SlideShare a Scribd company logo
1 of 22
CS 555 Topic 1 1
Cryptography
CS 555
Topic 1: Overview of the Course &
Introduction to Encryption
CS 555 Topic 1 2
See the Course Homepage
CS 555 Topic 1 3
Goals of Cryptography
• The most fundamental problem cryptography
addresses: ensure security of communication
over insecure medium
• What does secure communication mean?
– confidentiality (privacy, secrecy)
• only the intended recipient can see the communication
– integrity (authenticity)
• the communication is generated by the alleged sender
• What does insecure medium mean?
– Two possibilities:
• Passive attacker: the adversary can eavesdrop
• Active attacker: the adversary has full control over the
communication channel
CS 555 Topic 1 4
Approaches to Secure Communication
• Steganography
– “covered writing”
– hides the existence of a message
– depends on secrecy of method
• Cryptography
– “hidden writing”
– hide the meaning of a message
– depends on secrecy of a short key, not method
Terms: Cryptography, cryptanalysis,
and cryptology
• Cryptography,
– Traditionally, designing algorithms/protocols
– Nowadays, often synonym with cryptology
• Cryptanalysis
– Breaking algorithms/protocols
• Cryptology: both cryptography & cryptanalysis
– Becoming less common
CS 555 Topic 1 5
CS 555 Topic 1 6
What Cryptography is About?
• Constructing and analyzing protocols which
enables parties to achieve objectives,
overcoming the influence of adversaries.
– a protocol (or a scheme) is a suite of algorithms that
tell each party what to do
• How to devise and analyze protocols
– understand the threats posed by the adversaries and
the goals
CS 555 Topic 1 7
A Sample List of Other Goals in
Modern Cryptography
• Modern cryptography covers many topics
beyond secure communication
– Pseudo-random number generation
– Non-repudiation: Digital signatures
– Zero-knowledge proof
– Commitment schemes
– E-voting
– Secret sharing
– Secure Multi-party Computation (Secure Function
Evaluation)
– …
CS 555 Topic 1 8
History of Cryptography
• 2500+ years
• An ongoing battle between codemakers and
codebreakers
• Driven by communication & computation
technology
– paper and ink (until end of 19th century)
– cryptographic engine & telegram, radio
• Enigma machine, Purple machine used in WWII
– computers & digital communication
Major Events in History of
Cryptography
• Mono-alphabetical ciphers (Before 1000 AD)
• Frequency analysis (Before 1000 AD)
• Cipher machines (early 1900’s)
• Shannon developed theory of perfect secrecy and information
theoretical security (around 1950)
• US adopts Data Encryption Standard in 1977
• Notion of public key cryptography and digital signatures
introduced (1970~1976)
• The study of cryptography becomes mainstream in the research
community (1976)
• Development of computational security and other theoretical
foundation of modern cryptography (1980’s)
CS 555 Topic 1 9
CS 555 Topic 1 10
What is This Course About?
• Mostly mathematical
– Understand the mathematics underlying the
cryptographic algorithms & protocols
– Understand the power and limitations of cryptographic
tools
– Understand the formal approach to security in modern
cryptography
CS 555 Topic 1 11
Backgrounds Necessary for the Course
• A bit of probability
• Algorithms and complexity
• Mathematical maturity
– understand what is (and what is not) a proper
definition
– know how to write a proof
Symmetric-key Encryption
• This is what cryptography is all about until 1970.
• Two parties (often called a sender and a
receiver) share some secret information called a
key.
• Sender uses the key to encrypt (or “scramble”)
the message, before it is sent
• Receiver uses the same key to decrypt (or
“unscramble”) and recover the original message
CS 555 Topic 1 12
CS 555 Topic 1 13
Basic Terminology for Encryption
• Plaintext
– An original message
– Also referred to as message
• Plaintext space (aka Message space)
– the set consisting of all possible plaintexts
• Ciphertext
– A scrambled message
• Ciphertext space
– The set consisting of all possible scrambled message
• Key secret used in transformation
• Key space K
Notation for Symmetric-key
Encryption
• A symmetric-key encryption scheme is comprised of
three algorithms
– Gen the key generation algorithm
• The algorithm must be probabilistic/randomized
• Output: a key k
– Enc the encryption algorithm
• Input: key k, plaintext m
• Output: ciphertext c := Enck(m)
– Dec the decryption algorithm
• Input: key k, ciphertext c
• Output: plaintext m := Deck(m)
CS 555 Topic 1 14
Requirement: k m [ Deck(Enck(m)) = m ]
CS 555 Topic 1 15
Shift Cipher
• The Key Space K :
– [0 .. 25]
• Encryption given a key k:
– each letter in the plaintext P is
replaced with the k’th letter
following corresponding number
(shift right)
• Decryption given k:
– shift left
History: k = 3, Caesar’s cipher
CS 555 Topic 1 16
Shift Cipher: Cryptanalysis
• Can an attacker find K?
– YES: by a bruteforce attack through
exhaustive key search,
• How to tell whether a shift is correct?
– key space is small (<= 26 possible keys).
• Cipher key space needs to be large
enough.
• Exhaustive key search can be effective.
CS 555 Topic 1 17
Mono-alphabetic Substitution Cipher
• The key space: all permutations of  = {A, B, C, …, Z}
• Encryption given a key :
– each letter X in the plaintext P is replaced with (X)
• Decryption given a key :
– each letter Y in the cipherext P is replaced with -1(Y)
Example:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
= B A D C Z H W Y G O Q X S V T R N M L K J I P F E U
BECAUSE  AZDBJSZ
CS 555 Topic 1 18
Strength of the Mono-alphabetic
Substitution Cipher
• Exhaustive search is difficult
– key space size is 26!  4×1026  288
• Dominates the art of secret writing throughout
the first millennium A.D.
• Thought to be unbreakable by many back then
• How to break it?
CS 555 Topic 1 19
Cryptanalysis of Substitution Ciphers:
Frequency Analysis
• Basic ideas:
– Each language has certain features: frequency of
letters, or of groups of two or more letters.
– Substitution ciphers preserve the language features.
• History of frequency analysis
– Discovered by the Arabs; earliest known description is in a book
by the ninth-century scientist al-Kindi
– Rediscovered or introduced from the Arabs in the Europe during
the Renaissance
• Frequency analysis made substitution cipher insecure
CS 555 Topic 1 20
Frequency of Letters in English
0
2
4
6
8
10
12
14
a b c d e f g h i j k l m n o p q r s t u v w x y z
Series1
How to Defeat Frequency
Analysis?
• Use larger blocks as the basis of substitution.
Rather than substituting one letter at a time,
substitute 64 bits at a time, or 128 bits.
– Leads to block ciphers such as DES & AES.
• Use different substitutions to get rid of frequency
features.
– Leads to polyalphabetical substituion ciphers, cipher
machines, and stream ciphers
CS 555 Topic 1 21
CS 555 Topic 1 22
Coming Attractions …
• Vigenere cipher.
• Required reading
– Katz and Lindell: 1.1 to 1.3
• Recommended reading
– The Code Book: Chapters 1 to 4

