1 / 9

Cryptography

Cryptography. Dan Fleck CS 469: Security Engineering. 1. These slides are modified with permission from Bill Young ( Univ of Texas). Cryptography. Apply your cryptanalytic skills. How do you get started? What questions should you ask?

moshe
Download Presentation

Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography Dan Fleck CS 469: Security Engineering 1 Coming up: Cryptography These slides are modified with permission from Bill Young (Univ of Texas)

  2. Cryptography Apply your cryptanalytic skills. How do you get started? What questions should you ask? • What is the likely underlyinglanguage of the plaintext? • What characteristics of the probable source text are relevant? • What characteristics of the source language are relevant? • What is the likely nature/complexity of the encryption algorithm? • Have any transformations/compressions been applied prior to encryption? • What else? CIA Kryptos Sculpture 2 Coming up: Encryption / Decryption

  3. Encryption / Decryption The purpose of encryption is to render the message less useful / meaningful to any eavesdropper. Conceptually, the process of encryption is quite simple: As is the process of decryption: ciphertext plaintext Encrypt Keye (optional) plaintext ciphertext Decrypt Keyd (optional) 3 Coming up: Information Theory and Cryptography

  4. Information Theory and Cryptography Information theory informs cryptography in several ways: • What effect does encrypting a message have on the information content of the file? • An attempt to decrypt a message is really an attempt to recover a message from a (systematically) noisy channel. • How can redundancy in the source give clues to the decoding process? • Is a perfect encryption possible (i.e., one that is theoretically unbreakable)? 4 Coming up: Some Terminology

  5. Some Terminology Encryption and decryption are functions which transform one text into another. In functional notation: C = E(P) and P = D(C) where C denotes ciphertext, E is the encryption rule, D is the decryption rule, P is the plaintext. In this case, we also have: P = D(E(P)) It is obviously important to be able to recover the original message from the ciphertext. 5 Coming up: Keyed Algorithms

  6. Keyed Algorithms Often the encryption and decryption algorithms use a key K. The key selects a specific algorithm from the family of algorithms defined by E. We write this dependence as: C = E(P,KE ) and P = D(C,KD) If KE = KD, then the algorithm is called symmetric. If not, then it is called asymmetric. In general, P = D(E(P,KE ),KD) An algorithm that does not use a key is called a keyless cipher. 6 Coming up: Some Notation

  7. Some Notation Often the notation E(P,K) and D(C,K) becomes cumbersome. An alternative notation is often used, particularly in cryptographic protocols. We’ll often use to denote E(P,K), and sometimes to denote D(P,K). For example, This is usually appropriate since, in many important commercial cryptosystems, the same algorithm is used for both encryption and decryption (i.e., the algorithm is its own inverse). 7 Coming up: Cryptanalysis Tools

  8. Cryptanalysis Tools The analyst works with: • encrypted messages, • known encryption algorithms, • intercepted plaintext, • data items known or suspected to be in a ciphertext message, • mathematical and statistical tools and techniques, • properties of languages, • computers, • ingenuity and luck. Really!CIA revealed that their analyst David Stein had also solved the same sections in 1998, using pencil and paper techniques, though at the time of his solution the information was only disseminated within the intelligence community, and no public announcement was made. -Wikipedia 8 Coming up: Lessons

  9. Lessons • Encryption is designed to obscure the meaning of text. • Redundancy is the enemy of secure encryption because it provides leverage to the attacker. 9 End of presentation

More Related