Cryptography – Science of Encrypting Information

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography – Science of Encrypting Information Cryptography – science of encrypting information. “scrambles” data so only authorized parties can “unscramble” and read data using two methods Can substitute – change one letter with a different letter Can transpose – scramble the order of letters, without actually changing one for another. The best cryptosystems both substitute and transpose. Dang Thanh Binh Explain general cryptography concepts Explain basic hashing concepts. Basic encryption concepts. Explain and implement protocols Explain core concepts of public key cryptography Cryptography - a method of storing and transmitting data Key space – the range of possible values used to in a form only intended for authorized parties to read or construct keys process. example: Cryptanalysis - science of studying, breaking, and if a key can be 4 digits (0-9) reverse engineering algorithms and keys. key space = 10,000 (0000 – 9999) Encryption – the method of transforming data (plaintext) if it can be 6 digits into an unreadable format. key space = 1,000,000 (000,000 – 999,999) Plain text – the format (usually readable) of data before Key Clustering – Instance when two different keys being encrypted generate the same cipher text from the same plaintext Cipher text – the “Scrambled” format of data after being Work factor – estimated time and resources to break a encrypted cryptosystem Decryption – the method of turning cipher text back into Romans used a shift cipher called a “CEASAR” cipher. plain text Shift Ciphers simply shift characters in an alphabet. Encryption algorithm – a set or rules or procedures that dictates how to encrypt and decrypt data. Also called an encryption “cipher” Key – (crypto variable) a values used in the encryption process to encrypt and decrypt Jumbles up the ordering of characters in a message. The Spartans of Greece used a form of this called the “Scytale” Cipher. Hiding one message in another “Meet the mini me that ate later.” “Meet me later.” The Vigenère cipher is named for Blaise de Vigenère, For example, suppose that the plaintext to be encrypted is: although Giovan Battista Bellaso had invented the cipher ATTACKATDAWN earlier. Vigenère did invent a stronger autokey cipher. The person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for Vigenère cipher is a method of encrypting alphabetic text example, the keyword "LEMON": LEMONLEMONLE by using a series of different Caesar ciphers based on the The first letter of the plaintext, A, is enciphered using the letters of a keyword. It is a simple form of polyalphabetic alphabet in row L, which is the first letter of the key. This is done substitution. by looking at the letter in row L and column A of the Vigenère square, namely L. The rest of the plaintext is enciphered in a This cipher is well known because while it is easy to similar fashion. understand and implement, it often appears to beginners Plaintext: ATTACKATDAWN to be unbreakable. Key:LEMONLEMONLE Ciphertext: LXFOPVEFRNHR Take the message and break it up into fixed sized blocks, encrypt each block using the given key. Often with block encryption, we include a value in addition to the key that changes for each block, so we don’t get repetitive cipher text blocks. This is called Cipher Block Chaining (see next slide) Initialization Vectors are used with the first block in CBC The “key” is used as a key stream generator, which creates a series of bits each are is mathematically combined with the bit stream of plaintext to produce cipher text. This is done for small pieces of information, or information not in blocks. Keyboard input Morse code Any input that arrives one bit or byte at a time XORing is a Boolean mathematical “function” which Cipher Text Bit Keystream Bit Output Bit creates an output bit based on two input bits. It outputs a 1 0 1 IF and ONLYif one bit of input is 1 and the other is a 0. 1 1 1 0 INPUT1 INPUT 2 XOR OUTPUT 0 1 --------------------------------------------------------------------------- 1 XOR 1 = 0 0 0 = 0 0 1 = 1 Cipher text = 0 1 0 = 1 1 1 = 0 Cipher Text Bit Keystream Bit Output Bit Cipher Text Bit Keystream Bit Output Bit 0 1 1 1 1 0 0 1 0 XOR 1 = 1 1 XOR 1 = 0 Cipher text = 0 1 Cipher text = 0 1 1 0 Cipher Text Bit Keystream Bit Output Bit Cipher Text Bit Keystream Bit Output Bit 0 1 1 1 1 XOR 0 = 1 0 XOR 1 = 1 Cipher text = 0 1 1 Cipher text =0 11 01 1011 – plain text The pad must be used only one time 0101 – pad The pad must be shared by both sides. ------ XOR The pad must be as long as the message 1110 – cipher text The pad must be securely distributed In a one time pad you use a different key/pad each time The pad must be used up of truly random values you send a