More Related Content

Similar to Spring12_topic01.ppt

Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdfAschalewAyele2
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshopManojit Ballav
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentationMuneebZahid10
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Cryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfCryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfNirajKumar620142
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasanmunicsaa
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 

Similar to Spring12_topic01.ppt (20)

Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Class 17
Class 17Class 17
Class 17
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Cryptography
CryptographyCryptography
Cryptography
 
355_Fall05_lect02.pdf
355_Fall05_lect02.pdf355_Fall05_lect02.pdf
355_Fall05_lect02.pdf
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Information security powerpoint presentation
Information security powerpoint presentationInformation security powerpoint presentation
Information security powerpoint presentation
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdfCryptography & Network Security.ppt-1.pdf
Cryptography & Network Security.ppt-1.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.SrinivasanMathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
Mathematics Towards Elliptic Curve Cryptography-by Dr. R.Srinivasan
 
lec1.pdf
lec1.pdflec1.pdf
lec1.pdf
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 

Recently uploaded

办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 

Recently uploaded (20)

办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 

Spring12_topic01.ppt

  • 1. CS 555 Topic 1 1 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption
  • 2. CS 555 Topic 1 2 See the Course Homepage
  • 3. CS 555 Topic 1 3 Goals of Cryptography • The most fundamental problem cryptography addresses: ensure security of communication over insecure medium • What does secure communication mean? – confidentiality (privacy, secrecy) • only the intended recipient can see the communication – integrity (authenticity) • the communication is generated by the alleged sender • What does insecure medium mean? – Two possibilities: • Passive attacker: the adversary can eavesdrop • Active attacker: the adversary has full control over the communication channel
  • 4. CS 555 Topic 1 4 Approaches to Secure Communication • Steganography – “covered writing” – hides the existence of a message – depends on secrecy of method • Cryptography – “hidden writing” – hide the meaning of a message – depends on secrecy of a short key, not method
  • 5. Terms: Cryptography, cryptanalysis, and cryptology • Cryptography, – Traditionally, designing algorithms/protocols – Nowadays, often synonym with cryptology • Cryptanalysis – Breaking algorithms/protocols • Cryptology: both cryptography & cryptanalysis – Becoming less common CS 555 Topic 1 5
  • 6. CS 555 Topic 1 6 What Cryptography is About? • Constructing and analyzing protocols which enables parties to achieve objectives, overcoming the influence of adversaries. – a protocol (or a scheme) is a suite of algorithms that tell each party what to do • How to devise and analyze protocols – understand the threats posed by the adversaries and the goals
  • 7. CS 555 Topic 1 7 A Sample List of Other Goals in Modern Cryptography • Modern cryptography covers many topics beyond secure communication – Pseudo-random number generation – Non-repudiation: Digital signatures – Zero-knowledge proof – Commitment schemes – E-voting – Secret sharing – Secure Multi-party Computation (Secure Function Evaluation) – …
  • 8. CS 555 Topic 1 8 History of Cryptography • 2500+ years • An ongoing battle between codemakers and codebreakers • Driven by communication & computation technology – paper and ink (until end of 19th century) – cryptographic engine & telegram, radio • Enigma machine, Purple machine used in WWII – computers & digital communication
  • 9. Major Events in History of Cryptography • Mono-alphabetical ciphers (Before 1000 AD) • Frequency analysis (Before 1000 AD) • Cipher machines (early 1900’s) • Shannon developed theory of perfect secrecy and information theoretical security (around 1950) • US adopts Data Encryption Standard in 1977 • Notion of public key cryptography and digital signatures introduced (1970~1976) • The study of cryptography becomes mainstream in the research community (1976) • Development of computational security and other theoretical foundation of modern cryptography (1980’s) CS 555 Topic 1 9
