SlideShare a Scribd company logo
Cryptanalysis



                        Jonathan Rajewski



   © 2012 Jonathan T Rajewski               1
Overview
•   Thirty Five Slides of Lecture
•   Review Cryptology
•   Attacking Applications
•   Attacking the cyphers we discussed
•   FOR270 Crypto Challenge
    – Until we have a winner!



                      © 2012 Jonathan T Rajewski   2
The 3 Siezs




 © 2012 Jonathan T Rajewski   3
The Three C’s
• Cryptography
• Cryptanalysis
• Cryptology
                                          3 C’s

                  Crypto
                  © 2012 Jonathan T Rajewski      4
Basic Cryptanalysis




     © 2012 Jonathan T Rajewski   5
Quick Case Study




    © 2012 Jonathan T Rajewski   6
Case Study
When you enter your username and password
             what happens?




               © 2012 Jonathan T Rajewski   7
Case Study
       Authentication

Username + Password = Success




         © 2012 Jonathan T Rajewski   8
© 2012 Jonathan T Rajewski   9
© 2012 Jonathan T Rajewski   10
Attacking Applications


Learn how the application creates passwords!




                © 2012 Jonathan T Rajewski     11
FTP
                                                       Filezilla Graphical User
                                                       Interface




*Hypothetical Situation   © 2012 Jonathan T Rajewski                          12
FTP
 In our FTP client, user credentials are stored in an INI file.

 Boris is the target of the investigation. We currently have no
 idea how the application stores user credentials.

 We create a new profile named dummy with a password 1111.
 The PWD value appears similar to one byte per character in
 the password and, further, appears to look like the ASCII
 representation. What we find:

 Password:           1        1      1      1
 ASCII:             0x31     0x31   0x31   0x31
 PWD value:         0x31     0x32   0x33   0x34

 There is an obvious pattern!!!!

 Let's derive the other password....

 PWD value:         0x42     0x70   0x74   0x6C    0x77    0x4E
 ASCII:             0x42     0x6F   0x72   0x69    0x73    0x49
 Password:           B        o      r      i       s       I
© 2012 Jonathan T Rajewski                                    13
Let’s try it!
Password.ini file contains the following data.
          Decrypt the password

   PWD value:   0x70   0x62   0x75     0x76      0x7B   0x75   0x79   0x45
       ASCII:   0x     0x     0x       0x        0x     0x     0x     0x
    Password:




                         © 2012 Jonathan T Rajewski                          14
Let’s try it!
Password.ini file contains the following data.
          Decrypt the password

   PWD value:   0x70   0x62   0x75     0x76      0x7B   0x75   0x79   0x45
       ASCII:   0x70   0x61   0x73     0x73      0x77   0x70   0x73   0x4C
    Password:     P      A      S        S         W      O      R      D




                         © 2012 Jonathan T Rajewski                          15
Basic Cryptosystems
• Basic Ciphers
  – Substitution
     • Replacing one character with another “X”
  – Transposition
     • Rearranging the message




                      © 2012 Jonathan T Rajewski   16
Substitution Ciphers
• Most famous: Caesar's Cipher
   – Shift each letter to the right by 3
• ROT 13
                1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
    Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
    Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



• Substitute letters for others
   – A is T
   – B is R
   – C is B

                               © 2012 Jonathan T Rajewski                     17
Where are we seeing ROT13?


       NTUSER.datSoftwareMicrosoftWindows
         CurrentVersionExplorerUserAssist




         © 2012 Jonathan T Rajewski     18
Where are we seeing ROT13?




        http://www.csoonline.com/article/570813/data-exfiltration-how-data-gets-out


            © 2012 Jonathan T Rajewski                                                19
Tools to parse ROT13
• Volatility Plugin (Levy)
  – http://gleeda.blogspot.com/2011/04/volatility-14-
    userassist-plugin.html
• RegRipper (Carvy)
  – http://regripper.wordpress.com/
• ROT13.com



                    © 2012 Jonathan T Rajewski      20
How to parse ROT13 by hand
            1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



