CPSC 467: Cryptography and Computer Security

Similar documents
B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Classical Cryptography

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Lecture 1: Introduction

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary

Block Ciphers Security of block ciphers. Symmetric Ciphers

La Storia dei Messaggi Segreti fino alle Macchine Crittografiche

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Classification of Ciphers

Math 1111 Math Exam Study Guide

MA 111, Topic 2: Cryptography

The number theory behind cryptography

Purple. Used by Japanese government. Not used for tactical military info. Used to send infamous 14-part message

TMA4155 Cryptography, Intro

Math 1111 Math Exam Study Guide

EE 418 Network Security and Cryptography Lecture #3

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Encryption Systems 4/14/18. We have seen earlier that Python supports the sorting of lists with the built- in.sort( ) method

1 Introduction to Cryptology

Colored Image Ciphering with Key Image

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

Distribution of Primes

Pseudorandom Number Generation and Stream Ciphers

Historical cryptography 2. CSCI 470: Web Science Keith Vertanen

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Chapter 4 The Data Encryption Standard

DUBLIN CITY UNIVERSITY

Drill Time: Remainders from Long Division

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

DUBLIN CITY UNIVERSITY

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

Voting Systems, Mass Murder, and the Enigma Machine

Random Bit Generation and Stream Ciphers

Cryptography Made Easy. Stuart Reges Principal Lecturer University of Washington

Network Security: Secret Key Cryptography

Introduction to Cryptography CS 355

Cryptanalysis on short messages encrypted with M-138 cipher machine

Cryptography, Number Theory, and RSA

Number Theory and Public Key Cryptography Kathryn Sommers

Sudoku an alternative history

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Week 3: Block ciphers

#27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009

EE 418: Network Security and Cryptography

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Cryptography Lecture 1: Remainders and Modular Arithmetic Spring 2014 Morgan Schreffler Office: POT 902

II. RC4 Cryptography is the art of communication protection. This art is scrambling a message so it cannot be clear; it

Grade 7 and 8 Math Circles March 19th/20th/21st. Cryptography

Secure Function Evaluation

Vernam Encypted Text in End of File Hiding Steganography Technique

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

Introduction to Cryptography

Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2

Codes and Nomenclators

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Stream Ciphers And Pseudorandomness Revisited. Table of contents

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India. P = [ p

CSE21 - Math for Algorithm and Systems Analysis

Data security (Cryptography) exercise book

A Secure Image Encryption Algorithm Based on Hill Cipher System

The Cryptoclub. Blackline Masters. Using Mathematics to Make and Break Secret Codes. to accompany. Janet Beissinger Vera Pless

Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme

Cryptography s Application in Numbers Station

Cipher Machines From Antiquity to the Enigma Machine

Related Ideas: DHM Key Mechanics

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Introduction to Cryptography

Secure message transmission over wireless communication

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Georgia Department of Education Georgia Standards of Excellence Framework GSE Grade 8 Mathematics Unit 4

AES Encryption and Decryption in Microsoft.NET

MA/CSSE 473 Day 9. The algorithm (modified) N 1

Challenge 2. uzs yfr uvjf kay btoh abkqhb khgb tv hbk lk t tv bg akwv obgr

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Math 319 Problem Set #7 Solution 18 April 2002

Public Key Cryptography

Successful Implementation of the Hill and Magic Square Ciphers: A New Direction

SECURITY OF CRYPTOGRAPHIC SYSTEMS. Requirements of Military Systems

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Symmetric-key encryption scheme based on the strong generating sets of permutation groups

DIY Pencil-and-Paper Encryption

Application: Public Key Cryptography. Public Key Cryptography

Grade 7 & 8 Math Circles October 12, 2011 Modular Arithmetic

Introduction to Cryptography

Grade 7/8 Math Circles Winter March 24/25 Cryptography

Fermat s little theorem. RSA.

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh

Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design:

Overview. The Big Picture... CSC 580 Cryptography and Computer Security. January 25, Math Basics for Cryptography

SOLITAIRE PLAYING CARD CIPHERS

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications

Table 1: Vignere cipher with key MATH.