message A “perfect cryptosystem” Idea same key is used to BOTH encrypt and decrypt data! Unbreakable if implemented properly The key is a series of bits (0 and 1) The plain text is converted to bits The message is XORed with the pad/key to generated the cipher text (more) Called Symmetric or “Private Key encryption” Data Encryption Standard Must securely distribute keys to both parties. Developed from at NIST request for an encryption standard Chicken in the egg situation with networks Chosen algorithm was called “Lucifer” from IBM Anyone with the key can either encrypt or decrypt Block Cipher Very Fast to encrypt or decrypt Fixed sized blocks of 64 bits Key Management is the big issue Key size 64 bits, effective size is 56 bits 16 rounds of substitution and transposition DES is no longer considered strong enough, can be broken easily with distributed computing. n: number of parties who want Nothing but DES 3 times to securely communicate 3DES – EEE3 # keys = (n*(n-1)) / 2 3DES – EDE3 5 = (5*4)/2 = 10 keys 3DES – EEE2 10 = (10*9)/2 = 45 keys 3DES – EDE2 100 = (100*99)/2 = 4950 keys 1000 = (1000*999)/2 = 499500 Since it’s 3 x DES, 48 rounds of substitution and keys transposition. Developed as a replacement to DES Block cipher based on RC5 Actual algorithm is called “Rinjdael” Same attributes as RC5 Block cipher Developed to be a AES candidate 128 bit blocks Faster that RC5 Key sizes of 128,192, 256 Rounds depend on key size 9: for 128 keys 11: for 192 keys 13: for 256 bit keys Block cipher Stream cipher – what was that again? Block size 32, 64, 128 Was proprietary, but released on Internet in 1994, “ARC4” Key Size up to 2048 bits is the “open version of RC4” Rounds up to 255, minimum of 12 recommended Key length 8 – 2048 bits Used in SSL and WEP communication Block cipher That’s Symmetric Encryption 64 bit blocks Understand the concept (shared keys) Keys 32 - 448 bits Understand it’s strengths (fast for bulk encryption and 16 rounds is the “full version” decryption) Free algorithm Understand it’s weaknesses (key management, non- repudiation) Understand the different algorithm “properties” on the slides. International Data Encryption Algorithm Non-Repudiation – being able to definitively prove Proposed AES candidate someone said or wrote something. Block cipher Proves they actually sent a message 64 bit blocks Proves the message was not altered 128 bit keys Not free, Patent expires soon though How do we provide non-repudiation? We’ll see soon after we talk about hashes, and asymmetric encryption. Used in PGP Use 2 keys, public key to encrypt a message, private key Key exchange is simple! can decrypt Asymmetric Encryption is SLOW, not suitable for encrypting large amounts of data What is a problem with Asymmetric Encryption and key exchange? (MiM) Can be used to “digitally sign” a message (in a few slides) Provides integrity Provides non-repudiation Can anyone see a use to Asymmetric encryption already?* (very important) Called Public key encryption The original Asymmetric algorithm Requires 2 related keys Used with SSL, VPNS, ssh Public key – given to anyone Used ONLY for key exchange Private key – kept secret Generates session keys for secure SYMETRIC encryption Public key is used to encrypt message communications Private key is used to decrypt message Private key is used to sign messages Public key is used to validate signed messages Can be 100 times slower than DES Encryption, key exchange or digital signatures Can be used for encryption, key exchange and digital Security based on analyzing elliptic curves in finite fields signatures Does not require much computing overhead as such used Security based on difficulty of factoring large numbers. in devices with low resources (PDAs, Cell phones etc)* Was patented, has expired Encryption or digital signatures Uses 2 keys, one for encryption, one for decryption Free This mitigates the key management, key distribution Can be used for encryption, key exchange and digital problem (kind of…) signatures Is VERY slow (orders of magnitude slower) Security based on computing discrete logarithms in a finite Can provide integrity and proof of sender (non-repudiation) field?!? Yeah.. I don’t even know what that means… time to Often used in a hybrid system (along with private key go back to math class. encryption) Slow Encrypt symmetric keys using asymmetric algorithms Based on / extended Diffie-Hellman Actually do large scale encryption with these asymmetric keys! Hashing is similar to encryption… but different. Once hashed, no way to get Hashing is a one way operation. back the original message Take input message Hash digests are fixed, so multiple messages theoretically Put through hashing function could produce the same hash Retrieve fixed length value (hash digest) digest (collision) oh… no..