                       CipherText                PlainText

                           N                          A
                           C                          P
                           C                          P
                           Y                          L
                           R                          E
                               © 2012 Jonathan T Rajewski                 21
Breaking Basic Ciphers
• Simple (monoalphabetic) substitution ciphers
  easily broken with Frequency Analysis
Letters: E T O A N I R S H D L C W U M F Y G P B V K X Q J Z

Digraphs: TH HE IN ER ED AN ND AR RE EN ED TO NT EA OU NG ST AS

Trigraphs: THE AND ING HER NTH ENT THA INT ERE DTH EAR HAT OFT


• More complex (polyalphabetic) substitution
  ciphers use multiple alphabets!


                       © 2012 Jonathan T Rajewski                22
Columnar Transposition Cipher
• Disguising the message by rearranging the letters

   – Plaintext:
       • FOR270 IS SO MUCH FUN DONTCA THINK
            FOR270ISSOMU
            CHFUNDONTCHA
            THINKQWERTYU
       • cipher: fct ohh rfi 2un 7nk 0dq iow snr str oct mhy uau
       • cipher enhanced: fctohhrfi2un7nk0dqiowsnrstroctmhyuau




                                © 2012 Jonathan T Rajewski         23
Breaking the Columnar Transposition
               Cipher
  For all intensive purposes for this “cryptanalysis by hand in a
  quick timeframe” we are going to attempt to guess the rows
                          and columns

          cipher: dygi ioet dutx
cipher enhanced: dygiioetdutx


                         didyougetit


                         © 2012 Jonathan T Rajewski                 24
Vigenère Square

                    Ciphertext is intersection of key column and plaintext row.


                    Plaintext: DFIRISGREAT (Side)
                          Key: NTFSNTFSNTF (Top)
                           Ct: QYNJVLLYRTY (Intersect)




   © 2012 Jonathan T Rajewski                                                 25
Vigenère Square Decryption


                                 Ct: STYXMYYEGYRR (Intersect)
                                Key: FATFATFATFAT (Side)
                          Plaintext: NTFSMFTENTRY (Top)




         © 2012 Jonathan T Rajewski                        26
© 2012 Jonathan T Rajewski   27
Crypto Challenge
• Scenario
  – You work for the “SUPER SECRET 5 LETTER
    AGENCY”
  – An ultra sophisticated ciphertext was located on
    an internal server
  – Our team of cryptographers are actively working
    on breaking the code but we need your help!!!



                    © 2012 Jonathan T Rajewski         28
Phase 1
The following ciphertext was found by the
cryptographers. They believe it could have
 something to do with the userassist key.

            ovg_qbg_yl_fynfu_m7mKvx

            1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13
Plaintext   a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher      n o p q r s t u v w x y z a b c d e f g h i j k l m



                            © 2012 Jonathan T Rajewski                    29
Phase 1 Review
Did you get it?
  – ROT13 encryption.

         CT: ovg_qbg_yl_fynfu_m7mKvx
         PT: bit_dot_ly_slash_z7zXik
     PT Decoded: bit.ly/z7zXik




                   © 2012 Jonathan T Rajewski   30
Phase 2
We just learned from the cryptographers that
more this code may indicated a hidden key for
   the next aspect of the cryptanalysis….

   Visit this link and try to decode the data
                http://bit.ly/x2qppi



                  © 2012 Jonathan T Rajewski    31
Phase 2 Review

F   O   R   E     N      S      I      C




A   T   O R


                Forensicator




                  © 2012 Jonathan T Rajewski   32
Phase 3
   We identified the final encrypted string of
  ciphertext by analyzing ram using Volatility.
           Yay for open source tools!
Agency cryptologists believe that you will “crack
     the case” and reveal the cyber villain.

