1 / 24

Cryptanalysis

Cryptanalysis. Network Security. Cryptanalysis. Objectives of the Topic After completing this topic, a student will be able to e xplain Cryptanalysis. Cryptanalysis. Figures and material in this topic have been

johnnym
Download Presentation

Cryptanalysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptanalysis Network Security

  2. Cryptanalysis Objectives of the Topic • After completing this topic, a student will be able to • explain Cryptanalysis.

  3. Cryptanalysis Figures and material in this topic have been • adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

  4. Cryptanalysis • Cryptography - study of encryption principles/methods. • Cryptanalysis (code breaking) - study of principles/methods of deciphering ciphertext without knowing key.

  5. Cryptanalysis • Cryptographic systems are generically classified along three independent dimensions.

  6. Cryptanalysis 1. The type of operations used for transforming plaintext to ciphertext. • two general principles: • Substitution • Transposition

  7. Cryptanalysis Substitution: • Each element (bit, letter, group of bits or letters) in the plaintext is mapped into another element.

  8. Cryptanalysis Transposition: • Elements in the plaintext are rearranged. • Fundamental requirement is that no information be lost. • Product systems involve multiple stages of substitutions and transpositions.

  9. Cryptanalysis 2. The number of keys used. • Referred to as symmetric, single-key, secret-key, or conventional encryption if both sender and receiver use the same key.

  10. Cryptanalysis • Referred to as asymmetric, two-key, or public-key encryption if the sender and receiver each use a different key.

  11. Cryptanalysis 3. The way in which the plaintext is processed. • A block cipher processes the input one block of elements at a time, producing an output block for each input block.

  12. Cryptanalysis • A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along.

  13. Cryptanalysis Cryptanalysis • The strategy used by the cryptanalyst depends on the nature of the encryption scheme and the information available to the cryptanalyst.

  14. Cryptanalysis Ciphertext Only: • The cryptanalyst knows ciphertext only. • Uses brute-force approach - try all possible keys. • Make the key space very large so it becomes impractical. • Easiest to defend

  15. Cryptanalysis Known plaintext: • The analyst may be able to capture one or more plaintext messages as well as their encryptions. • Or he may know that certain plaintext patterns will appear in a message. • May deduce the key.

  16. Cryptanalysis Probable-word: • An opponent may know parts of the message, then he can obtain specific information. • E.g. anaccounting file is being transmitted, placement of certain key words in the header of the file.

  17. Cryptanalysis Chosen-plaintext: • If the analyst is able to choose the messages to encrypt, the analyst may deliberately pick patterns that can be expected to reveal the structure of the key.

  18. Cryptanalysis

  19. Cryptanalysis • The last two (chosen ciphertext and chosen text) are less commonly employed as cryptanalytic techniques but are nevertheless possible avenues of attack.

  20. Cryptanalysis • Only a relatively weak algorithm will fail to withstand a ciphertext-only attack. • Generally, an encryption algorithm is designed to withstand a known-plaintext attack.

  21. Cryptanalysis • An encryption scheme is computationally secureif ciphertext generated by the scheme meets one or both of the criteria: • The cost of breaking the cipher exceeds the value of the encrypted information.

  22. Cryptanalysis • The time required to break the cipher exceeds the useful lifetime of the information.

  23. Cryptanalysis Brute Force attack: • Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained • On average, half of all possible keys must be tried to achieve success.

  24. Cryptanalysis • To supplement the brute-force approach • Some degree of knowledge about the expected plaintext is needed. • Some means of automatically distinguishing plaintext from garble is also needed. End

More Related