SlideShare a Scribd company logo
1 of 46
Download to read offline
Data Protection Techniques andData Protection Techniques and
CryptographyCryptography
ÇankayaÇankaya UniversityUniversity
Talha SAVAŞTalha SAVAŞ
b20500686@hacettepe.edu.trb20500686@hacettepe.edu.tr
Outline of theOutline of the
PresentationPresentation
Basic Terminology in Cryptography
Basic Security Goals
Encryption & Decryption
Basic Ciphers
Block Ciphers
Encryption Modes
Secret Sharing (Threshold)
IPSEC
SSL/TLS
Malicious Software
References
Basic Terminology in Cryptography
Cryptography:
The study of mathematical techniques related to aspects
of providing information security services (to construct).
Cryptanalysis:
The study of mathematical techniques for attempting to
defeat information security services (to break).
Cryptology:
The study of cryptography and cryptanalysis (both).
Basic Terminology in Cryptography
Computer Security:
Ensure security of data kept on the computer.
Network Security:
Ensure security of communication over insecure medium.
Approaches to Secure Communication:
Steganography:
Hides the existence of a message.
Cryptography:
Hide the meaning of a message.
Information Security = CS + NS
Basic Terminology in Cryptography
Information Security
Basic Security Goals
Privacy (secrecy, confidentiality):
Only the intended recipient can see the communication.
Authenticity (integrity):
The communication is generated by the alleged sender.
Authorization:
Limit the resources that a user can access.
Availability:
Make the services available 99.999…% of time.
Non-repudiation:
No party can refuse the validity of its actions.
Auditing:
Take a log of everything done in the system.
Basic Security Goals
Encryption & Decryption
Encryption (encipherment):
The process of transforming information (plaintext) using
an algorithm (cipher) to make it unreadable to anyone
except those possessing special knowledge.
Decryption (decipherment):
The process of making the encrypted information
readable again.
Key:
The special knowledge shared between communicating
parties.
Plaintext:
The data to be concealed.
Ciphertext:
The result of encryption on the plaintext.
Encryption & DecryptionEncryption & Decryption
Encryption & Decryption
Basic Ciphers
Shift Cipher:
A substitution cipher
The Key Space: [1 .. 25]
Encryption given a key K:
Each letter in the plaintext P is replaced with the K’th
letter following corresponding number (shift right).
Decryption given K: (shift left).
Basic CiphersBasic Ciphers
Shift Cipher: An Example
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
P = CRYPTOGRAPHYISFUN
K = 11
C = NCJAVZRCLASJTDQFY
C 2+11 mod 26 = 13→ → N
R 17+11 mod 26 = 2→ → C
…
N 13+11 mod 26 = 24→ →Y
General Mono - alphabetical Substitution Cipher:
The key space: all permutations of Σ = {A, B, C, …, Z}
Encryption given a key :̟
Each letter X in the plaintext P is replaced with π(X).
Decryption given a key :̟
Each letter Y in the ciphertext P is replaced with π-1(Y).̟
Example:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
π=B A D C Z H W Y G O Q X S V T R N M S K J I P F E U
BECAUSE→AZDBJSZ
Cryptanalysis: The key space size is 26!
Basic CiphersBasic Ciphers
Frequency Analysis:
Frequency Features of English:
Vowels, which constitute 40 % of plaintext, are often
separated by consonants.
Letter A is often found in the beginning of a word or
second from last.
Letter I is often third from the end of a word.
Letter Q is followed only by U.
Some words are more frequent, such as:
the, and, at, is, on, in.
Basic CiphersBasic Ciphers
Frequency Analysis
Summary:
• Shift ciphers are easy to break using brute force
attacks,they have small key space.
• Substitution ciphers preserve language features and are
vulnerable to frequency analysis attacks.
Basic CiphersBasic Ciphers
The Vigenère Cipher:
Definition:
Given m, a positive integer, P = C = (Z26)n, and
K = (k1, k2, …, km) a key, we define:
Encryption:
ek(p1, p2… pm) = (p1+k1, p2+k2…pm+km) (mod 26)
Decryption:
dk(c1, c2… cm) = (c1-k1, c2-k2 … cm-km) (mod 26)
Example:
Plaintext: C R Y P T O G R A P H Y
Key: L U C K L U C K L U C K
Ciphertext: N L A Z E I I B L J J I
Basic CiphersBasic Ciphers
Vigenere Cipher: Cryptanalysis
Find the length of the key.
• Divide the message into that many shift cipher encryptions.
• Use frequency analysis to solve the resulting shift ciphers.
Vigenere cipher is vulnerable: once the key length is found, a
cryptanalyst can apply frequency analysis.
How to Find the Key Length?
• For Vigenere, as the length of the keyword increases, the letter
frequency shows less English-like characteristics and becomes
more random.
• One method to find the key length:
Kasisky test.
