Top Banner
National Security and Cryptography Jude Vanover and Justin Jude Vanover and Justin Gross Gross
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: National Security and Cryptography Jude Vanover and Justin Gross.

National Security and Cryptography

Jude Vanover and Justin GrossJude Vanover and Justin Gross

Page 2: National Security and Cryptography Jude Vanover and Justin Gross.

Overview

WWII and the use of machine ciphers and WWII and the use of machine ciphers and its following mathematical encryption its following mathematical encryption techniquestechniques

Development of NSADevelopment of NSA Current issues in National SecurityCurrent issues in National Security Terrorist cryptographyTerrorist cryptography Concluding RemarksConcluding Remarks

Page 3: National Security and Cryptography Jude Vanover and Justin Gross.

WWII Cryptography

From the Allied Point of View cryptosystems From the Allied Point of View cryptosystems were divided into two stageswere divided into two stages

I. European (aka. German)I. European (aka. German)

II. Pacific (aka. Japan)II. Pacific (aka. Japan) Each Stage Provided different challenges to Each Stage Provided different challenges to

national securitynational security The beginning of modern day cryptosystems and The beginning of modern day cryptosystems and

National Security techniquesNational Security techniques

Page 4: National Security and Cryptography Jude Vanover and Justin Gross.

Pacific Stage for WWII Crypt..

Japan used many systems including Orange, Red, and Japan used many systems including Orange, Red, and Purple Machines.Purple Machines.

These machines were complicated and difficult to crackThese machines were complicated and difficult to crack All were eventually cracked by allied forcesAll were eventually cracked by allied forces Pearl Harbor was a result of inability to decipher Purple Pearl Harbor was a result of inability to decipher Purple

code at the timecode at the time After Pearl Harbor and the decipher of Purple, Japan After Pearl Harbor and the decipher of Purple, Japan

switched to JN25switched to JN25 Eventually JN25 was broken which aid greatly in the Eventually JN25 was broken which aid greatly in the

victory at Midwayvictory at Midway

Page 5: National Security and Cryptography Jude Vanover and Justin Gross.

European Stage for WWII Cryptography Nazi Germany and its Nazi Germany and its

machine cipher the machine cipher the EnigmaEnigma

The entire German The entire German Army, Navy, and Army, Navy, and Airforce based its Airforce based its communication on the communication on the devicedevice

Page 6: National Security and Cryptography Jude Vanover and Justin Gross.

Technical Details on the Enigma I

A complex Machine CipherA complex Machine Cipher Revised many times to make it more secureRevised many times to make it more secure Based on the linguistic technique of Based on the linguistic technique of transliterationtransliteration in which each in which each

letter entered corresponded to a different letter of the of the letter entered corresponded to a different letter of the of the alphabet when encodedalphabet when encoded

Easily solved by letter frequency, however……Easily solved by letter frequency, however……

Page 7: National Security and Cryptography Jude Vanover and Justin Gross.

Technical Details on the EnigmaII

Changed the correspondence between each letter by means of a series Changed the correspondence between each letter by means of a series of rotating gears called rotorsof rotating gears called rotors

The Germans made the machine more complicated by adding more The Germans made the machine more complicated by adding more rotorsrotors, 5 by the wars end. , 5 by the wars end.

Looked a great deal like a typewriterLooked a great deal like a typewriter Allowed for Encryption and Decryption on the same machine settings Allowed for Encryption and Decryption on the same machine settings

because the final rotor in the series was reciprocal or reflectivebecause the final rotor in the series was reciprocal or reflective Thus if E is the Encryption function then E(x) = cipher text, Thus if E is the Encryption function then E(x) = cipher text,

then E(cipher) = x…or E(E(x)) = xthen E(cipher) = x…or E(E(x)) = x 26 contacts per side of each rotor and each key entered stepped the 26 contacts per side of each rotor and each key entered stepped the

rightmost rotor to the left one step. For that rotor out, the stepping was rightmost rotor to the left one step. For that rotor out, the stepping was exactly like a car odometer. exactly like a car odometer.

Each Day began with a specified starting position to the rotorsEach Day began with a specified starting position to the rotors

Page 8: National Security and Cryptography Jude Vanover and Justin Gross.

3 Rotor Enigma Example

Page 9: National Security and Cryptography Jude Vanover and Justin Gross.

Other details on Enigma

Theoretically impossible to crack with Theoretically impossible to crack with 150,000,000,000,000 starting states that move as messages 150,000,000,000,000 starting states that move as messages are encoded and decodedare encoded and decoded

Problems arose because the starting positions were Problems arose because the starting positions were transmitted twice at the beginning of each repetition. This transmitted twice at the beginning of each repetition. This narrowed starting positions down.narrowed starting positions down.

Eventually Enigma machines were obtained from U-Boats Eventually Enigma machines were obtained from U-Boats and other sources, analyzed, and cracked using and other sources, analyzed, and cracked using BombeBombe. .

Bombe Bombe was a machine that iterated through the possible was a machine that iterated through the possible starting positions of the Enigma in order to find the correct starting positions of the Enigma in order to find the correct position to decode.position to decode.

Page 10: National Security and Cryptography Jude Vanover and Justin Gross.

WWII Cryptography

Knowing information means saving lives, Knowing information means saving lives, keeping information may cost lives. This is keeping information may cost lives. This is the core principle of National Securitythe core principle of National Security

Core principle of crytographyCore principle of crytography Development of N.S.A.Development of N.S.A.

Page 11: National Security and Cryptography Jude Vanover and Justin Gross.

