Professional Documents
Culture Documents
Cryptography and Network Security: Xiang-Yang Li
Cryptography and Network Security: Xiang-Yang Li
Cryptography and Network Security: Xiang-Yang Li
Security
Xiang-Yang Li
Introduction
The art of war teaches us not on the likelihood
of the enemys not coming, but on our own
readiness to receive him; not on the chance of
his not attacking, but rather on the fact that
we have made our position unassailable.
--The art of War, Sun Tzu
Information Transferring
Attack: Interruption
Attack: Interception
Attack: Modification
Attack: Fabrication
! Security
Attacks
compromises the information security
Services
" Enhances
! Security
" Detect,
mechanism
prevent and recover from a security
attack
CS595-Cryptography and Network Security
authentication, integrity,
non-repudiation, non-deny, availability,
identification,
Attacks
!
Passive attacks
"
Interception
#
#
Active attacks
"
Masquerade
Replay
Modification
Denial of service
CS595-Cryptography and Network Security
principal
Security
transformation
Security
transformation
opponent
CS595-Cryptography and Network Security
Cryptography
!
Basic Concepts
!
Cryptography
"
Plaintext
"
Ciphertext
"
Basic Concepts
!
Cipher
"
Key
"
Encipher (encode)
"
Decipher (decode)
"
Basic Concepts
!
Cryptanalysis
"
Cryptology
"
Code
"
Plaintext
Encipher C = E(K1)(P)
Security
! Two
" Unconditional
#
security
" Computational
#
security
History
!
Ancient ciphers
"
"
"
"
"
History
!
Ancient ciphers
"
"
"
"
Product cipher:
"
ciphertext
Encipher C = E(K)(P)
Decipher P = D(K)(C)
Key source
Key Management
! Using
secret channel
! Encrypt the key
! Third trusted party
! The sender and the receiver generate key
" The
Attacks
! Recover
the message
! Recover the secret key
" Thus
! Thus
Possible Attacks
!
Ciphertext only
"
Known plaintext
"
Chosen ciphertext
"
Chosen plaintext
"
Algorithm, ciphertext
Chosen text
"
Steganography
! Conceal
" Character
marking
" Invisible ink
" Pin punctures
" Typewriter correction ribbon
! Cryptography
renders message
unintelligible!
CS595-Cryptography and Network Security
Contemporary Equiv.
! Least
" 2048x3072
overhead
" Virtually useless if system is known
Caesar Cipher
! Replace
Mathematical Model
! Description
E(k) : i i + k mod 26
" Decryption D(k) : i i - k mod 26
" Encryption
Key space: 26
"
Example
"
"
"
GDUCUGQFRMPCNJYACJCRRCPQ
HEVDVHRGSNQDOKZBDKDSSDQR
Plaintext:
JGXFXJTIUPSFQMBDFMFUUFSTKHYGYKUJVGRNCEGNG
VVGTU
Ciphertext:
LIZHZLVKWRUHSODFHOHWWHUVMJAIAMWXSVITPEGI
PIXXIVW
CS595-Cryptography and Network Security
Character Frequencies
!
"
"
Letter
" A,B,C,D,E,..
! Double
Letter
" TH,HE,IN,ER,RE,ON,AN,EN,.
! Triple
Letter
" THE,AND,TIO,ATI,FOR,THA,TER,RES,
gcd(a,26) = 1
" Otherwise, not reversible
" So, a2, 13, 26
" Caesar cipher: a=1
CS595-Cryptography and Network Security
Cryptanalysis
! Key
space:23*26
" Brute
force search
! Use
Playfair Cipher
Used in WWI and WWII
s
e
f
o
v
i/j
a
g
q
w
m
b
h
r
x
p
c
k
t
y
l
d
n
u
z
Key: simple
CS595-Cryptography and Network Security
Playfair Cipher
! Use
ac--bd
" Same
#
qw--wi
" Otherwisesquares
#
ar--bq
CS595-Cryptography and Network Security
Analysis
! Size
of diagrams: 25!
! Difficult using frequency analysis
" But
Hill Cipher
! Encryption
" Assign
mod 26
Analysis
! Difficult
Polyalphabetic Substitution
! Use
Vigenre Cipher
Basically multiple Caesar ciphers
! key is multiple letters long
!
"
"
"
K = k1 k2 ... kd
ith letter specifies ith alphabet to use
use each alphabet in turn, repeating from start after d
letters in message
Plaintext THISPROCESSCANALSOBEEXPRESSED
Keyword CIPHERCIPHERCIPHERCIPHERCIPHE
Ciphertext VPXZTIQKTZWTCVPSWFDMTETIGAHLH
CS595-Cryptography and Network Security
One-time Pad
! Gilbert
Vernam (AT&T)
! Encryption
" C=PK
! Decryption
" P=CK
! Difficulty:
Transposition Methods
! Permutation
of plaintext
! Example
" Write
! Enhance:
" Can