140 likes | 303 Views
CPSC 463. Week 1. Historical Interlude 1. Who is the largest employer of mathematicians in the US?. Answer. The National Security Agency Established in 1952 by Presidential Directive Assignment 1 (due 1/22). Terms. Cryptology Study of communication over insecure channels
E N D
CPSC 463 Week 1
Historical Interlude 1 • Who is the largest employer of mathematicians in the US?
Answer • The National Security Agency • Established in 1952 by Presidential Directive • Assignment 1 (due 1/22)
Terms • Cryptology • Study of communication over insecure channels • Cryptography: designing secure systems • Cryptanalysis: breaking such systems
Cryptology is Part of Larger Field • Information Assurance • Includes • Cryptology • Securing systems from unauthorized entry • Study of malicious software
The Three Stages of Cryptograyphy(The Seven Ages of Man) • The time of the Greeks to the Kerchoff Principle (1883) • Both method and key are secret • Kerchoff Principle: One should assume that the enemy knows the cryptographic method • Kerchoff Principle to the 1970’s • Security resides in the key • 1970’s to the present • Both the method and the key are public
Key? • Three Actors (All the world’s a stage) • Bob • Alice • The evil Eve • Alice wants to send a message to Bob—called plaintext • She encrypts it using a key—output is called ciphertext • Bob decrypts the message using the same (or derived key)
The Sequence Alice Encrypt Ciphertext plaintext encryption Key Eve Listens Decrypt Bob decryption key
Another Historical Division • Symmetric Key • Monoalphabetic shift ciphers (100 B.C.E.) • Polyalphabetic shift ciphers (1586) (Vignere Cipher) • Public Key • Diffie-Hellman-Merkle Key Exchange Protocol (1976)
Some Preliminary Issues: Keys • Key Exchange • The key can be stolen • How about encrypting the key • Key Length • Long keys are better than short keys • But the algorithm is important too • Simple monoalphabetic substitution cipher (msc) • 26! ~ 4 * 1026 different alphabets (and so that many keys) • DES has only 256 ~ 7 * 1016 different keys • But harder to break since msc preserves the structure of the message
Some Preliminary Issues: Attacks • Cipher text only: Eve has copy of the cipher text • Known plaintext • Eve has cipher text and known plaintext • Turing’s deduction that Enigman-encoded reports at 6 A.M. would contain the word wetter. • Chosen plaintext • Eve gains access to the encryption machine • Can encrypt a plaintext message • Chosen ciphertext • Even gets temporary access to the decryption machine and so can decrypt a string of symbols
Historical Interlude 2 • Ciphers can be classified into two types • Substitution ciphers: each letter in the alphabet is replaced by another (Caesar) • Transposition ciphers: rearranging the letters in a message to create an anagram • Cipherhericp • Problem: must be a systematic way to decipher the anagram
Rail Fence Cipher From Sonnet 29 Like to the lark at break of day arising • Drop every other letter down a row L K T T E A K T R A O D Y I E O H L R A B E K F A • Append the bottom row to the tip LKTTEAKTRAODYIEOHLRABEKFA Leads to the first recorded military cryptographic device: Scytale
scytale • Sparta 5th Century BCE