SlideShare a Scribd company logo
1 of 19
Cryptography 101
What is Cryptography?
Encryption is the process of:
1.Transforming data (x)
2.Using an algorithm (e)
3.To make it unreadable to anyone (y)
4.except those possessing the key. (k)
K={k1,…,kn}
The Quick Brown Fox
Me (mod N) where M=The Quick Brown Fox
Uif Rvjdl Cspxo Gpy
Kerchhoffs’ principle: A cryptosystem should be secure even if the
Attacker knows all the details about the system, with the exception of
The key.
We shall extend the empire of Persia such that its boundaries
will be God's own sky, so the sun will not look down upon
any land beyond the boundaries of what is our own
-Xerxes (Ahasuerus) ~450 B.C.
(Spartan) Scytale
Rail Fence Cipher
Route Cipher
Transposition Ciphers
The Quick Brown Fox
GSV JFRXP YILDM ULC
Substitution Ciphers
The Quick Brown Fox
ZIT JXOEA WKGVF YGB
Shift Cipher (Caesar)
The Quick Brown Fox
SGD PTHBJ AQNVM ENW
At-Bash
Modular ciphers
a = r mod m
42 = 9*4 + 6
r = a – m*q
42 = 6 mod 9
42 = q*9 + 6
6 = 42 – q*9
q = 0, r = 42
q = 1, r = 33
q = 2, r = 24
q = 3, r = 15
q = 4, r = 6 (0<q<m-1)
q = 5, r = -3
q = 6, r = -12
12 + 7 = 19 => 1 mod 9
14 – 2 = 12 => 3 mod 9
11 * 8 = 88 => 7 mod 9
15/5 = 3 !=> 3 mod 9
If the multiplicative inverse exists for a number
then we can divide by that number
5*2=10 => 1 mod 9
2 is the multiplicative inverse of 5 (and vice versa)
15*2 = 30 => 3 mod 9
If x is coprime with modulus then it has an inverse.
Caesar Cipher
Encryption: ek (x) = x + k mod 26
Decryption: ek (y) = y – k mod 26
The quick brown fox
k=3
t=20, 20 + 3 = 23 mod 26
h=8, 8 + 3 = 11 mod 26
e=5, 5 + 3 = 8 mod 26
Affine Cipher k=(a,b)
Encryption: ek (x) = a*x + b mod 26
Decryption: ek (y) = a-1 * (y – b) mod 26
The quick brown fox
k=(5, 3)
t=20, 5*20 + 3 = 103 = 25 mod 26
h=8, 5*8 + 3 = 43 = 17 mod 26
e=5, 5*5 + 3 = 28 = 2 mod 26
21 * 5 = 105 = 1 mod 26
21 * 25-3 = 462 = 20 mod 26
21 * 17-3 = 294 = 8 mod 26
21 * 2-3 = -21 = 5 mod 26
Brute-Force Attacks
Given: y = SGD PTHBJ AQNVM ENW
Keyspace = {1,…,25}
Decryption : ki(y) =? x
Abu Yūsuf Yaʻqūb ibn ʼIsḥāq
aṣ-Ṣabbāḥ al-Kindī 850 C.E.
Cryptanalysis
Letter Frequency Short word and letter combinations
the
be
to
of
and
that
have
for
not
http://www.richkni.co.uk/php/crypta/
Normal English letter frequency
Ciphertext letter frequency
Vigenère cipher
A polyalphabetic cipher
Key = KING
The sun and the man in the moon
Dpr yev ntn buk wia ox buk wwbt
4 possible ways to spell the word “the”
K – DPR I - BUK
N – GNO G - ZRM
http://www.simonsingh.net/The_Black_Chamber/vigenere_cracking_tool.html
http://sharkysoft.com/vigenere/
Enigma
http://cryptoclub.math.uic.edu/shiftcipher/shiftcipher.php
http://enigma.louisedade.co.uk/enigma.html