Please analyze:
  CT: ICLKGZMRUZ
  Key: FORENSICATOR (you wont need the entire key)
                       © 2012 Jonathan T Rajewski    33
Phase 3
                Please analyze:
                       CT: ICLKGZMRUZ (Intersect)
                       Key: FORENSICATOR (Side)
                       PT: (Top)

                       Hint – you wont need the entire Key




© 2012 Jonathan T Rajewski                                   34
Phase 3 Review
                          Ct: ICLKGZMRUZ(Intersect)
                         Key: FORENSICAT(Side)
                   Plaintext: DOUGTHEPUG(Top)




   © 2012 Jonathan T Rajewski                         35
Phase 4
 The end is here. This is the most complicated
 ciphertext yet. Doug the Pug “cracked” during
interrogation and revealed his secret partner in
                     crime.



    Next class we will look at the ADFGVX


                  © 2012 Jonathan T Rajewski   36

More Related Content

Viewers also liked

методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниkgospodinova89
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
joycruiser
 
Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 

Viewers also liked (11)

методи за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данниметоди за криптиране и декриптиране на данни
методи за криптиране и декриптиране на данни
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar to Cryptanalysis Lecture

The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
Andy LoPresto
 
Node.js and Blockchain
Node.js and BlockchainNode.js and Blockchain
Node.js and Blockchain
Julián David Duque
 
Formal analysis-crypto-proto
Formal analysis-crypto-protoFormal analysis-crypto-proto
Formal analysis-crypto-proto
Dr. Jayaraj Poroor
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness Beacon
Ioannis Psaras
 
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate UseHyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Robert Tochman-Szewc
 
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
DataScienceConferenc1
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
Saumil Shah
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityCode Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
Luis Fraile
 
richard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdfrichard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdf
Richard Rodger
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
Alessandro Cinelli (cirpo)
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
Michele Orselli
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8
Mario Heiderich
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노
ethconkr
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
Blockstrap.com
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
Marshall Swatt
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
Derek King
 
Padding oracle [opkoko2011]
Padding oracle [opkoko2011]Padding oracle [opkoko2011]
Padding oracle [opkoko2011]
blaufish
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
SSIMeetup
 
Crypto
CryptoCrypto
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
Dan Kaminsky
 

Similar to Cryptanalysis Lecture (20)

The Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect DataThe Thing About Protecting Data Is, You Have To Protect Data
The Thing About Protecting Data Is, You Have To Protect Data
 
Node.js and Blockchain
Node.js and BlockchainNode.js and Blockchain
Node.js and Blockchain
 
Formal analysis-crypto-proto
Formal analysis-crypto-protoFormal analysis-crypto-proto
Formal analysis-crypto-proto
 
Module: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness BeaconModule: drand - the Distributed Randomness Beacon
Module: drand - the Distributed Randomness Beacon
 
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate UseHyperledger Fabric: A Custom Blockchain Solution for Corporate Use
Hyperledger Fabric: A Custom Blockchain Solution for Corporate Use
 
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
[Cryptica 22] Tenderly - Your Lens To Blockchain - Nebojsa Urosevic
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
 
Code Security with GitHub Advanced Security
Code Security with GitHub Advanced SecurityCode Security with GitHub Advanced Security
Code Security with GitHub Advanced Security
 
richard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdfrichard-rodger-awssofia-microservices-2019.pdf
richard-rodger-awssofia-microservices-2019.pdf
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
 
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
BDD - Buzzword Driven Development - Build the next cool app for fun and for.....
 
Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8Generic Attack Detection - ph-Neutral 0x7d8
Generic Attack Detection - ph-Neutral 0x7d8
 
[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노[ETHCon Korea 2019] Lee heungno 이흥노
[ETHCon Korea 2019] Lee heungno 이흥노
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
From Bits to Bitcoin, Presented by Marshall Swatt Mar 2016
 
Needlesand haystacks i360-dublin
Needlesand haystacks i360-dublinNeedlesand haystacks i360-dublin
Needlesand haystacks i360-dublin
 
Padding oracle [opkoko2011]
Padding oracle [opkoko2011]Padding oracle [opkoko2011]
Padding oracle [opkoko2011]
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Crypto
CryptoCrypto
Crypto
 
A Technical Dive into Defensive Trickery
A Technical Dive into Defensive TrickeryA Technical Dive into Defensive Trickery
A Technical Dive into Defensive Trickery
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Cryptanalysis Lecture