Basic CiphersBasic Ciphers
Kasisky Test:
Note:
Two identical segments of plaintext, will be encrypted to
the same ciphertext, if the they occur in the text at the
distance Δ, (Δ≡0 (mod m), m is the key length).
Algorithm:
Search for pairs of identical segments of length at least 3
Record distances between the two segments: Δ1, Δ2, …
m divides gcd(Δ1, Δ2, …)
PT: T H E S U N A N D T H E M A N I N T H E M O O N
Key: K I N G K I N G K I N G K I N G K I N G K I N G
CT: D P R Y E V N T N B U K W I A O X B U K W W B T
Basic CiphersBasic Ciphers
Block Ciphers
Block size: In general larger block sizes mean greater
security.
Key size: Larger key size means greater security
(larger key space).
Number of rounds: Multiple rounds offer increasing
security.
Encryption modes: Define how messages larger than
the block size are encrypted, very important for the
security of the encrypted message.
Block CiphersBlock Ciphers
Feistel Network:
A Feistel Network is fully specified given
The block size: n = 2w
number of rounds: d
d round functions f1, f2…, fd: {0,1}w {0,1}w→
Each f function is a SP cipher.
Used in DES, IDEA, RC5, and many other block ciphers.
Block CiphersBlock Ciphers
Encryption:
L1=R0, R1=L0 ⊕ f1(R0)
L2=R1, R2=L1 ⊕ f2(R1)
...
Ld=Rd-1, Rd=Ld-1⊕ fd(Rd-1)
Decryption:
Rd-1=Ld, Ld-1=Rd ⊕ fd(Ld)
…
R0=L1, L0=R1 ⊕ f1(L1)
Feistel Network
Data Encryption Standard (DES):
Features:
Block size = 64 bits
Key size = 56 bits
Number of rounds = 16
16 intermediary keys, each 48 bits
Block CiphersBlock Ciphers
DES Structure
Details of DES Rounds:
An initial permutation is applied
on the plaintext.
IP(x) = L0 R0
In each round:
Li = Ri-1
Ri = Li-1 f(Ri-1, Ki)⊕
Block CiphersBlock Ciphers
Details of DES Rounds:
After the last round
y = IP-1(R16L16)
Block CiphersBlock Ciphers
DES f Function:
Block CiphersBlock Ciphers
DES S-boxes:
Block CiphersBlock Ciphers
• S-boxes are the only non-linear elements in DES design.
• Each S-box is a 4x16 matrix, values from 0 to 15
B = b1 b2 b3 b4 b5 b6
b1b6 = row
b2b3b4b5 = column
C = 4-bit the result
Ex. B = 011011
Row= 01 Column=1101 C = 1001
Encryption Modes
Electronic Code Book (ECB):
Encryption ModesEncryption Modes
• Message is broken into independent blocks of block_size
bits;
•(ECB): Each block encrypted separately.
• Encryption: ci = Ek(xi)
• Decryption: xi = Dk(ci)
Cipher Block Chaining (CBC):
Encryption ModesEncryption Modes
(CBC): Next input depends upon previous output.
• Encryption: Ci = Ek (Mi Ci-1), with C0=IV⊕
• Decryption: Mi= Ci-1 Dk(Ci), with C0=IV⊕
Output Feedback Mode (OFB):
Encryption ModesEncryption Modes
• (OFB): Construct a pseudorandom number generator
(PRNG) to obtain a one time pad and XOR the message
with the pad.
• y0=IV yi = Ek[yi-1]
Cipher Feedback Mode (CFB):
Encryption ModesEncryption Modes
• (CFB): the message is XORed with the feedback of
encrypting the previous block.
Counter Mode (CTR):
Encryption ModesEncryption Modes
• Counter Mode (CTR): Another way to construct PRNG
using DES.
yi= Ek[counter+i]
ci= yi xi⊕
• Sender and receiver share a counter value (does not
need to be secret) and the secret key.
Block Ciphers vs. Stream Ciphers:
• A block cipher operates on blocks of fixed length.
•A stream cipher is a symmetric key cipher where plaintext
bits are combined with a pseudorandom cipher bit stream
(keystream), typically by an exclusive-or (xor) operation.
Secret Sharing (Threshold)
Counter Mode (CTR):
Secret Sharing (Threshold)Secret Sharing (Threshold)
• Counter Mode (CTR): Another way to construct PRNG
using DES.
yi= Ek[counter+i]
ci= yi xi⊕
• Sender and receiver share a counter value (does not
need to be secret) and the secret key.
Block Ciphers vs. Stream Ciphers:
• A block cipher operates on blocks of fixed length.
•A stream cipher is a symmetric key cipher where plaintext
bits are combined with a pseudorandom cipher bit stream
(keystream), typically by an exclusive-or (xor) operation.
Counter Mode (CTR):
• Counter Mode (CTR): Another way to construct PRNG
using DES.
yi= Ek[counter+i]
ci= yi xi⊕
• Sender and receiver share a counter value (does not
need to be secret) and the secret key.
Block Ciphers vs. Stream Ciphers:
• A block cipher operates on blocks of fixed length.
•A stream cipher is a symmetric key cipher where plaintext
bits are combined with a pseudorandom cipher bit stream
(keystream), typically by an exclusive-or (xor) operation.
Secret Sharing (Threshold)Secret Sharing (Threshold)
IPSEC
SSL/TLS
Malicious Software
References
Cristina Nita-Rotaru Associate Professor
Department of Computer Science Purdue University
Internet
Wikipedia
Cryptography Decrypted by H.X. Mel, D. M. Baker
Data Protection Techniques and Cryptography