Recommended publications
  • Simple Substitution Cipher Evelyn Guo
    Simple Substitution Cipher Evelyn Guo Topic: Data Frequency Analysis, Logic Curriculum Competencies: • Develop thinking strategies to solve puzzles and play games • Think creatively and with curiosity and wonder when exploring problems • Apply flexible and strategic approaches to solve problems • Solve problems with persistence and a positive disposition Grade Levels: G3 - G12 Resource: University of Cambridge Millennium Mathematics Project - NRICH https://nrich.maths.org/4957 Cipher Challenge Toolkit https://nrich.maths.org/7983 Practical Cryptography website http://practicalcryptography.com/ciphers/classical-era/simple- substitution/ Materials: Ipad and Laptop which could run excel spreadsheet. Flip Chart with tips and hints for different levels of players Booklet flyers for anyone taking home. Printed coded message and work sheet (help sheet) with plain alphabet and cipher alphabet (leave blank) Pencils Extension: • Depends on individual player’s interest and math abilities, introduce easier (Atbash Cipher, Caesar Cipher) or harder ways ( AutoKey Cipher) to encrypt messages. • Introduce students how to use the practical cryptography website to create their own encrypted message instantly. • Allow players create their own cipher method. • Understand in any language some letters tend to appear more often than other letters Activity Sheet for Substitution Cipher Opening Question: Which Letters do you think are the most common in English? Start by performing a frequency analysis on some selected text to see which letters appear most often. It is better to use longer texts, as a short text might have an unusual distribution of letters, like the "quick brown fox jumps over the lazy dog" Introduce the Problem: In the coded text attached, every letter in the original message was switched with another letter.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Decrypt Cryptotexts: GBLVMUB JOGPSNBUJLZ VMNIR RPNBMZ EBMFLP OFABKEFT Decrypt: VHFUHW GH GHXA VHFUHW GH GLHX, VHFUHW GH WURLV VH
    PROLOGUE - I. Decrypt cryptotexts: Part IV GBLVMUB JOGPSNBUJLZ Secret-key cryptosystems VMNIR RPNBMZ EBMFLP OFABKEFT prof. Jozef Gruska IV054 4. Secret-key cryptosystems 2/99 PROLOGUE - II. CHAPTER 4: SECRET-KEY (SYMMETRIC) CRYPTOGRAPHY Decrypt: In this chapter we deal with some of the very old, or quite old, classical (secret-key or symmetric) cryptosystems and their cryptanalysis that were primarily used in the pre-computer era. VHFUHW GH GHXA These cryptosystems are too weak nowadays, too easy to break, especially VHFUHW GH GLHX, with computers. However, these simple cryptosystems give a good illustration of several of the VHFUHW GH WURLV important ideas of the cryptography and cryptanalysis. Moreover, most of them can be very useful in combination with more modern VHFUHW GH WRXV. cryptosystem - to add a new level of security. prof. Jozef Gruska IV054 4. Secret-key cryptosystems 3/99 prof. Jozef Gruska IV054 4. Secret-key cryptosystems 4/99 BASICS CRYPTOLOGY - HISTORY + APPLICATIONS Cryptology (= cryptography + cryptanalysis) has more than four thousand years long history. Some historical observation People have always had fascination with keeping information away from others. Some people – rulers, diplomats, military people, businessmen – have always had needs to keep some information away from others. BASICS Importance of cryptography nowadays Applications: cryptography is the key tool to make modern information transmission secure, and to create secure information society. Foundations: cryptography gave rise to several new key concepts of the foundation of informatics: one-way functions, computationally perfect pseudorandom generators, zero-knowledge proofs, holographic proofs, program self-testing and self-correcting, . prof. Jozef Gruska IV054 4. Secret-key cryptosystems 5/99 prof.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Traditional Symmetric-Key Ciphers
    Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel is called the ciphertext. To create the ciphertext from the plaintext, Alice uses an encryption algorithm and a shared secret key. To create the plaintext from ciphertext, Bob uses a decryption algorithm and the same secret key. If P is the plaintext, C is the ciphertext, and K is the key, We assume that Bob creates P1; we prove that P1 = P: Locking and unlocking with the same key Kerckhoff’s Principle Based on Kerckhoff’s principle, one should always assume that the adversary, Eve, knows the encryption/decryption algorithm. The resistance of the cipher to attack must be based only on the secrecy of the key. Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. Cryptanalysis attacks Ciphertext-Only Attack Ciphertext-only attack Known-Plaintext Attack Known-plaintext attack Chosen-Plaintext Attack Chosen-plaintext attack Chosen-Ciphertext Attack Chosen-ciphertext attack SUBSTITUTION CIPHERS A substitution cipher replaces one symbol with another. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Note A substitution cipher replaces one symbol with another. 1 Monoalphabetic Ciphres 2 Polyalphabetic Ciphers Monoalphabetic Ciphers Note In monoalphabetic substitution, the relationship between a symbol in the plaintext to a symbol in the ciphertext is always one-to-one. Example The following shows a plaintext and its corresponding ciphertext.
    [Show full text]
  • 2.4 the Autokey Cipher and Cribs
    Jay Daigle Occidental College Math 400: Cryptology 2.4 The Autokey cipher and cribs 2.4.1 Using a crib One common tool in cryptanalysis is a crib, which is a known or guessed bit of plaintext corresponding to a ciphertext. (The term comes from the phrase \to crib notes" or \to crib an answer", meaning to copy or cheat on an assignment). Often a crib can be used to dramatically simplify cryptanalysis. (In fact, frequency analysis is essentially an attempt to imitate a crib). Cribs were famously used in Bletchley Park during World War II (where the term was coined). Many German Enigma operators used standardized terminology, including the reg- ular use of the word Wetter (\weather") in weather reports, and one operator who repeatedly transmitted the message \Nothing to report". Enigma operators were required to spell out all numbers, so Turing determined that the single most common word in messages was eins, meaning \one". Turing precomputed a catalog of what eins would look like encrypted in every possible position with various keys, which dramatically sped up decryption processes by seeing which of those were possible and judging them most likely. You will notice that this is basically the same idea as frequency analysis: instead of taking common letters, we instead look for common words. eins was not enough to break messages on its own, but it could give substantial speedups and hints for other encryption messages. 2.4.2 Breaking the Autokey cipher Cribs are an especially powerful tool in breaking the Autokey cipher, since the plaintext is also most of the keystream.