  • 10. CS 555 Topic 1 10 What is This Course About? • Mostly mathematical – Understand the mathematics underlying the cryptographic algorithms & protocols – Understand the power and limitations of cryptographic tools – Understand the formal approach to security in modern cryptography
  • 11. CS 555 Topic 1 11 Backgrounds Necessary for the Course • A bit of probability • Algorithms and complexity • Mathematical maturity – understand what is (and what is not) a proper definition – know how to write a proof
  • 12. Symmetric-key Encryption • This is what cryptography is all about until 1970. • Two parties (often called a sender and a receiver) share some secret information called a key. • Sender uses the key to encrypt (or “scramble”) the message, before it is sent • Receiver uses the same key to decrypt (or “unscramble”) and recover the original message CS 555 Topic 1 12
  • 13. CS 555 Topic 1 13 Basic Terminology for Encryption • Plaintext – An original message – Also referred to as message • Plaintext space (aka Message space) – the set consisting of all possible plaintexts • Ciphertext – A scrambled message • Ciphertext space – The set consisting of all possible scrambled message • Key secret used in transformation • Key space K
  • 14. Notation for Symmetric-key Encryption • A symmetric-key encryption scheme is comprised of three algorithms – Gen the key generation algorithm • The algorithm must be probabilistic/randomized • Output: a key k – Enc the encryption algorithm • Input: key k, plaintext m • Output: ciphertext c := Enck(m) – Dec the decryption algorithm • Input: key k, ciphertext c • Output: plaintext m := Deck(m) CS 555 Topic 1 14 Requirement: k m [ Deck(Enck(m)) = m ]
  • 15. CS 555 Topic 1 15 Shift Cipher • The Key Space K : – [0 .. 25] • Encryption given a key k: – each letter in the plaintext P is replaced with the k’th letter following corresponding number (shift right) • Decryption given k: – shift left History: k = 3, Caesar’s cipher
  • 16. CS 555 Topic 1 16 Shift Cipher: Cryptanalysis • Can an attacker find K? – YES: by a bruteforce attack through exhaustive key search, • How to tell whether a shift is correct? – key space is small (<= 26 possible keys). • Cipher key space needs to be large enough. • Exhaustive key search can be effective.
  • 17. CS 555 Topic 1 17 Mono-alphabetic Substitution Cipher • The key space: all permutations of  = {A, B, C, …, Z} • Encryption given a key : – each letter X in the plaintext P is replaced with (X) • Decryption given a key : – each letter Y in the cipherext P is replaced with -1(Y) Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z = B A D C Z H W Y G O Q X S V T R N M L K J I P F E U BECAUSE  AZDBJSZ
  • 18. CS 555 Topic 1 18 Strength of the Mono-alphabetic Substitution Cipher • Exhaustive search is difficult – key space size is 26!  4×1026  288 • Dominates the art of secret writing throughout the first millennium A.D. • Thought to be unbreakable by many back then • How to break it?
  • 19. CS 555 Topic 1 19 Cryptanalysis of Substitution Ciphers: Frequency Analysis • Basic ideas: – Each language has certain features: frequency of letters, or of groups of two or more letters. – Substitution ciphers preserve the language features. • History of frequency analysis – Discovered by the Arabs; earliest known description is in a book by the ninth-century scientist al-Kindi – Rediscovered or introduced from the Arabs in the Europe during the Renaissance • Frequency analysis made substitution cipher insecure
  • 20. CS 555 Topic 1 20 Frequency of Letters in English 0 2 4 6 8 10 12 14 a b c d e f g h i j k l m n o p q r s t u v w x y z Series1
  • 21. How to Defeat Frequency Analysis? • Use larger blocks as the basis of substitution. Rather than substituting one letter at a time, substitute 64 bits at a time, or 128 bits. – Leads to block ciphers such as DES & AES. • Use different substitutions to get rid of frequency features. – Leads to polyalphabetical substituion ciphers, cipher machines, and stream ciphers CS 555 Topic 1 21
  • 22. CS 555 Topic 1 22 Coming Attractions … • Vigenere cipher. • Required reading – Katz and Lindell: 1.1 to 1.3 • Recommended reading – The Code Book: Chapters 1 to 4