  • 1. Cryptanalysis Jonathan Rajewski © 2012 Jonathan T Rajewski 1
  • 2. Overview • Thirty Five Slides of Lecture • Review Cryptology • Attacking Applications • Attacking the cyphers we discussed • FOR270 Crypto Challenge – Until we have a winner! © 2012 Jonathan T Rajewski 2
  • 3. The 3 Siezs © 2012 Jonathan T Rajewski 3
  • 4. The Three C’s • Cryptography • Cryptanalysis • Cryptology 3 C’s Crypto © 2012 Jonathan T Rajewski 4
  • 5. Basic Cryptanalysis © 2012 Jonathan T Rajewski 5
  • 6. Quick Case Study © 2012 Jonathan T Rajewski 6
  • 7. Case Study When you enter your username and password what happens? © 2012 Jonathan T Rajewski 7
  • 8. Case Study Authentication Username + Password = Success © 2012 Jonathan T Rajewski 8
  • 9. © 2012 Jonathan T Rajewski 9
  • 10. © 2012 Jonathan T Rajewski 10
  • 11. Attacking Applications Learn how the application creates passwords! © 2012 Jonathan T Rajewski 11
  • 12. FTP Filezilla Graphical User Interface *Hypothetical Situation © 2012 Jonathan T Rajewski 12
  • 13. FTP In our FTP client, user credentials are stored in an INI file. Boris is the target of the investigation. We currently have no idea how the application stores user credentials. We create a new profile named dummy with a password 1111. The PWD value appears similar to one byte per character in the password and, further, appears to look like the ASCII representation. What we find: Password: 1 1 1 1 ASCII: 0x31 0x31 0x31 0x31 PWD value: 0x31 0x32 0x33 0x34 There is an obvious pattern!!!! Let's derive the other password.... PWD value: 0x42 0x70 0x74 0x6C 0x77 0x4E ASCII: 0x42 0x6F 0x72 0x69 0x73 0x49 Password: B o r i s I © 2012 Jonathan T Rajewski 13
  • 14. Let’s try it! Password.ini file contains the following data. Decrypt the password PWD value: 0x70 0x62 0x75 0x76 0x7B 0x75 0x79 0x45 ASCII: 0x 0x 0x 0x 0x 0x 0x 0x Password: © 2012 Jonathan T Rajewski 14
  • 15. Let’s try it! Password.ini file contains the following data. Decrypt the password PWD value: 0x70 0x62 0x75 0x76 0x7B 0x75 0x79 0x45 ASCII: 0x70 0x61 0x73 0x73 0x77 0x70 0x73 0x4C Password: P A S S W O R D © 2012 Jonathan T Rajewski 15
  • 16. Basic Cryptosystems • Basic Ciphers – Substitution • Replacing one character with another “X” – Transposition • Rearranging the message © 2012 Jonathan T Rajewski 16
  • 17. Substitution Ciphers • Most famous: Caesar's Cipher – Shift each letter to the right by 3 • ROT 13 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m • Substitute letters for others – A is T – B is R – C is B © 2012 Jonathan T Rajewski 17
  • 18. Where are we seeing ROT13? NTUSER.datSoftwareMicrosoftWindows CurrentVersionExplorerUserAssist © 2012 Jonathan T Rajewski 18
  • 19. Where are we seeing ROT13? http://www.csoonline.com/article/570813/data-exfiltration-how-data-gets-out © 2012 Jonathan T Rajewski 19
  • 20. Tools to parse ROT13 • Volatility Plugin (Levy) – http://gleeda.blogspot.com/2011/04/volatility-14- userassist-plugin.html • RegRipper (Carvy) – http://regripper.wordpress.com/ • ROT13.com © 2012 Jonathan T Rajewski 20
  • 21. How to parse ROT13 by hand 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m CipherText PlainText N A C P C P Y L R E © 2012 Jonathan T Rajewski 21