More Related Content

What's hot

introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptographyPriyamvada Singh
 
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)Shirou Maruyama
 
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略私のファミコンのfpsは530000です。もちろんフルパワーで(以下略
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略Hiroki Nakahara
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSunil Meena
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Enriching Word Vectors with Subword Information
Enriching Word Vectors with Subword InformationEnriching Word Vectors with Subword Information
Enriching Word Vectors with Subword InformationSeonghyun Kim
 
自習形式で学ぶ「DIGITS による画像分類入門」
自習形式で学ぶ「DIGITS による画像分類入門」自習形式で学ぶ「DIGITS による画像分類入門」
自習形式で学ぶ「DIGITS による画像分類入門」NVIDIA Japan
 
数学つまみぐい入門編
数学つまみぐい入門編数学つまみぐい入門編
数学つまみぐい入門編Akira Yamaguchi
 
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...hyunyoung Lee
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
context free language
context free languagecontext free language
context free languagekhush_boo31
 
Convolution 종류 설명
Convolution 종류 설명Convolution 종류 설명
Convolution 종류 설명홍배 김
 
Control Flow Graphs
Control Flow GraphsControl Flow Graphs
Control Flow Graphsdaimk2020
 
文脈自由文法の話
文脈自由文法の話文脈自由文法の話
文脈自由文法の話kogecoo
 

What's hot (20)

introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)
文法圧縮入門:超高速テキスト処理のためのデータ圧縮(NLP2014チュートリアル)
 
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略私のファミコンのfpsは530000です。もちろんフルパワーで(以下略
私のファミコンのfpsは530000です。もちろんフルパワーで(以下略
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Enriching Word Vectors with Subword Information
Enriching Word Vectors with Subword InformationEnriching Word Vectors with Subword Information
Enriching Word Vectors with Subword Information
 
Pumping lemma for cfl
Pumping lemma for cflPumping lemma for cfl
Pumping lemma for cfl
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Compiler Chapter 1
Compiler Chapter 1Compiler Chapter 1
Compiler Chapter 1
 
自習形式で学ぶ「DIGITS による画像分類入門」
自習形式で学ぶ「DIGITS による画像分類入門」自習形式で学ぶ「DIGITS による画像分類入門」
自習形式で学ぶ「DIGITS による画像分類入門」
 
数学つまみぐい入門編
数学つまみぐい入門編数学つまみぐい入門編
数学つまみぐい入門編
 
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...
(Paper Seminar detailed version) BART: Denoising Sequence-to-Sequence Pre-tra...
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
context free language
context free languagecontext free language
context free language
 
