedmsdij clrstroum cientiand at 10 am there will 7 1804 May 17 18861 *mcri<an invtntnr iir/iu'it* in The til a hinds oh and manufacturer of the strel plow demonstration of the tirsl Grade Star Bov Scout*, pav commemorates thf imor prop igalion Itchni The >.t~drnt* art quc of air leering in dtiutnl into 8 porahon of thr Boy Scout's ol \iunc i < n use for more than reporters and lebruarj 8 1910 A Hoy Scout* of •I 000 Years in China photagrapbtrv u\th American Sabbath is u-suallj ichtdulid Eviryone will havt <* some dictating for Sunday near this dtte Hoj Scouts chance to tr% the stunes aidotners Dav is scheduled annually near thr date technique draj ing pictures of I he organisations founding and it The Students kai" followed by week or month long ac Bring your pocket htcn lery eiaud lt knife to the Sin.bcl abnul it, $ayt Mrs B rthday of Am> Lo-*ell (Fthruary *» Captiva Conservation Wood n ho periodical Foundations Native 1874 May 12 1825) Amenm pod ly runs off Ike paper Plant Nursery each biographer, and critic, a leader among thi or the school Wednesday says imagist poet* authorofatnonumi ntul life manager Dee Serage ofKtats For more inforantion nil 472 1932 or Birthday of Boris I eonidouch Pistirmk 172 2329 10 (tebruarj 10 1890 Ma> 10 l«60l Russian A donitton of S5 is P<« i novrlist and translator who «a«- awirdrd thr 1985 >obil 1'n/f in htera t ire hul » a* forced to refuse it hi just {f Bring your | ditKalipp sition the author of D <l r wild harvest 1 1 Ilirthdav «>f Thomas Uu tdi=<n 1 1 IFdruarj 11 1&17 Octobt-r 1b 1 *• il Do sou ft.
    [Show full text]
  • CLASSICAL CRYPTOGRAPHY COURSE by LANAKI February 22
    CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI February 22, 1996 Revision 0 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 8 INTRODUCTION TO CRYPTARITHMS AND HILL CIPHER SUMMARY In Lecture 8, we depart from the schedule for a real treat. In the first part of this Lecture, we introduce Cryptarithms by our guest lecturer LEDGE (Dr. Gerhard D. Linz). LEDGE has already produced one of our better references on beginning cryptography [LEDG], and I appreciate his assistance in our course. The cryptarithms portion of this course will be presented in three lectures and for the final book labelled Lectures 20 - 23. Following the Cryptarithms section we introduce the Hill Cipher. Our second guest lecturer is NORTH DECODER. Dr. Jerry Metzger and his team are presenting you with the Crypto Drop Box and the ACA-L Listserver. The Hill cipher has six GIF files associated with it and can be found at the CDB. Waiting in wings patiently for my resource materials is TATTERS to present Cipher Exchange problems. INTRODUCTION TO CRYPTARITHMS (by LEDGE) Here's the first of the Cryptarithm lectures. It consists of a general introduction to the genre including how to read the problems. That's followed by an explanation of modulo arithmetic. Then we look at how to identify the letters that represent 0, 1 and 9, called digital characteristics. Then there are two sections on making inferences, each demonstrating a problem solution. Finally, there's a section on extracting square roots. Next lecture LEDGE will give some aids for solving multiplication problems and then go into base 11 and base 12 arithmetic.
    [Show full text]
  • Certificate in E Certificate in E-Governance and Security Information System (CEGCS-04) Vernance and Cyber
    Certificate in e -Governance and Cyber Security Information System (CEGCS-04) Title Information System Adviso rs Mr. R. Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer(Education) , CEMCA Prof. Durgesh Pant, Director -SCS&IT, UOU Editor Er. Gopesh Pande, Network Engineer, Wipro Infotech, Mumbai Authors Block I> Unit I, Unit II, Unit III & Unit IV Er. Charanjeet Singh Chawla, Wing Commander, Indian Air Force, Ministry of Defence Block II> Unit I, Unit II, Unit III & Unit IV Er. Ashok Katariya, Group Captain, Indian Air Force, Ministry of Defence Block III> Unit I, Unit II, Unit III & Unit IV Er. Ashok Katariya, Group Captain, Indian Air Force, Ministry of Defence ISBN : 978 -93 -84813 -93 -2 Acknowledgement The University acknow ledges with thanks the expertixe and financial support provided by Commonwealth Educational Media Centre for Asia(CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2016 © Uttarak hand Open University, 2016. Information System is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by -sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof. Ashok Panjwani, Professor, MDI, Gurgoan 3 Group Captain Ashok Katariya, Ministry of Defense, New Delhi 4 Mr. Ashutosh Bahuguna, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 5 Mr. Sani Abhilash, Scientist- CERT-In, Department Of Electronics & Information Technology, Government Of India 6 Wing Commander C.S.