    [Show full text]
  • Finishing Polyalphabetics & Demonstrating Transpositions
    Finishing polyalphabetics & demonstrating transpositions Recorded lecture for 4/6/20 CS 330 Polyalphabetics & Transpositions HW is out • Due Wednesday night • Write C program to count letter frequencies in English text (ciphertext or plaintext) CS 330 Polyalphabetics & Transpositions Recall: Vigenère Cipher • write the keyword repeatedly (identifies column) • write the plaintext out (identifies row) • Encrypt each letter by writing the value at that row and column key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ CS 330 Polyalphabetics & Transpositions Recall: Finding the key length using sorted frequencies CS 330 Polyalphabetics & Transpositions 51 CS 330 Polyalphabetics & Transpositions 52 Finding the key length, Part two • we can quantify this by noticing that the best coset signature curves are generally those that are as low as possible on the left and as high as possible on the right. • we can measure this tendency by finding the difference between the area under the curve for the top half (from 14 to 26), minus the area of the curve for the bottom half (from 1 to 13), called Vj CS 330 Polyalphabetics & Transpositions 53 Finding the key length, Part two • The average (Ai) of these differences for all the cosets for a suggested key length L, gives us a value which measures how close we are to the signature of English. • The local maximum of these values for all numbers of coset values is the likely key length. CS 330 Polyalphabetics & Transpositions 54 Algorithm for finding key length: 1. read in the text and the maximum key length to try 2. for every L from 1 to the max key length do 3.
    [Show full text]
  • Substitution Cipher in Cryptography, a Substitution Cipher Is a Method Of
    Substitution cipher In cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution. Substitution ciphers can be compared with transposition ciphers. In a transposition cipher, the units of the plaintext are rearranged in a different and usually quite complex order, but the units themselves are left unchanged. By contrast, in a substitution cipher, the units of the plaintext are retained in the same sequence in the ciphertext, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. A monoalphabetic cipher uses fixed substitution over the entire message, whereas a polyalphabetic cipher uses a number of substitutions at different times in the message, where a unit from the plaintext is mapped to one of several possibilities in the ciphertext and vice-versa. Contents • 1 Simple substitution o 1.1 Examples o 1.2 Security for simple substitution ciphers • 2 Homophonic substitution • 3 Polyalphabetic substitution • 4 Polygraphic substitution • 5 Mechanical substitution ciphers • 6 The one-time pad • 7 Substitution in modern cryptography • 8 Substitution ciphers in popular culture Simple substitution 1 ROT13 is a Caesar cipher, a type of substitution cipher. In ROT13, the alphabet is rotated 13 steps.
    [Show full text]
  • Web Technologies Hari Kharel 40312824
    Web Technologies Hari Kharel 40312824 Web Technologies Hari Kharel – 40312824 COURSEWORK 1 – DESIGNING A WEBSITE WHICH ENCODES AND DECODES CIPHERS Web Technologies Hari Kharel 40312824 Web Technologies Hari Kharel 40312824 Contents Introduction .................................................................................................................................................. 3 Overview ................................................................................................................................................... 3 Choice of Ciphers ...................................................................................................................................... 3 SOFTWARE DESIGN ........................................................................................................................................... 4 Cipher Page Design ................................................................................................................................... 4 Game Page Design .................................................................................................................................... 5 Implementation ............................................................................................................................................ 6 Cipher Implementation ............................................................................................................................. 6 Game Implementation .............................................................................................................................
    [Show full text]
  • A Methodology for the Cryptanalysis of Classical Ciphers with Search
    phers with Search Metaheuristics George Lasry A Methodology for the Cryptanalysis of A Methodology for the Cryptanalysis of Classical Ci Classical Ciphers with Search Metaheuristics ISBN 978-3-7376-0458-1 kassel university 9 783737 604581 George Lasry press kassel kassel university press !"# $ % !&' (&)) )*) # + ,)&) - .# +,)/ & + 0123405 / ! & ' & ' & ' 6 # 7 + ))) 8)+$ 9"#)9& )3405 7/':5;.<.5<51.4=>;.0(* 7/':5;.<.5<51.4=>:.;(.* &27++ ?)! ) 04)0:300 $",:5;<5<514=>:; "@'++ . #) +++4443.=4=>:3 '340;9 # !B9$ ) ). ) ,! “After climbing a great hill, one only finds that there are many more hills to climb.” Nelson Mandela Abstract Cryptography, the art and science of creating secret codes, and cryptanalysis, the art and science of breaking secret codes, underwent a similar and parallel course during history. Both fields evolved from manual encryption methods and manual codebreaking techniques, to cipher ma- chines and codebreaking machines in the first half of the 20th century, and finally to computer- based encryption and cryptanalysis from the second half of the 20th century. However, despite the advent of modern computing technology, some of the more challenging classical cipher systems and machines have not yet been successfully cryptanalyzed. For others, cryptanalytic methods exist, but only for special and advantageous cases, such as when large amounts of ciphertext are available. Starting from the 1990s, local search metaheuristics such as hill climbing, genetic algorithms, and simulated annealing have been employed, and in some cases, successfully, for the cryptanal- ysis of several classical ciphers. In most cases, however, results were mixed, and the application of such methods rather limited in their scope and performance. In this work, a robust framework and methodology for the cryptanalysis of classical ciphers using local search metaheuristics, mainly hill climbing and simulated annealing, is described.
