Top Banner
CRYPTOGRAPHY Henry Osborne Technology Specialist Northern Caribbean University
22

Cryptography

May 24, 2015

Download

Education

Henry Osborne

Introduction to Cryptography presentation used for CTT+ video exam....
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography

CRYPTOGRAPHY

Henry OsborneTechnology SpecialistNorthern Caribbean University

Page 2: Cryptography

04/12/2023 2Henry Osborne

Presenter Profile Education

Dip. Applied Computer Science, Jamaica Advanced Computer Systems

B.Sc. Information Science, Northern Caribbean University

M.Sc. Management Information System (Security Concentration), Nova Southeastern University – candidate

Security+ candidate

Professional Experience Technology Specialist: Dept. of Computer & Information Sciences

(NCU)

Instructor: NCU, VTDI

Internet Services Coordinator: Round Hill Hotel & Villas

Page 3: Cryptography

04/12/2023 3Henry Osborne

Outline

What is cryptography? Terminology Cipher Methods

Substitution Cipher Transposition Cipher Exclusive OR Vernam Cipher

Page 4: Cryptography

04/12/2023 4Henry Osborne

What is Cryptography?

Page 5: Cryptography

04/12/2023 5Henry Osborne

Cryptography, which comes from the Greek words kryptos, meaning “hidden,” and graphein, meaning “to write,” is the process of making and using codes to secure the transmission of information.

Page 6: Cryptography

04/12/2023 6Henry Osborne

Yet it may roundly be asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.

EDGAR ALLAN POE, THE GOLD BUG

Page 7: Cryptography

04/12/2023 7Henry Osborne

Terminology Algorithm Cipher or Crypotosystem Ciphertext or Cryptogram Code Decode Decipher Encipher

Key or Cryptovariable Keyspace Link Encryption Plaintext or Cleartext Steganography Work factor

Page 8: Cryptography

04/12/2023 8Henry Osborne

Cipher MethodsImage source: howstuffworks

Page 9: Cryptography

04/12/2023 9Henry Osborne

Answer: WELCOMEImage source: Gareth’s Secret Spy Academy

Page 10: Cryptography

04/12/2023 10Henry Osborne

Cipher Method: Substitution

Initial Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y ZEncryption Alphabet D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

Plaintext M O M

Ciphertext P R P

This type of substitution is based on a monoalphabetic substitution, because it only uses one alphabet.

Page 11: Cryptography

04/12/2023 11Henry Osborne

Substitution Cipher cont’d

Initial Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y ZEncryption Alphabet D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

Plaintext F A C E

Ciphertext I D F H

Page 12: Cryptography

04/12/2023 12Henry Osborne

Substitution Cipher cont’dPlaintext A B C D E F G H I J K L M N O P Q R S T U V W X Y ZCipher 1 D E F G H I J K L M N O P Q R S T U V W X Y Z A B CCipher 2 G H I J K L M N O P Q R S T U V W X Y Z A B C D E FCipher 3 J K L M N O P Q R S T U V W X Y Z A B C D E F G H ICipher 4 M N O P Q R S T U V W X Y Z A B C D E F G H I J K L

Plaintext T E X TCiphertext W K G F

More advanced substitution ciphers use two or more alphabets, and are referred to as polyalphabetic substitutions.

Page 13: Cryptography

04/12/2023 13Henry Osborne

Substitution Cipher cont’d

Plaintext P AS S C T T

Plaintext A B C D E F G H I J K L MN O P Q R S T U V WX Y ZCipher 1 D E F G H I J K L MN O P Q R S T U V WX Y Z A B CCipher 2 G H I J K L MN O P Q R S T U V WX Y Z A B C D E FCipher 3 J K L M N O P Q R S T U V WX Y Z A B C D E F G H ICipher 4 M N O P Q R S T U V WX Y Z A B C D E F G H I J K L

Ciphertext S GB E F Z C

Page 14: Cryptography

04/12/2023 14Henry Osborne

Cipher Method: Transposition

Page 15: Cryptography

04/12/2023 15Henry Osborne

Transposition Cipher cont’d

Key pattern: 1 -> 4, 2 -> 8, 3 -> 1, 4 -> 5, 5 -> 7, 6 -> 2, 7 -> 6, 8 -> 3

Plaintext: 00100101 01101011 10010101 01010100

Bit Locations 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1

Plaintext 0 0 1 0 0 1 0 1 0 1 1 0 1 0 1 1 1 0 0 1 0 1 0 1 0 1 0 1 0 1 0 0

Ciphertext 0 0 0 0 1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 1 0 1 1 0 0 0 0 1

Reading from right to left in the example above

Page 16: Cryptography

04/12/2023 16Henry Osborne

Transposition Cipher cont’d

Key pattern: 1 -> 4, 2 -> 8, 3 -> 1, 4 -> 5, 5 -> 7, 6 -> 2, 7 -> 6, 8 -> 3

Plaintext: “SACK GAUL SPARE NO ONE”

Bit Locations 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1 8 7 6 5 4 3 2 1

Plaintext S A C K G A U L S P A R E N O O N E

Ciphertext U K A G L S C A O R P E O S A N E N

Page 17: Cryptography

04/12/2023 17Henry Osborne

Question

What’s another name for the Transposition Cipher?

A.Pigpen CipherB. Permutation CipherC. Caesar CipherD.Shift Cipher

Page 18: Cryptography

04/12/2023 18Henry Osborne

Cipher Method: XOR

Text Value Binary Value

CAT as bits 01000011 01000001 01010100

VVV as bits 01010110 01010110 01010110

Cipher 00010101 00010111 00000010

A B Y

0 0 0

0 1 1

1 0 1

1 1 0

XOR Truth Table Example XOR Encryption

Page 19: Cryptography

04/12/2023 19Henry Osborne

Vernam Cipher

A RUSSIAN ONE-TIME PAD, CAPTURED BY MI5

Also known as One-time Pad

Developed by Gilbert Vernam (AT&T engineer) in 1917

Uses a set of characters only one time for each encryption process

To use a one-time pad, you need 2 copies of the "pad" which is a block of random data equal in length to the message you wish to encode.

Image source: http://www.ranum.com/security/computer_security/papers/otp-faq/otp.jpg

Page 20: Cryptography

04/12/2023 20Henry Osborne

Vernam Cipher: Example

Plaintext S A C K G A U L S P A R E N O O N EPlaintext value: 19 01 03 11 07 01 21 12 19 16 01 18 05 14 15 15 14 05

One-time pad text: F P Q R N S B I E H T Z L A C D G J

One-time pad value: 06 16 17 18 14 19 02 09 05 08 20 26 12 01 03 04 07 10

Sum of plaintext and pad:

25 17 20 29 21 20 23 21 24 24 21 44 17 15 18 19 21 15

After modulo subtraction:

03 18

Ciphertext: Y Q T C U T W U X X U R Q O R S U O

Page 21: Cryptography

04/12/2023 21Henry Osborne

Summary What is cryptography?

Cryptography is the process of making and using codes to secure the transmission of information.

Key Terms Ciphertext, Plaintext, Key, etc

Cipher Methods Substitution Cipher Transposition Cipher (or permutation cipher) Exclusive OR Vernam Cipher

Page 22: Cryptography

[email protected] gplus.to/sicarii13@sicarii13

Henry OsborneTechnology Specialist

Northern Caribbean University963-7282