Lzw algorithm
Lzw algorithmLzw algorithm
Lzw algorithm
 
Convolution 종류 설명
Convolution 종류 설명Convolution 종류 설명
Convolution 종류 설명
 
Control Flow Graphs
Control Flow GraphsControl Flow Graphs
Control Flow Graphs
 
Pietのエディタを作った話
Pietのエディタを作った話Pietのエディタを作った話
Pietのエディタを作った話
 
文脈自由文法の話
文脈自由文法の話文脈自由文法の話
文脈自由文法の話
 

Viewers also liked

December report small
December report smallDecember report small
December report smallLisa Testart
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaClientSide
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Mohamed Loey
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Anninhmang K13 Mtt
Anninhmang K13 MttAnninhmang K13 Mtt
Anninhmang K13 MttQuynh Khuong
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesSarthak Patel
 
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15Sarah Fretwell-Jex
 
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກ
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກ
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກKhamsay Chantharath
 
Sales assistant performance appraisal
Sales assistant performance appraisalSales assistant performance appraisal
Sales assistant performance appraisalcoreypier
 
Marketing assistant performance appraisal
Marketing assistant performance appraisalMarketing assistant performance appraisal
Marketing assistant performance appraisalcoreypier
 

Viewers also liked (20)

December report small
December report smallDecember report small
December report small
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 
Classical cipher
Classical cipherClassical cipher
Classical cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Anninhmang K13 Mtt
Anninhmang K13 MttAnninhmang K13 Mtt
Anninhmang K13 Mtt
 
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption TechniquesIS Unit 1_Conventional Encryption_Classical Encryption Techniques
IS Unit 1_Conventional Encryption_Classical Encryption Techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Ssf strony internetowe
Ssf   strony internetoweSsf   strony internetowe
Ssf strony internetowe
 
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15
**MOOC Course Assignment Sarah Fretwell-Jex 22.05.15
 
Centenarian Article
Centenarian ArticleCentenarian Article
Centenarian Article
 
Las sirenas
Las sirenasLas sirenas
Las sirenas
 
Reading skills notes
Reading skills notesReading skills notes
Reading skills notes
 
10WindsOfChange
10WindsOfChange10WindsOfChange
10WindsOfChange
 
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກ
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກ
ຫົວບົດສອບເສັງຄັດເລືອກເຂ້າວິທະຍາໄລຄູສົງ ຈຳປາສັກ
 
Sales assistant performance appraisal
Sales assistant performance appraisalSales assistant performance appraisal
Sales assistant performance appraisal
 
Marketing assistant performance appraisal
Marketing assistant performance appraisalMarketing assistant performance appraisal
Marketing assistant performance appraisal
 

Similar to Data Protection Techniques and Cryptography

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesJanani S
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of CryptographyMohammedMorhafJaely
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsChristian Spolaore
 
Computer security
Computer securityComputer security
Computer securityFraboni Ec
 
Computer security
Computer security Computer security
Computer security Harry Potter
 
Computer security
Computer security Computer security
Computer security Tony Nguyen
 
Computer security
Computer securityComputer security
Computer securityDavid Hoen
 
Computer security
Computer securityComputer security
Computer securityJames Wong
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptographyNithyasriA2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 

Similar to Data Protection Techniques and Cryptography (20)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
3 Basics of Cryptography Basics of Cryptography
3 Basics of Cryptography  Basics of Cryptography3 Basics of Cryptography  Basics of Cryptography
3 Basics of Cryptography Basics of Cryptography
 
Detailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocolsDetailed cryptographic analysis of contact tracing protocols
Detailed cryptographic analysis of contact tracing protocols
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer security Computer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer security Computer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Stallings Kurose and Ross
Stallings Kurose and RossStallings Kurose and Ross
Stallings Kurose and Ross
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
CNS UNIT-II.pptx
CNS UNIT-II.pptxCNS UNIT-II.pptx
CNS UNIT-II.pptx
 
Network security
Network securityNetwork security
Network security
 
Network security CS2
Network security CS2Network security CS2
Network security CS2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 

Recently uploaded

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Data Protection Techniques and Cryptography