    [Show full text]
  • Introduction to Cryptography - 1 CSC4601 F04 Overviewoverview
    IntroductionIntroduction toto CryptographyCryptography Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_04/ Louisiana State University 5- Introduction to Cryptography - 1 CSC4601 F04 OverviewOverview Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 2 CSC4601 F04 CommunicationCommunication SecrecySecrecy The history of codes and ciphers is the story of centuries-old battle between codemakers and codebreakers Evolution of codes. Always under attack from codebreakers. Analogous to the situation of a strain of infectious bacteria under the attack of antibiotics Technologies involved from mathematics to linguistics, from information theory to quantum theory Louisiana State University 5- Introduction to Cryptography - 3 CSC4601 F04 TheThe EvolutionEvolution ofof SecretSecret WritingWriting In The histories, Herodotus, “the father of history”, chronicled the conflicts between Greece and Persia in the fifth century B.C. The art of secret writing saved the Greece Demaratus send information to Greece about Persian preparation using secret messages: scraping the wax off a pair of wooden folding tablets, writing on the wood underneath and then covering the message with wax again. Herodotus chronicled also the story of Histaiaeus who wanted to encaurage Aristagoras of Miletus to revolt against Persians To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to grow. It seems this period of history tolerated a certain lack of urgency. Hiding a message is known as steganography derived from the Greek word steganos meaning “covered” and graphein–“to write”.
    [Show full text]
  • Cryptography
    Cryptography BMEVITMAV52 Information and Network Security [email protected] Cryptography • Cryptography – Greek word: secret writing • The encrypted message is visible, but the meaning is unknown • Basic notations – Plaintext (P) – Ciphertext (C) – Key (K) – Encryption: C = E(P, K) – Decryption: P = D(C, K) 2018/19-1 Information and Network Security 2 Steganography • Steganography – Greek word: covert writing • The “encrypted” message is invisible • First steganography – Based on Herodotus notes (~400 BC) • Demeratus: Message under the clay tables, information about military movements • Histiaeus: Message under the hair of a servant – Pliny the Elder (roman empire) • Invisible ink (milk of the thithymallus plant), message between the rows 2018/19-1 Information and Network Security 3 Cryptanalysis • To get the key – Known plaintext • Some parts of the text (P1) and its secret form (C1) is known by the attacker • E.g.: ZIP archives with known files – Ciphertext only attack • Only the secret form of the message is known. • Usually this is the case – Brute force – dictionary – smart force attacks • Testing the keys • Rainbow tables – Side channel attack • Attack on the implementation (not on theory) • E.g. RSA attacks • To get the message without the key • Modify message without the key 2018/19-1 Information and Network Security 4 Security, obscurity, design • Security by obscurity – The encryption method is not publicly known. It is a secret of the inventors – May contain design errors – May result severe errors when the method is discovered by others • Security by design – The encryption method is well known by the public. (OPEN) The key s the only secret – The method is investigated by many cryptanalyst • Kerckhoffs' principle and Shannon's maxim – The enemy knows the system (but not the key) 2018/19-1 Information and Network Security 5 History of cryptography Classic encryption • ~ 2500 BC – Mystic hieroglyphs in Egypt.
    [Show full text]