Top Banner
Cryptographic Algorithms • Course information • General Concepts • Introductory examples • Terminology • Classical cryptography • Cryptanalysis
23

Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Cryptographic Algorithms

• Course information

• General Concepts

• Introductory examples

• Terminology

• Classical cryptography

• Cryptanalysis

Page 2: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Cryptographic goals

We want to achieve

• Confidentiality (keeping information secret)

• Integrity (preventing alterations)

• Authentication (preventing fraud)

• Non-repudiation (preventing denial of messages sent)

Page 3: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

The Importance of Cryptograpy

• Cryptographic techniques are increasingly used to enhance security in

• Data storage and communication• E-commerce• Home banking• Pay TV• Mobile phones• And a multitude of other applications

Page 4: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Course Objectives

• After this course you should• be well oriented in basic cryptographic concepts and

methods• have a sound understanding of theory and

implementation, as well as limitations and vulnerability.• be familiar with a number of examples of the use of

cryptographic tools in common software and hardware products.

• be aware of the engineering difficulties in building secure systems

Page 5: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Course Information

• Course code: CNS2-2

• Lectures and problem sessions: Jens Damgaard Andersen

• Class hours (1. period): Wednesday 13.15-17.00 and Friday 9.00-12.45

• Class hours (2. period): Friday 9.00-12.45

• Classroom: K. 2.01 (usually)

Page 6: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Course literature

• Textbook: Douglas R. Stinson: Cryptography – Theory and Practice, 3rd Edition. Chapham & Hall/CRC 2006

ISBN-10: 1-58488-508-4

ISBN-13: 978-1-58488-508-5

Additional useful resources, available on the net:Handbook of Applied cryptography, CRC Press 2002, 816 pages

Selected papers: see course home page

Page 7: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Classical Cryptography: a gentle introduction

• Model of a Cryptosystem• The Substitution cipher• The Vigenère Cipher• The Permutation Cipher• Cryptanalysis• Types of Attack• Cryptanalysis of the Substitution Cipher• Cryptanalysis of the Vigènere Cipher

Page 8: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Motivation from breaking classical ciphers

• Understanding and using redundancy and side information

• using statistics in the process of breaking ciphers

• Leading up to Shannon’s theory of perfect secrecy (next lecture)

• The notion of a one-time pad

Page 9: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Definition of a cryptosystem

A cryptosystem consists of a finite set of possible plaintexts, ciphertexts, a keyspace (a set of possible keys) and for each key there is an encryption rule and a corresponding decryption rule such that is a plaintext is encrypted with a key it can be recovered by the same (or another) key by the decryption rule.

Page 10: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Block Cipher System

• The message is a string composed of plaintext symbols

• By encryption the string is converted into a string of ciphertext symbols

• The encrypton function is injective

Page 11: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

The Shift Cipher

• The Shift Cipher uses modular arithmetic• Each of the 26 English alphabetic characters is

mapped into the integers modulo 26, i.e.

A is mapped into 0, B into 1, ...Z into 26

(see table on page 5). Encryption: A given integer is added to each value modulo 26 and the result is mapped back into characters. Exercise: Find key for example 1.

Page 12: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

The Substitution Cipher

• The 26 English characters are mapped into some permutation of the 26 characters.

• The permutation is the key (see example on page 7)

• There are 26! possible permutations, i.e.

26! possible keys

Page 13: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Ciphers not considered here

• The Affine Cipher (page 8-12)

• The Hill Cipher (page 13-19)

• The Permutation Cipher (page 19-21)

• Stream Ciphers (page 21-25)

These are outside the ”Core Curriculum”.

A listing of the core curriculum will be prepared as the course proceeds.

Page 14: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Cryptanalysis

Kerckhoffs’ principle: The adversary knows the cryptosystem being employed, so the entire security of the system resides on keeping the key secret.

Page 15: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Types of attacks

• Ciphertext only attack

• Known plaintext attack

• Chosen plaintext attack

• Chosen ciphertext attack

Page 16: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Attack models

Ciphertext only attack:

The opponent posseses a string of ciphertext y

Known plaintext attack:

The opponent posseses a string of plaintext x and the corresponding ciphertext y

Page 17: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Attack models

Chosen plaintext attack:

The opponent can choose a plaintext x and obtain the corresponding ciphertext y

Chosen ciphertext attack:

The opponent can choose a ciphertext y and obtain the corresponding plaintext x

Page 18: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Cryptanalysis using statistics

Cryptanalysis can be done using statistical properties of the English language. Tabulate frequency of occurrence of single letters, digrams and trigrams.

What is the most frequent letter in English plaintexts ? Most frequent digram, most frequent trigram ?

Page 19: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Cryptanalysis using statistics

Cryptanalysis can be done using statistical properties of the English language. Tabulate frequency of occurrence of single letters, digrams and trigrams.

See engstat.html on the homepage (when it is uploaded)

Page 20: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Useful English Language Statistics

Order and Frequency of Single Letters

E 12.31% L 4.03% B 1.62% T 9.59 D 3.65 G 1.61 A 8.05 C 3.20 V 0.93 O 7.94 U 3.10 K 0.52 N 7.19 P 2.29 Q 0.20 I 7.18 F 2.28 X 0.20 S 6.59 M 2.25 J 0.10 R 6.03 W 2.03 Z 0.09 H 5.14 Y 1.88

Page 21: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Letter Groups Percentages

A E I O U 38.58% L N R S T 33.43% J K Q X Z 1.11% E T A O N 45.08% E T A O N I S R H 70.02%

Page 22: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Order and Frequency of Leading DIGRAMS

TH 3.15% TO 1.11% SA 0.75% MA 0.56% HE 2.51 NT 1.10 HI 0.72 TA 0.56 AN 1.72 ED 1.07 LE 0.72 CE 0.55 IN 1.69 IS 1.06 SO 0.71 IC 0.55 ER 1.54 AR 1.01 AS 0.67 LL 0.55 RE 1.48 OU 0.96 NO 0.65 NA 0.54 ES 1.45 TE 0.94 NE 0.64 RO 0.54 ON 1.45 OF 0.94 EC 0.64 OT 0.53 EA 1.31 IT 0.88 IO 0.63 TT 0.53 TI 1.28 HA 0.84 RT 0.63 VE 0.53 AT 1.24 SE 0.84 CO 0.59 NS 0.51 ST 1.21 ET 0.80 BE 0.58 UR 0.49 EN 1.20 AL 0.77 DI 0.57 ME 0.48 ND 1.18 RI 0.77 LI 0.57 WH 0.48 OR 1.13 NG 0.75 RA 0.57 LY 0.47

Page 23: Cryptographic Algorithms Course information General Concepts Introductory examples Terminology Classical cryptography Cryptanalysis.

Order of Leading TRIGRAMS

THE AND THA ENT ION TIO

FOR NDE HAS NCE EDT TIS

OFT STH MEN