  • 1. Data Protection Techniques andData Protection Techniques and CryptographyCryptography ÇankayaÇankaya UniversityUniversity Talha SAVAŞTalha SAVAŞ b20500686@hacettepe.edu.trb20500686@hacettepe.edu.tr
  • 2. Outline of theOutline of the PresentationPresentation Basic Terminology in Cryptography Basic Security Goals Encryption & Decryption Basic Ciphers Block Ciphers Encryption Modes Secret Sharing (Threshold) IPSEC SSL/TLS Malicious Software References
  • 3. Basic Terminology in Cryptography
  • 4. Cryptography: The study of mathematical techniques related to aspects of providing information security services (to construct). Cryptanalysis: The study of mathematical techniques for attempting to defeat information security services (to break). Cryptology: The study of cryptography and cryptanalysis (both). Basic Terminology in Cryptography
  • 5. Computer Security: Ensure security of data kept on the computer. Network Security: Ensure security of communication over insecure medium. Approaches to Secure Communication: Steganography: Hides the existence of a message. Cryptography: Hide the meaning of a message. Information Security = CS + NS Basic Terminology in Cryptography
  • 8. Privacy (secrecy, confidentiality): Only the intended recipient can see the communication. Authenticity (integrity): The communication is generated by the alleged sender. Authorization: Limit the resources that a user can access. Availability: Make the services available 99.999…% of time. Non-repudiation: No party can refuse the validity of its actions. Auditing: Take a log of everything done in the system. Basic Security Goals
  • 10. Encryption (encipherment): The process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone except those possessing special knowledge. Decryption (decipherment): The process of making the encrypted information readable again. Key: The special knowledge shared between communicating parties. Plaintext: The data to be concealed. Ciphertext: The result of encryption on the plaintext. Encryption & DecryptionEncryption & Decryption
  • 13. Shift Cipher: A substitution cipher The Key Space: [1 .. 25] Encryption given a key K: Each letter in the plaintext P is replaced with the K’th letter following corresponding number (shift right). Decryption given K: (shift left). Basic CiphersBasic Ciphers
  • 14. Shift Cipher: An Example A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 P = CRYPTOGRAPHYISFUN K = 11 C = NCJAVZRCLASJTDQFY C 2+11 mod 26 = 13→ → N R 17+11 mod 26 = 2→ → C … N 13+11 mod 26 = 24→ →Y
  • 15. General Mono - alphabetical Substitution Cipher: The key space: all permutations of Σ = {A, B, C, …, Z} Encryption given a key :̟ Each letter X in the plaintext P is replaced with π(X). Decryption given a key :̟ Each letter Y in the ciphertext P is replaced with π-1(Y).̟ Example: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z π=B A D C Z H W Y G O Q X S V T R N M S K J I P F E U BECAUSE→AZDBJSZ Cryptanalysis: The key space size is 26! Basic CiphersBasic Ciphers
  • 16. Frequency Analysis: Frequency Features of English: Vowels, which constitute 40 % of plaintext, are often separated by consonants. Letter A is often found in the beginning of a word or second from last. Letter I is often third from the end of a word. Letter Q is followed only by U. Some words are more frequent, such as: the, and, at, is, on, in. Basic CiphersBasic Ciphers
  • 18. Summary: • Shift ciphers are easy to break using brute force attacks,they have small key space. • Substitution ciphers preserve language features and are vulnerable to frequency analysis attacks. Basic CiphersBasic Ciphers
  • 19. The Vigenère Cipher: Definition: Given m, a positive integer, P = C = (Z26)n, and K = (k1, k2, …, km) a key, we define: Encryption: ek(p1, p2… pm) = (p1+k1, p2+k2…pm+km) (mod 26) Decryption: dk(c1, c2… cm) = (c1-k1, c2-k2 … cm-km) (mod 26) Example: Plaintext: C R Y P T O G R A P H Y Key: L U C K L U C K L U C K Ciphertext: N L A Z E I I B L J J I Basic CiphersBasic Ciphers
  • 20. Vigenere Cipher: Cryptanalysis Find the length of the key. • Divide the message into that many shift cipher encryptions. • Use frequency analysis to solve the resulting shift ciphers. Vigenere cipher is vulnerable: once the key length is found, a cryptanalyst can apply frequency analysis. How to Find the Key Length? • For Vigenere, as the length of the keyword increases, the letter frequency shows less English-like characteristics and becomes more random. • One method to find the key length: Kasisky test. Basic CiphersBasic Ciphers