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

Seventeenth Annual University of Oregon Eugene Luks Programming Competition

Proceedings of Meetings on Acoustics

UNIT 19 Lesson Plan 1

Transcription:

CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 5b September 11, 2013 CPSC 467, Lecture 5b 1/11

Stream ciphers CPSC 467, Lecture 5b 2/11

Manual stream ciphers Classical stream ciphers The monoalphabetic substitution ciphers discussed in lecture 3 are naturally stream ciphers since they encrypt a character at a time. This contrasts with the polygraphic ciphers (such as the Hill and Playfair ciphers), which require a full block of characters before any can be encrypted. CPSC 467, Lecture 5b 3/11

Manual stream ciphers State machine ciphers A state machine allows a different substitution to be used for a letter, depending on its position in the message. The Vigenère cipher is a simple example, where the state s is simply the letter position modulo the key length r, and s is used to select a key k s for the Caesar cipher from an array of r such keys. are mechanical polyalphabetic cipher devices that generalize Vigenère ciphers, both in having a very large value of r and in their method of generating the substitutions from the letter positions. CPSC 467, Lecture 5b 4/11

CPSC 467, Lecture 5b 5/11

are mechanical devices for implementing stream ciphers. They played an important role during the Second World War. The Germans believed their Enigma machine was unbreakable. The Allies, with great effort, succeeded in breaking it and in reading many of the top-secret military communications. This is said to have changed the course of the war. CPSC 467, Lecture 5b 6/11 Image from Wikipedia

How a rotor machine works Uses electrical switches to create a permutation of 26 input wires to 26 output wires. Each input wire is attached to a key on a keyboard. Each output wire is attached to a lamp. The keys are associated with letters just like on a computer keyboard. Each lamp is also labeled by a letter from the alphabet. Pressing a key on the keyboard causes a lamp to light, indicating the corresponding ciphertext character. The operator types the message one character at a time and writes down the letter corresponding to the illuminated lamp. The same process works for decryption since E ki = D ki. CPSC 467, Lecture 5b 7/11

keystream generation The encryption permutation. Each rotor is individually wired to produce some random-looking fixed permutation π. Several rotors stacked together produce the composition of the permutations implemented by the individual rotors. In addition, the rotors can rotate relative to each other, implementing in effect a rotation permutation (like the Caeser cipher uses). CPSC 467, Lecture 5b 8/11

keystream generation (cont.) Let ρ k (x) = x + k mod 26. Then rotor in position k implements permutation ρ k πρ 1 k. Several rotors stacked together implement the composition of the permutations computed by each. For example, three rotors implementing permutations π 1, π 2, and π 3, placed in positions r 1, r 2, and r 3, respectively, would produce the permutation ρ r1 π 1 ρ r1 ρ r2 π 2 ρ r2 ρ r3 π 3 ρ r3 = ρ r1 π 1 ρ r2 r 1 π 2 ρ r3 r 2 π 3 ρ r3 (1) CPSC 467, Lecture 5b 9/11

Changing the permutation After each letter is typed, some of the rotors change position, much like the mechanical odometer used in older cars. The period before the rotor positions repeat is quite long, allowing long messages to be sent without repeating the same permutation. Thus, a rotor machine is much like a polyalphabetic substitution cipher but with a very long period. Unlike a pure polyalphabetic cipher, the successive permutations until the cycle repeats are not independent of each other but are related by equation (1). This gives the first toehold into methods for breaking the cipher (which are far beyond the scope of this course). CPSC 467, Lecture 5b 10/11

History Several different kinds of rotor machines were built and used, both by the Germans and by others, some of which work somewhat differently from what I described above. However, the basic principles are the same. The interested reader can find much detailed material on the web by searching for enigma cipher machine and rotor cipher machine. Nice descriptions may be found at http://en.wikipedia.org/wiki/enigma_machine and http://www.quadibloc.com/crypto/intro.htm. CPSC 467, Lecture 5b 11/11