AXP AVC .. IOV NKZ .. HSA PYT .. PPZ LEX
FZD YQO .. IZL NQL .. NNQ CMA .. GUH BIS
FGT YHD .. KDY GNV .. NBJ COQ .. GOI BKK
MIW MRI .. VWG EZG .. SYX SJB .. TVB KFM
DJG UDG .. OJN QDE .. SNH SMS .. TLI KPK
LNK TMF .. ZAO RXJ .. SXV SVZ .. TYO KJJ
XKN JAE .. CTL OUL .. ERS XWU .. WHJ WBQ
BHG DBG .. CMM OTY .. EAA XXT .. JQR ISH
RZU ZQN .. UKM HAY .. YCE FGR .. JEY ICV
RTC ZUW .. QFF VLP .. PII LRK .. JCE IGP
Loops(1,4) (LTKGBDUHP) (XJINCOQVE) (FY) (RZ) (A) (M) (S) (W)
Loops(2,5) (XVFLPECGHBOKA) (ZQSYJDNMTUIRW)
Loops(3,6) (PCWIKF) (DOJQAT) (NERHSU) (VZXBMY) (L) (G)
Loops(1,4) 8, 9, 9, 2, 2, 1, 1, 1, 1
Loops(2,5) 2, 13, 13
Loops(3,6) 6, 6, 6, 6, 6, 1, 1
By the end of WWII enigma
had a key space of
159 sextillion (159*1021)
Confusion and Diffusion
Claude Shannon
Confusion
The relationship between the key and the ciphertext as complex and as
involved as possible.
e.g. Enigma & complex substitution (S-boxes)
011011
Diffusion
Statistics of the plaintext is "dissipated" in the
statistics of the ciphertext. If we change a
character of the plaintext, then several
characters of the ciphertext should change.
http://en.wikipedia.org/wiki/Permutation_box
P-Box
Left Right
ABCDEF GHIJKL
ABCDEF F() = HJLGIK
Xor = JIHGKL
JIHGKL ABCDEF
DES
Data Encryption Standard (1973)
56 bit (Lucifer cipher)
Key Length Security Estimation
56-64 bits A few hours or days
112-128 bits Several decades (w/o QC)
256 bits Several decades (w QC)
AES
Advance Encryption Standard (2001)
Currently accepted industry standard
Supports 128, 192 and 256 bit keys.
In 1997 National Institute of Standards and Technology (NIST)
Called for proposals for AES
• Rijandel
• Mars
• RC6
• Serpent
• Twofish
In 2001 Rijandel was adopted and renamed AES.
Diffie-Hellman Key Exchange (DHKE)
Discrete Logarithm Problem
Used in:
SSH
TLS
IPSec
Diffie-Hellman Key Exchange (DHKE)
Discrete Logarithm Problem
1. Choose a prime modulus P. 17
2. Choose an integer A that will be known as the generator. 3
3. Alice and Bob both choose a private number
Ax mod P
Alice a – 15 Bob b – 13
315 mod 17 = 6 313 mod 17 = 12
6
<- 12
12 15 mod 17 = 10 6 13 mod 17 = 10
Hacker knows:
Alice - Ax mod P = 6
Bob - Ax mod P = 12
A is specially chosen to induce the discrete logarithm problem and ensure
a one way function.
Exponentiation is commutative: k = (Ax)y = (Ay)x
RSA
Rivest, Shamir, Adleman
Discrete logarithm and integer factorization
Set up
1. Choose two large primes: p=3 and q=11
2. n = p*q = 33
3. Θ(n) = (p-1)(q-1)=(3-1)(11-1)=20
4. Find a number e where gcd(e, Θ(n)) = 1 e=3
5. Find the number d where e*d = 1 mod Θ(n) d=7
Public key (n, e) = (33, 3)
Private key(d)
c = me mod n
m = cd mod n
Alice Bob
m=4
43 mod 33 = 31
31->
317 mod 20 = 4

