This document provides an overview of classical cryptography topics, including:
- The goals of cryptography in ensuring secure communication over insecure channels.
- Approaches like steganography and cryptography.
- Basic terminology for encryption like plaintext, ciphertext, and keys.
- Classic ciphers like the shift cipher, monoalphabetic and polyalphabetic substitution ciphers, and the Vigenere cipher. It discusses cryptanalysis techniques like frequency analysis and the Kasisky test.
- The one-time pad cipher and the concept of perfect secrecy if random keys are used only once.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
2. CS526 Topic 2: Classical Cryptography 2
Readings for This Lecture
Required readings:
– Cryptography on Wikipedia
Interesting reading
– The Code Book by Simon
Singh
3. CS526 Topic 2: Classical Cryptography 3
Goals of Cryptography
• The most fundamental problem cryptography
addresses: ensure security of communication
over insecure medium
• What does secure communication mean?
– confidentiality (secrecy)
• only the intended recipient can see the communication
– integrity (authenticity)
• the communication is generated by the alleged sender
• What does insecure medium mean?
– Two basic possibilities:
• Passive attacker: the adversary can eavesdrop
• Active attacker: the adversary has full control over the
communication channel
4. CS526 Topic 2: Classical Cryptography 4
Approaches to Secure Communication
• Steganography
– “covered writing”
– hides the existence of a message
– depends on secrecy of method
• Cryptography
– “hidden writing”
– hide the meaning of a message
– depends on secrecy of a short key, not method
5. CS526 Topic 2: Classical Cryptography 5
Basic Terminology for Encryption
• Plaintext original message
• Ciphertext transformed message
• Key secret used in transformation
• Encryption
• Decryption
• Cipher algorithm for encryption/decryption
6. CS526 Topic 2: Classical Cryptography 6
Shift Cipher
• The Key Space:
– [0 .. 25]
• Encryption given a key K:
– each letter in the plaintext P is
replaced with the K’th letter
following corresponding number
(shift right)
• Decryption given K:
– shift left
History: K = 3, Caesar’s cipher
7. CS526 Topic 2: Classical Cryptography 7
Shift Cipher: Cryptanalysis
• Can an attacker find K?
– YES: by a bruteforce attack through
exhaustive key search.
• key space is small (<= 26 possible keys).
– How much ciphertext is needed?
• Lessons:
– Key space needs to be large enough.
– Exhaustive key search can be effective.
8. CS526 Topic 2: Classical Cryptography 8
Mono-alphabetic Substitution Cipher
• The key space: all permutations of = {A, B, C, …, Z}
• Encryption given a key :
– each letter X in the plaintext P is replaced with (X)
• Decryption given a key :
– each letter Y in the cipherext P is replaced with -1(Y)
Example:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
= B A D C Z H W Y G O Q X S V T R N M L K J I P F E U
BECAUSE AZDBJSZ
9. CS526 Topic 2: Classical Cryptography 9
Strength of the Mono-alphabetic
Substitution Cipher
• Exhaustive search is difficult
– key space size is 26! 4×1026 288
• Dominates the art of secret writing throughout
the first millennium A.D.
• Thought to be unbreakable by many back then
• How to break it?
10. CS526 Topic 2: Classical Cryptography 10
Cryptanalysis of Substitution Ciphers:
Frequency Analysis
• Basic ideas:
– Each language has certain features:
frequency of letters, or of groups of two or
more letters.
– Substitution ciphers preserve the language
features.
– Substitution ciphers are vulnerable to
frequency analysis attacks.
– How much ciphertext is required?
11. CS526 Topic 2: Classical Cryptography 11
Frequency of Letters in English
0
2
4
6
8
10
12
14
a b c d e f g h i j k l m n o p q r s t u v w x y z
Series1
12. How to Defeat Frequency
Analysis?
• Use larger blocks as the basis of substitution.
Rather than substituting one letter at a time,
substitute 64 bits at a time, or 128 bits.
– Leads to block ciphers such as DES & AES.
• Use different substitutions to get rid of frequency
features.
– Leads to polyalphabetical substituion ciphers, and to
stream ciphers such as RC4
CS526 Topic 2: Classical Cryptography 12
13. CS526 Topic 2: Classical Cryptography 13
Towards the Polyalphabetic
Substitution Ciphers
• Main weaknesses of monoalphabetic substitution
ciphers
– In ciphertext, different letters have different frequency
• each letter in the ciphertext corresponds to only one
letter in the plaintext letter
• Idea for a stronger cipher (1460’s by Alberti)
– Use more than one substitutions, and switch between
them when encrypting different letters
• As result, frequencies of letters in ciphertext are similar
• Developed into an easy-to-use cipher by
Vigenère (published in 1586)
14. CS526 Topic 2: Classical Cryptography 14
The Vigenère Cipher
Treat letters as numbers: [A=0, B=1, C=2, …, Z=25]
Number Theory Notation: Zn= {0, 1, …, n-1}
Definition:
Given m, a positive integer, P = C = (Z26)n, and K =
(k1, k2, … , km) a key, we define:
Encryption:
ek(p1, p2… pm) = (p1+k1, p2+k2…pm+km) (mod 26)
Decryption:
dk(c1, c2… cm) = (c1-k1, c2-k2 … cm- km) (mod 26)
Example:
Plaintext: C R Y P T O G R A P H Y
Key: L U C K L U C K L U C K
Ciphertext: N L A Z E I I B L J J I
15. CS526 Topic 2: Classical Cryptography 15
Security of Vigenere Cipher
• Vigenere masks the frequency with which a
character appears in a language: one letter in
the ciphertext corresponds to multiple letters
in the plaintext. Makes the use of frequency
analysis more difficult.