  • 21. Kasisky Test: Note: Two identical segments of plaintext, will be encrypted to the same ciphertext, if the they occur in the text at the distance Δ, (Δ≡0 (mod m), m is the key length). Algorithm: Search for pairs of identical segments of length at least 3 Record distances between the two segments: Δ1, Δ2, … m divides gcd(Δ1, Δ2, …) PT: T H E S U N A N D T H E M A N I N T H E M O O N Key: K I N G K I N G K I N G K I N G K I N G K I N G CT: D P R Y E V N T N B U K W I A O X B U K W W B T Basic CiphersBasic Ciphers
  • 23. Block size: In general larger block sizes mean greater security. Key size: Larger key size means greater security (larger key space). Number of rounds: Multiple rounds offer increasing security. Encryption modes: Define how messages larger than the block size are encrypted, very important for the security of the encrypted message. Block CiphersBlock Ciphers
  • 24. Feistel Network: A Feistel Network is fully specified given The block size: n = 2w number of rounds: d d round functions f1, f2…, fd: {0,1}w {0,1}w→ Each f function is a SP cipher. Used in DES, IDEA, RC5, and many other block ciphers. Block CiphersBlock Ciphers
  • 25. Encryption: L1=R0, R1=L0 ⊕ f1(R0) L2=R1, R2=L1 ⊕ f2(R1) ... Ld=Rd-1, Rd=Ld-1⊕ fd(Rd-1) Decryption: Rd-1=Ld, Ld-1=Rd ⊕ fd(Ld) … R0=L1, L0=R1 ⊕ f1(L1) Feistel Network
  • 26. Data Encryption Standard (DES): Features: Block size = 64 bits Key size = 56 bits Number of rounds = 16 16 intermediary keys, each 48 bits Block CiphersBlock Ciphers
  • 28. Details of DES Rounds: An initial permutation is applied on the plaintext. IP(x) = L0 R0 In each round: Li = Ri-1 Ri = Li-1 f(Ri-1, Ki)⊕ Block CiphersBlock Ciphers
  • 29. Details of DES Rounds: After the last round y = IP-1(R16L16) Block CiphersBlock Ciphers
  • 30. DES f Function: Block CiphersBlock Ciphers
  • 31. DES S-boxes: Block CiphersBlock Ciphers • S-boxes are the only non-linear elements in DES design. • Each S-box is a 4x16 matrix, values from 0 to 15 B = b1 b2 b3 b4 b5 b6 b1b6 = row b2b3b4b5 = column C = 4-bit the result
  • 32. Ex. B = 011011 Row= 01 Column=1101 C = 1001
  • 34. Electronic Code Book (ECB): Encryption ModesEncryption Modes • Message is broken into independent blocks of block_size bits; •(ECB): Each block encrypted separately. • Encryption: ci = Ek(xi) • Decryption: xi = Dk(ci)
  • 35. Cipher Block Chaining (CBC): Encryption ModesEncryption Modes (CBC): Next input depends upon previous output. • Encryption: Ci = Ek (Mi Ci-1), with C0=IV⊕ • Decryption: Mi= Ci-1 Dk(Ci), with C0=IV⊕
  • 36. Output Feedback Mode (OFB): Encryption ModesEncryption Modes • (OFB): Construct a pseudorandom number generator (PRNG) to obtain a one time pad and XOR the message with the pad. • y0=IV yi = Ek[yi-1]
  • 37. Cipher Feedback Mode (CFB): Encryption ModesEncryption Modes • (CFB): the message is XORed with the feedback of encrypting the previous block.
  • 38. Counter Mode (CTR): Encryption ModesEncryption Modes • Counter Mode (CTR): Another way to construct PRNG using DES. yi= Ek[counter+i] ci= yi xi⊕ • Sender and receiver share a counter value (does not need to be secret) and the secret key. Block Ciphers vs. Stream Ciphers: • A block cipher operates on blocks of fixed length. •A stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom cipher bit stream (keystream), typically by an exclusive-or (xor) operation.
  • 40. Counter Mode (CTR): Secret Sharing (Threshold)Secret Sharing (Threshold) • Counter Mode (CTR): Another way to construct PRNG using DES. yi= Ek[counter+i] ci= yi xi⊕ • Sender and receiver share a counter value (does not need to be secret) and the secret key. Block Ciphers vs. Stream Ciphers: • A block cipher operates on blocks of fixed length. •A stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom cipher bit stream (keystream), typically by an exclusive-or (xor) operation.
  • 41. Counter Mode (CTR): • Counter Mode (CTR): Another way to construct PRNG using DES. yi= Ek[counter+i] ci= yi xi⊕ • Sender and receiver share a counter value (does not need to be secret) and the secret key. Block Ciphers vs. Stream Ciphers: • A block cipher operates on blocks of fixed length. •A stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom cipher bit stream (keystream), typically by an exclusive-or (xor) operation. Secret Sharing (Threshold)Secret Sharing (Threshold)
  • 42. IPSEC
  • 45. References Cristina Nita-Rotaru Associate Professor Department of Computer Science Purdue University Internet Wikipedia Cryptography Decrypted by H.X. Mel, D. M. Baker