More Related Content

What's hot

Coq for ML users
Coq for ML usersCoq for ML users
Coq for ML userstmiya
 
Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Sneeker Yeh
 
Engineering fast indexes
Engineering fast indexesEngineering fast indexes
Engineering fast indexesDaniel Lemire
 
IoT Chess 16th April Berlin
IoT Chess 16th April BerlinIoT Chess 16th April Berlin
IoT Chess 16th April BerlinLars Gregori
 
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Daniel Lemire
 
2021 Quantum Challenge ex.1
2021 Quantum Challenge ex.12021 Quantum Challenge ex.1
2021 Quantum Challenge ex.1RikuyaKubota
 
Why Systolic Architectures
Why Systolic ArchitecturesWhy Systolic Architectures
Why Systolic ArchitecturesMindos Cheng
 
Use the following data definitions until notified otherwise Byte1 BYTE ...
Use the following data definitions until notified otherwise  Byte1    BYTE   ...Use the following data definitions until notified otherwise  Byte1    BYTE   ...
Use the following data definitions until notified otherwise Byte1 BYTE ...hwbloom138
 
Tower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisTower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisShubham Nimiwal
 
Quantum challenge2021 Ex1
Quantum challenge2021 Ex1Quantum challenge2021 Ex1
Quantum challenge2021 Ex1UkyoKimura
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWJoe Jiang
 
Gate level minimization (2nd update)
Gate level minimization (2nd update)Gate level minimization (2nd update)
Gate level minimization (2nd update)Aravir Rose
 
Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1takumitano
 
Cloud flare jgc bigo meetup rolling hashes
Cloud flare jgc   bigo meetup rolling hashesCloud flare jgc   bigo meetup rolling hashes
Cloud flare jgc bigo meetup rolling hashesCloudflare
 
Concurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfConcurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfDenys Goldiner
 
Fast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeFast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeRakuten Group, Inc.
 

What's hot (20)

Coq for ML users
Coq for ML usersCoq for ML users
Coq for ML users
 
Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)Introduction to SPI and PMIC with SPI interface (chinese)
Introduction to SPI and PMIC with SPI interface (chinese)
 
Engineering fast indexes
Engineering fast indexesEngineering fast indexes
Engineering fast indexes
 
IoT Chess 16th April Berlin
IoT Chess 16th April BerlinIoT Chess 16th April Berlin
IoT Chess 16th April Berlin
 
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)Next Generation Indexes For Big Data Engineering (ODSC East 2018)
Next Generation Indexes For Big Data Engineering (ODSC East 2018)
 
El
ElEl
El
 
2021 Quantum Challenge ex.1
2021 Quantum Challenge ex.12021 Quantum Challenge ex.1
2021 Quantum Challenge ex.1
 
Why Systolic Architectures
Why Systolic ArchitecturesWhy Systolic Architectures
Why Systolic Architectures
 
Use the following data definitions until notified otherwise Byte1 BYTE ...
Use the following data definitions until notified otherwise  Byte1    BYTE   ...Use the following data definitions until notified otherwise  Byte1    BYTE   ...
Use the following data definitions until notified otherwise Byte1 BYTE ...
 
Tower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysisTower of Hanoi using AI technique - means ends analysis
Tower of Hanoi using AI technique - means ends analysis
 
C coroutine
C coroutineC coroutine
C coroutine
 
Tower of hanoi
Tower of hanoiTower of hanoi
Tower of hanoi
 
Quantum challenge2021 Ex1
Quantum challenge2021 Ex1Quantum challenge2021 Ex1
Quantum challenge2021 Ex1
 
Implementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HWImplementation of Bitcoin Miner on SW and HW
Implementation of Bitcoin Miner on SW and HW
 
Gate level minimization (2nd update)
Gate level minimization (2nd update)Gate level minimization (2nd update)
Gate level minimization (2nd update)
 
Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1Quantum challenge 2021 exercise1
Quantum challenge 2021 exercise1
 
Cloud flare jgc bigo meetup rolling hashes
Cloud flare jgc   bigo meetup rolling hashesCloud flare jgc   bigo meetup rolling hashes
Cloud flare jgc bigo meetup rolling hashes
 
Concurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdfConcurrency in Go by Denys Goldiner.pdf
Concurrency in Go by Denys Goldiner.pdf
 
Strongly Connected Components
Strongly Connected Components Strongly Connected Components
Strongly Connected Components
 
Fast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in PracticeFast Wavelet Tree Construction in Practice
Fast Wavelet Tree Construction in Practice
 

Similar to Cryptography 101: An Introduction to Encryption Techniques

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxRedWhite12
 
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Mozaic Works
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Svetlin Nakov
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Yandex
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyDavid Evans
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationAlexander Litvinenko
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMLinaro
 
Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Codemotion
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Codemotion
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applicationsItishree Dash
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoRuby Meditation
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherAmirul Wiramuda
 

Similar to Cryptography 101: An Introduction to Encryption Techniques (20)

Demystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptxDemystifying Zero Knowledge Proofs [FINAL].pptx
Demystifying Zero Knowledge Proofs [FINAL].pptx
 
Cs262 2006 lecture6
Cs262 2006 lecture6Cs262 2006 lecture6
Cs262 2006 lecture6
 
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
Stefan Kanev: Clojure, ClojureScript and Why They're Awesome at I T.A.K.E. Un...
 