• Any message encrypted
by a Vigenere cipher is a
collection of as many shift ciphers as there
are letters in the key.
16. CS526 Topic 2: Classical Cryptography 16
Vigenere Cipher: Cryptanalysis
• Find the length of the key.
– Kasisky test
– Index of coincidence (we
won’t cover here)
• Divide the message into
that many shift cipher
encryptions.
• Use frequency analysis to
solve the resulting shift
ciphers.
– How?
17. CS526 Topic 2: Classical Cryptography 17
Kasisky Test for Finding Key Length
• Observation: two identical segments of plaintext,
will be encrypted to the same ciphertext, if they
occur in the text at a distance such that is a
multiple of m, the key length.
• Algorithm:
– Search for pairs of identical
segments of length at least 3
– Record distances between
the two segments: 1, 2, …
– m divides gcd(1, 2, …)
18. CS526 Topic 2: Classical Cryptography 18
Example of the Kasisky Test
Key K I N G K I N G K I N G K I N G K I N G K I N G
PT t h e s u n a n d t h e m a n i n t h e m o o n
CT D P R Y E V N T N B U K W I A O X B U K W W B T
Repeating patterns (strings of length 3 or more) in ciphertext are
likely due to repeating plaintext strings encrypted under
repeating key strings; thus the location difference should be
multiples of key lengths.
19. CS526 Topic 3: One-time Pad and Perfect
Secrecy
19
One-Time Pad
• Fix the vulnerability of the Vigenere cipher by
using very long keys
• Key is a random string that is at least as long as
the plaintext
• Encryption is similar to shift cipher
• Invented by Vernam in the 1920s
20. CS526 Topic 3: One-time Pad and Perfect
Secrecy
20
One-Time Pad
Let Zm ={0,1,…,m-1} be
the alphabet.
Plaintext space = Ciphtertext space = Key space =
(Zm)n
The key is chosen uniformly randomly
Plaintext X = (x1 x2 … xn)
Key K = (k1 k2 … kn)
Ciphertext Y = (y1 y2 … yn)
ek(X) = (x1+k1 x2+k2 … xn+kn) mod m
dk(Y) = (y1-k1 y2-k2 … yn-kn) mod m
21. CS526 Topic 3: One-time Pad and Perfect
Secrecy
21
The Binary Version of One-Time Pad
Plaintext space = Ciphtertext space =
Keyspace = {0,1}n
Key is chosen randomly
For example:
• Plaintext is 11011011
• Key is 01101001
• Then ciphertext is 10110010
22. CS526 Topic 3: One-time Pad and Perfect
Secrecy
22
Bit Operators
• Bit AND
0 0 = 0 0 1 = 0 1 0 = 0 1 1 = 1
• Bit OR
0 0 = 0 0 1 = 1 1 0 = 1 1 1 = 1
• Addition mod 2 (also known as Bit XOR)
0 0 = 0 0 1 = 1 1 0 = 1 1 1 = 0
• Can we use operators other than Bit XOR for binary
version of One-Time Pad?
23. CS526 Topic 3: One-time Pad and Perfect
Secrecy
24
Key Randomness in One-Time Pad
• One-Time Pad uses a very long key, what if the
key is not chosen randomly, instead, texts from,
e.g., a book are used as keys.
– this is not One-Time Pad anymore
– this can be broken
– How?
• Corrolary: The key in One-Time Pad should
never be reused.
– If it is reused, it is Two-Time Pad, and is insecure!
– Why?
24. Usage of One-Time Pad
• To use one-time pad, one must have keys as long as the
messages.
• To send messages totaling certain size, sender and
receiver must agree on a shared secret key of that size.
– typically by sending the key over a secure channel
• Key agreement is difficult to do in practice.
• Can’t one use the channel for sending the key to send
the messages instead?
• Why is OTP still useful, even though difficult to use?
CS526 Topic 3: One-time Pad and Perfect
Secrecy
25
25. Usage of One-Time Pad
• The channel for distributing keys may exist at a
different time from when one has messages to
send.
• The channel for distributing keys may have the
property that keys can be leaked, but such
leakage will be detected
– Such as in Quantum cryptography
CS526 Topic 3: One-time Pad and Perfect
Secrecy
26
26. CS526 Topic 2: Classical Cryptography 27
Adversarial Models for Ciphers
• The language of the plaintext and the nature of the
cipher are assumed to be known to the adversary.
• Ciphertext-only attack: The adversary knows only a
number of ciphertexts.
• Known-plaintext attack: The adversary knows some
pairs of ciphertext and corresponding plaintext.
• Chosen-plaintext attack: The adversary can choose
a number of messages and obtain the ciphertexts
• Chosen-ciphertext attack: The adversary can
choose a number of ciphertexts and obtain the
plaintexts.
What kinds of attacks have we considered so far?
When would these attacks be relevant in wireless communications?
27. CS526 Topic 2: Classical Cryptography 28
The Open Design Security Principle
• Kerckhoffs's Principle:
– A cryptosystem should be secure even if everything
about the system, except the key, is public knowledge.
• Shannon's maxim:
– "The enemy knows the system."
• Security by obscurity doesn’t work
• Should assume that the adversary knows the
algorithm; the only secret the adversary is
assumed to not know is the key
• What is the difference between the algorithm and
the key?