  • 22. Breaking Basic Ciphers • Simple (monoalphabetic) substitution ciphers easily broken with Frequency Analysis Letters: E T O A N I R S H D L C W U M F Y G P B V K X Q J Z Digraphs: TH HE IN ER ED AN ND AR RE EN ED TO NT EA OU NG ST AS Trigraphs: THE AND ING HER NTH ENT THA INT ERE DTH EAR HAT OFT • More complex (polyalphabetic) substitution ciphers use multiple alphabets! © 2012 Jonathan T Rajewski 22
  • 23. Columnar Transposition Cipher • Disguising the message by rearranging the letters – Plaintext: • FOR270 IS SO MUCH FUN DONTCA THINK FOR270ISSOMU CHFUNDONTCHA THINKQWERTYU • cipher: fct ohh rfi 2un 7nk 0dq iow snr str oct mhy uau • cipher enhanced: fctohhrfi2un7nk0dqiowsnrstroctmhyuau © 2012 Jonathan T Rajewski 23
  • 24. Breaking the Columnar Transposition Cipher For all intensive purposes for this “cryptanalysis by hand in a quick timeframe” we are going to attempt to guess the rows and columns cipher: dygi ioet dutx cipher enhanced: dygiioetdutx didyougetit © 2012 Jonathan T Rajewski 24
  • 25. Vigenère Square Ciphertext is intersection of key column and plaintext row. Plaintext: DFIRISGREAT (Side) Key: NTFSNTFSNTF (Top) Ct: QYNJVLLYRTY (Intersect) © 2012 Jonathan T Rajewski 25
  • 26. Vigenère Square Decryption Ct: STYXMYYEGYRR (Intersect) Key: FATFATFATFAT (Side) Plaintext: NTFSMFTENTRY (Top) © 2012 Jonathan T Rajewski 26
  • 27. © 2012 Jonathan T Rajewski 27
  • 28. Crypto Challenge • Scenario – You work for the “SUPER SECRET 5 LETTER AGENCY” – An ultra sophisticated ciphertext was located on an internal server – Our team of cryptographers are actively working on breaking the code but we need your help!!! © 2012 Jonathan T Rajewski 28
  • 29. Phase 1 The following ciphertext was found by the cryptographers. They believe it could have something to do with the userassist key. ovg_qbg_yl_fynfu_m7mKvx 1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5 6 7 8 9 10 11 12 13 Plaintext a b c d e f g h i j k l m n o p q r s t u v w x y z Cipher n o p q r s t u v w x y z a b c d e f g h i j k l m © 2012 Jonathan T Rajewski 29
  • 30. Phase 1 Review Did you get it? – ROT13 encryption. CT: ovg_qbg_yl_fynfu_m7mKvx PT: bit_dot_ly_slash_z7zXik PT Decoded: bit.ly/z7zXik © 2012 Jonathan T Rajewski 30
  • 31. Phase 2 We just learned from the cryptographers that more this code may indicated a hidden key for the next aspect of the cryptanalysis…. Visit this link and try to decode the data http://bit.ly/x2qppi © 2012 Jonathan T Rajewski 31
  • 32. Phase 2 Review F O R E N S I C A T O R Forensicator © 2012 Jonathan T Rajewski 32
  • 33. Phase 3 We identified the final encrypted string of ciphertext by analyzing ram using Volatility. Yay for open source tools! Agency cryptologists believe that you will “crack the case” and reveal the cyber villain. Please analyze: CT: ICLKGZMRUZ Key: FORENSICATOR (you wont need the entire key) © 2012 Jonathan T Rajewski 33
  • 34. Phase 3 Please analyze: CT: ICLKGZMRUZ (Intersect) Key: FORENSICATOR (Side) PT: (Top) Hint – you wont need the entire Key © 2012 Jonathan T Rajewski 34
  • 35. Phase 3 Review Ct: ICLKGZMRUZ(Intersect) Key: FORENSICAT(Side) Plaintext: DOUGTHEPUG(Top) © 2012 Jonathan T Rajewski 35
  • 36. Phase 4 The end is here. This is the most complicated ciphertext yet. Doug the Pug “cracked” during interrogation and revealed his secret partner in crime. Next class we will look at the ADFGVX © 2012 Jonathan T Rajewski 36