Cryptography
CryptographyCryptography
Cryptography
 
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
Blockchain Cryptography for Developers (Nakov @ BlockWorld 2018, San Jose)
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks Joel Spencer – Finding Needles in Exponential Haystacks
Joel Spencer – Finding Needles in Exponential Haystacks
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Compilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVMCompilation of COSMO for GPU using LLVM
Compilation of COSMO for GPU using LLVM
 
Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...Everything I always wanted to know about crypto, but never thought I'd unders...
Everything I always wanted to know about crypto, but never thought I'd unders...
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
20141105 asfws-norx-slides
20141105 asfws-norx-slides20141105 asfws-norx-slides
20141105 asfws-norx-slides
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
Sasha Romijn - Everything I always wanted to know about crypto, but never tho...
 
A study on number theory and its applications
A study on number theory and its applicationsA study on number theory and its applications
A study on number theory and its applications
 
Cryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy SavchenkoCryptography: way to Arkham - Andriy Savchenko
Cryptography: way to Arkham - Andriy Savchenko
 
Codes and Isogenies
Codes and IsogeniesCodes and Isogenies
Codes and Isogenies
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 

Recently uploaded

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Cryptography 101: An Introduction to Encryption Techniques

  • 2. What is Cryptography? Encryption is the process of: 1.Transforming data (x) 2.Using an algorithm (e) 3.To make it unreadable to anyone (y) 4.except those possessing the key. (k) K={k1,…,kn} The Quick Brown Fox Me (mod N) where M=The Quick Brown Fox Uif Rvjdl Cspxo Gpy Kerchhoffs’ principle: A cryptosystem should be secure even if the Attacker knows all the details about the system, with the exception of The key.
  • 3. We shall extend the empire of Persia such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is our own -Xerxes (Ahasuerus) ~450 B.C.
  • 4. (Spartan) Scytale Rail Fence Cipher Route Cipher Transposition Ciphers
  • 5. The Quick Brown Fox GSV JFRXP YILDM ULC Substitution Ciphers The Quick Brown Fox ZIT JXOEA WKGVF YGB Shift Cipher (Caesar) The Quick Brown Fox SGD PTHBJ AQNVM ENW At-Bash
  • 6. Modular ciphers a = r mod m 42 = 9*4 + 6 r = a – m*q 42 = 6 mod 9 42 = q*9 + 6 6 = 42 – q*9 q = 0, r = 42 q = 1, r = 33 q = 2, r = 24 q = 3, r = 15 q = 4, r = 6 (0<q<m-1) q = 5, r = -3 q = 6, r = -12 12 + 7 = 19 => 1 mod 9 14 – 2 = 12 => 3 mod 9 11 * 8 = 88 => 7 mod 9 15/5 = 3 !=> 3 mod 9 If the multiplicative inverse exists for a number then we can divide by that number 5*2=10 => 1 mod 9 2 is the multiplicative inverse of 5 (and vice versa) 15*2 = 30 => 3 mod 9 If x is coprime with modulus then it has an inverse.
  • 7. Caesar Cipher Encryption: ek (x) = x + k mod 26 Decryption: ek (y) = y – k mod 26 The quick brown fox k=3 t=20, 20 + 3 = 23 mod 26 h=8, 8 + 3 = 11 mod 26 e=5, 5 + 3 = 8 mod 26 Affine Cipher k=(a,b) Encryption: ek (x) = a*x + b mod 26 Decryption: ek (y) = a-1 * (y – b) mod 26 The quick brown fox k=(5, 3) t=20, 5*20 + 3 = 103 = 25 mod 26 h=8, 5*8 + 3 = 43 = 17 mod 26 e=5, 5*5 + 3 = 28 = 2 mod 26 21 * 5 = 105 = 1 mod 26 21 * 25-3 = 462 = 20 mod 26 21 * 17-3 = 294 = 8 mod 26 21 * 2-3 = -21 = 5 mod 26