    [Show full text]
  • 1 CLASSICAL CRYPTOGRAPHY COURSE by LANAKI March 10
    CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI March 10, 1996 Revision 1 COPYRIGHT 1996 ALL RIGHTS RESERVED LECTURE 9 GERMAN REDUCTION CIPHERS ENIGMA IN HISTORICAL AND MODERN TIMES SUMMARY In Lecture 9, we circumvent the schedule for another real treat - the ENIGMA cipher machine. Considering the focus of the 1995 ACA convention, several articles in CRYPTOLOGIA, a recent book by Robert Harris called " Enigma ", a Randomhouse challenge cipher contest based on the Enigma (won by several of the KREWE), many questions from my students, I thought we would address the subject of ENIGMA. I have had the pleasure to work with ESSAYONS on a project in which we looked at the security of the original Enigma D machine in terms of 1995 technology improvements. ESSAYONS has brought to light some brilliant insights. The ENIGMA 95 computer program cited in this lecture is available at the CDB. Contact NORTH DECODER for access. Students have asked 1) what is Enigma and 2) where does Enigma fit into history of radio communications in WWII? There are three pillars of radio-intelligence: direction finding, traffic analysis and deciphering. Direction finding equipment and technology is outside the scope of this course. Traffic analysis has been discussed in a previous lecture. We will quickly revisit its value and then follow Professor Jurgen Rohwer's analysis of the Atlantic Warfare to understand Enigma's position in cryptographic history. [ROHE] The Enigma machine is actually a good starting point for my discussion on polygraphic and polyalphabetic cipher analysis (originally planned for Lecture 9). We start at the endpoint of a discussion and return to the beginning to build up the cryptanalytic tools to understand the cleverness of the ENIGMA.
    [Show full text]
  • Full Article As
    This article was downloaded by: [Link, David] On: 4 April 2009 Access details: Access Details: [subscription number 910231063] Publisher Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Cryptologia Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t725304178 Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I David Link Online Publication Date: 01 April 2009 To cite this Article Link, David(2009)'Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I',Cryptologia,33:2,166 — 182 To link to this Article: DOI: 10.1080/01611190802562809 URL: http://dx.doi.org/10.1080/01611190802562809 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Cryptologia, 33:166–182, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190802562809 Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I DAVID LINK Abstract The procedure executed on the Polish Bomba Kryptologiczna is reconstructed on the basis of Marian Rejewski’s accounts and simulative experiment.
    [Show full text]
  • BRIEF HISTORY of POLISH ENIGMA MACHINE Before the War, The
    BRIEF HISTORY OF POLISH ENIGMA MACHINE Before the war, the military version of the German Enigma was derived from a commercial type, which proved difficult to sell to the public. “The Glow-Lamp” Ciphering and Deciphering Machine – Enigma, was exhibited in 1923 during The International Congress of Postal Union’ in Berlin. The Enigma machine became a major influence on the outcome of the II World War. The Americans bought the commercial version of the machine for $144, and the British (Dilly Knox) in Vienna in 1925, who brought it back to England and deposited it in the annals of the Old Admiralty Building Room 40. There it remained collecting dust on the assumption that the code was “unbreakable”. The Poles had no money, but were alert and enterprising, especially the Custom Officers at Warsaw airport, who in 1928 spotted a “special consignment” and alerted the Intelligence Security Service. Fortunately the weekend was approaching. Taking advantage of this, the chief constructing engineer Ludomir Danilewicz of the AVA radio manufacturing company in Warsaw, dismantled the Enigma machine into component parts, photographed the parts individually and together with other engineers made a precision drawings for future use. By Monday, the Enigma machine was repacked and delivered to the right recipient at the German Embassy. As expected, the Enigma machine which was fabricated became a prototype for a Polish version of the machine called Lacida. Initially it was designated for high ranking staff and was to be developed later for general use by the military during the war. According to various post war reports, Lacida was not totally reliable.
    [Show full text]
  • Post-Graduate Diploma in Cyber Security Information System (PGDCS-06)
    Post-Graduate Diploma in Cyber Security Information System (PGDCS-06) Title Information System Advisors Mr. R. Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer(Education), CEMCA Prof. Durgesh Pant, Director-SCS&IT, UOU Editor Er. Gopesh Pande, Network Engineer, Wipro Infotech, Mumbai Authors Block I> Unit I, Unit II, Unit III & Unit IV Er. Charanjeet Singh Chawla, Wing Commander, Indian Air Force, Ministry of Defence Block II> Unit I, Unit II, Unit III & Unit Er. Ashok Katariya, Group Captain, Indian IV Air Force, Ministry of Defence Block III> Unit I, Unit II, Unit III & Unit Er. Ashok Katariya, Group Captain, Indian IV Air Force, Ministry of Defence ISBN: 978-93-84813-93-2 Acknowledgement The University acknowledges with thanks the expertixe and financial support provided by Commonwealth Educational Media Centre for Asia (CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2016 © Uttarakhand Open University, 2016. Information System is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by-sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof. Ashok Panjwani, Professor, MDI, Gurgoan 3 Group Captain Ashok Katariya, Ministry of Defense, New Delhi 4 Mr. Ashutosh Bahuguna, Scientist- CERT-In, Department of Electronics & Information Technology, Government of India 5 Mr. Sani Abhilash, Scientist- CERT-In, Department of Electronics & Information Technology, Government of India 6 Wing Commander C.S.
    [Show full text]