National Security Agency

Coordinates, directs, and performs highly Coordinates, directs, and performs highly specialized activities to protect U.S. specialized activities to protect U.S. information systems and produce foreign information systems and produce foreign intelligenceintelligence

Signals Intelligence (SIGINT)- believed to Signals Intelligence (SIGINT)- believed to have directly contributed to shortening have directly contributed to shortening WWII by one yearWWII by one year

Page 12: National Security and Cryptography Jude Vanover and Justin Gross.

National Security Agency

Interest in cryptanalytic research led to first Interest in cryptanalytic research led to first large-scale computer and first solid state large-scale computer and first solid state computercomputer

Pioneered efforts in flexible storage which Pioneered efforts in flexible storage which led to development of tape cassetteled to development of tape cassette

Largest employer of mathematicians in the Largest employer of mathematicians in the U.S. and perhaps the worldU.S. and perhaps the world

Page 13: National Security and Cryptography Jude Vanover and Justin Gross.

Current issues in National Security Unbreakable encryption may not be good Unbreakable encryption may not be good

for everyonefor everyone Criminal OpportunistsCriminal Opportunists Compromising national security or Compromising national security or

protecting individual freedoms?protecting individual freedoms?

Page 14: National Security and Cryptography Jude Vanover and Justin Gross.

Current issues in National Security British Solution to information monitoringBritish Solution to information monitoring The Clipper Chip and Key EscrowThe Clipper Chip and Key Escrow

Page 15: National Security and Cryptography Jude Vanover and Justin Gross.

The Clipper Chip

This is an public encryption technique using chips in communication This is an public encryption technique using chips in communication devicesdevices

Uses the SKIPJACK algorithmUses the SKIPJACK algorithm Proposed in 1993 by the US GovtProposed in 1993 by the US Govt Basically a wire tap in all communication devices - telephones, Basically a wire tap in all communication devices - telephones,

computers, et..computers, et.. It allows the Govt to decode information at anytime time it deems It allows the Govt to decode information at anytime time it deems

necessary because they have all the keys (key escrow)necessary because they have all the keys (key escrow) Provides a basis for the Govt to monitor criminal activities especially Provides a basis for the Govt to monitor criminal activities especially

terrorismterrorism

Page 16: National Security and Cryptography Jude Vanover and Justin Gross.

Key Escrow: The Master Key

EES – Escrowed Encryption System is a EES – Escrowed Encryption System is a cryptosystem developed by the NSA that is certified cryptosystem developed by the NSA that is certified secure and is willing to share with the publicsecure and is willing to share with the public

Using things such as Clipper chip it gives the Govt Using things such as Clipper chip it gives the Govt access to all encoded information to prevent misuseaccess to all encoded information to prevent misuse

Basically a huge library of everyone’s public and Basically a huge library of everyone’s public and private keysprivate keys

Know as Public Key Infrastructure (PKI) or Know as Public Key Infrastructure (PKI) or Certification Authority (CA)Certification Authority (CA)

Very large Privacy IssuesVery large Privacy Issues

Page 17: National Security and Cryptography Jude Vanover and Justin Gross.

Current issues in National Security Laws and regulations protecting U.S. Laws and regulations protecting U.S.

citizenscitizens Bending the RulesBending the Rules A “K” exampleA “K” example

Page 18: National Security and Cryptography Jude Vanover and Justin Gross.

Terrorist Cryptography

Steganography- Hiding information in Steganography- Hiding information in picturespictures

Using encryption downloaded from the net, Using encryption downloaded from the net, developed by people trying to protect civil developed by people trying to protect civil liberties liberties

Page 19: National Security and Cryptography Jude Vanover and Justin Gross.

Steganography

Steganography is the art and science of Steganography is the art and science of hiding the fact that communication is taking hiding the fact that communication is taking placeplace

Digital files like photographs or music files Digital files like photographs or music files can be slightly and still look or sound the can be slightly and still look or sound the samesame

Page 20: National Security and Cryptography Jude Vanover and Justin Gross.

Steganography

How it works:How it works: A picture is created by a series of dotsA picture is created by a series of dots Inside each dot is a string of letters and Inside each dot is a string of letters and

numbers that computers read to create the numbers that computers read to create the imageimage

A coded message or another image can A coded message or another image can be hidden in those letters and numbersbe hidden in those letters and numbers

Page 21: National Security and Cryptography Jude Vanover and Justin Gross.

Steganography

How to detect a hidden image or text in a How to detect a hidden image or text in a picturepicture Modification of redundant bits replace Modification of redundant bits replace

with message change the statistical with message change the statistical properties of the cover mediumproperties of the cover medium

Statistical analysis may reveal hidden Statistical analysis may reveal hidden content, check to see if image deviates content, check to see if image deviates from the normfrom the norm

Page 22: National Security and Cryptography Jude Vanover and Justin Gross.

Tough to Break

Encrypted files found on Ramzi Yousef’s Encrypted files found on Ramzi Yousef’s computer took over one year to decryptcomputer took over one year to decrypt

Page 23: National Security and Cryptography Jude Vanover and Justin Gross.

Concluding Remarks

Keeping information secure is vital both in Keeping information secure is vital both in the private sector and the government sectorthe private sector and the government sector

Page 24: National Security and Cryptography Jude Vanover and Justin Gross.

Concluding Remarks

Mixed Feelings on Clipper Chip and Key Mixed Feelings on Clipper Chip and Key EscrowEscrow Makes encryption expensive for Makes encryption expensive for

criminalscriminals Makes encryption cheap and safe for Makes encryption cheap and safe for

private sectorprivate sector Integrating “Big Brother” ?Integrating “Big Brother” ?