  • 8. Brute-Force Attacks Given: y = SGD PTHBJ AQNVM ENW Keyspace = {1,…,25} Decryption : ki(y) =? x
  • 9. Abu Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī 850 C.E. Cryptanalysis Letter Frequency Short word and letter combinations the be to of and that have for not http://www.richkni.co.uk/php/crypta/
  • 10. Normal English letter frequency Ciphertext letter frequency
  • 11. Vigenère cipher A polyalphabetic cipher Key = KING The sun and the man in the moon Dpr yev ntn buk wia ox buk wwbt 4 possible ways to spell the word “the” K – DPR I - BUK N – GNO G - ZRM http://www.simonsingh.net/The_Black_Chamber/vigenere_cracking_tool.html http://sharkysoft.com/vigenere/
  • 13. AXP AVC .. IOV NKZ .. HSA PYT .. PPZ LEX FZD YQO .. IZL NQL .. NNQ CMA .. GUH BIS FGT YHD .. KDY GNV .. NBJ COQ .. GOI BKK MIW MRI .. VWG EZG .. SYX SJB .. TVB KFM DJG UDG .. OJN QDE .. SNH SMS .. TLI KPK LNK TMF .. ZAO RXJ .. SXV SVZ .. TYO KJJ XKN JAE .. CTL OUL .. ERS XWU .. WHJ WBQ BHG DBG .. CMM OTY .. EAA XXT .. JQR ISH RZU ZQN .. UKM HAY .. YCE FGR .. JEY ICV RTC ZUW .. QFF VLP .. PII LRK .. JCE IGP Loops(1,4) (LTKGBDUHP) (XJINCOQVE) (FY) (RZ) (A) (M) (S) (W) Loops(2,5) (XVFLPECGHBOKA) (ZQSYJDNMTUIRW) Loops(3,6) (PCWIKF) (DOJQAT) (NERHSU) (VZXBMY) (L) (G) Loops(1,4) 8, 9, 9, 2, 2, 1, 1, 1, 1 Loops(2,5) 2, 13, 13 Loops(3,6) 6, 6, 6, 6, 6, 1, 1 By the end of WWII enigma had a key space of 159 sextillion (159*1021)
  • 14. Confusion and Diffusion Claude Shannon Confusion The relationship between the key and the ciphertext as complex and as involved as possible. e.g. Enigma & complex substitution (S-boxes) 011011 Diffusion Statistics of the plaintext is "dissipated" in the statistics of the ciphertext. If we change a character of the plaintext, then several characters of the ciphertext should change. http://en.wikipedia.org/wiki/Permutation_box P-Box
  • 15. Left Right ABCDEF GHIJKL ABCDEF F() = HJLGIK Xor = JIHGKL JIHGKL ABCDEF DES Data Encryption Standard (1973) 56 bit (Lucifer cipher) Key Length Security Estimation 56-64 bits A few hours or days 112-128 bits Several decades (w/o QC) 256 bits Several decades (w QC)
  • 16. AES Advance Encryption Standard (2001) Currently accepted industry standard Supports 128, 192 and 256 bit keys. In 1997 National Institute of Standards and Technology (NIST) Called for proposals for AES • Rijandel • Mars • RC6 • Serpent • Twofish In 2001 Rijandel was adopted and renamed AES.
  • 17. Diffie-Hellman Key Exchange (DHKE) Discrete Logarithm Problem Used in: SSH TLS IPSec
  • 18. Diffie-Hellman Key Exchange (DHKE) Discrete Logarithm Problem 1. Choose a prime modulus P. 17 2. Choose an integer A that will be known as the generator. 3 3. Alice and Bob both choose a private number Ax mod P Alice a – 15 Bob b – 13 315 mod 17 = 6 313 mod 17 = 12 6 <- 12 12 15 mod 17 = 10 6 13 mod 17 = 10 Hacker knows: Alice - Ax mod P = 6 Bob - Ax mod P = 12 A is specially chosen to induce the discrete logarithm problem and ensure a one way function. Exponentiation is commutative: k = (Ax)y = (Ay)x
  • 19. RSA Rivest, Shamir, Adleman Discrete logarithm and integer factorization Set up 1. Choose two large primes: p=3 and q=11 2. n = p*q = 33 3. Θ(n) = (p-1)(q-1)=(3-1)(11-1)=20 4. Find a number e where gcd(e, Θ(n)) = 1 e=3 5. Find the number d where e*d = 1 mod Θ(n) d=7 Public key (n, e) = (33, 3) Private key(d) c = me mod n m = cd mod n Alice Bob m=4 43 mod 33 = 31 31-> 317 mod 20 = 4