Lecture Network security: Chapter 12 - Dr. Munam Ali Shah

pptx
Số trang Lecture Network security: Chapter 12 - Dr. Munam Ali Shah 25 Cỡ tệp Lecture Network security: Chapter 12 - Dr. Munam Ali Shah 128 KB Lượt tải Lecture Network security: Chapter 12 - Dr. Munam Ali Shah 0 Lượt đọc Lecture Network security: Chapter 12 - Dr. Munam Ali Shah 4
Đánh giá Lecture Network security: Chapter 12 - Dr. Munam Ali Shah
4.6 ( 8 lượt)
Nhấn vào bên dưới để tải tài liệu
Để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

Network Security Lecture 12 Presented by: Dr. Munam Ali Shah Part 2 (b) Cryptography as a Network Security Tool Summary of the previous lecture  We had overviewed the 3-dimensions of a cryptographic system, i.e., type of operation to transform the plain text into cipher text, number of keys used and the way in which plain text is processed  We also discussed unconditional and computational security. One example of unconditional security is OTP  The difference between Cryptanalysis and Brute Force attacks, were also discussed.  And lastly, we practically perform cryptography through the Shift Cipher Outlines of today’s lecture We will:  Explore a couple of more examples of Shift Cipher  Continue the discussion on Mono-alphabetic Cipher with an example will also be discussed  Perform a cryptanalysis on a cipher text to reveal the plain text. Objectives  You would be able to present an overview of more cryptographic schemes and you will understand the limitation of each scheme.  You would be able to break the code (ideally..) Concepts  A private key cipher is composed of two algorithms  encryption algorithm E  decryption algorithm D  The same key K is used for encryption & decryption  K has to be distributed beforehand Caesar Cipher  If each letter is assigned a number (a=0, z=25), Encryption/Decryption defined as: C = E(p) = (P + 3) mod (26) P = D(c) = (C – 3) mod (26)  Example: meet me after the toga party phhw ph diwhu wkh wrjd sduwb Caesar Cipher: Encryption Example  K=7  P = Rome is the greatest empire  C = yvtl pz aol nylhalza ltwpyl Caesar Cipher: Decryption Example  K=7  C = yvtl dhz uva ibpsa pu h khf  P = Rome was not built in a day Caesar Cipher: Decryption with Unknown Key  C=tfnriujuzvdrepkzdvjsvwfivkyvziuvrkyjkyvmrczrekevmvikrjkvfwuvrkyslkfetv  tfnriuj uzv drep kzdvj svwfiv kyvzi uvrkyj; kyv mrczrek evmvi krjkv fw uvrky slk fetv  P = Cowards die many times before their deaths; the valiant never taste of death but once. (K = 17)  Julius Caesar by William Shakespeare Cryptanalysis of Caesar Cipher  Only have 26 possible ciphers  A maps to A,B,..Z  Could simply try each in turn  A brute force search  Given ciphertext, just try all shifts of letters  Do need to recognize when have plaintext Monoalphabetic Cipher  Instead of substituting each letter in a sequential order (shift), substitute the letters arbitrarily  Each plaintext letter maps to a unique ciphertext letter  Hence key is 26 letters long Monoalphabetic Cipher Security  How many total keys are there?  26! = 4 x 1026 keys  With so many keys, is it secure?  No  It is secure against brute force attack but problem lies in language characteristics  Called frequency analysis attack Language Redundancy and Cryptanalysis  Human languages are redundant  Thats why we can compress text files  Letters are not equally commonly used  Which is the most common letter?  E  Which is the least common letter?  Z English Letter Frequencies Language Redundancy and Cryptanalysis  Have tables of single, double & triple letter frequencies for various languages  Which is the most common digram?  TH  Which is the most common trigram?  THE Use in Cryptanalysis  Key concept – mono-alphabetic substitution ciphers do not change relative letter frequencies  Each occurrence of a particular plaintext letter maps to the same ciphertext letter  So attack is easy:  Calculate letter frequencies for ciphertext  Compare counts/plots against known values Example Cryptanalysis  Given ciphertext uzqsovuohxmopvgpozpevsgzwszopfpesxudbmetsxaiz vuephzhzshzowsfpappdtsvpquzwymxuzuhsxepyepopd zszufpombzwpfupzhmdjudtmohmq  Frequency Analysis P 13.33 H 5.83 F 3.33 B 1.67 C 0.00 Z 11.67 D 5.00 W 3.33 G 1.67 K 0.00 S 8.33 E 5.00 Q 2.50 Y 1.67 L U 8.33 V 4.17 T 2.50 I 0.83 N 0.00 O 7.50 X 4.17 A 1.67 J 0.83 R 0.00 M 6.67 0.00 Example Cryptanalysis  Guess P & Z are E and T, respectively  utqsovuohxmoevgeoteevsgtwstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt wymxutuhsxeeyeeoedtstufeombtwefuethm djudtmohmq Example Cryptanalysis  Among digrams starting with Z, ZW has the highest occurrence (3 times)  Guess ZW is TH  Utqsovuohxmoevgeoteevsgthstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt hymxutuhsxeeyeeoedtstufeombthefuethm djudtmohmq  Hence ZWP is THE Example Cryptanalysis  Utqsovuohxmoevgeoteevsgthstoefeesxud bmetsxaitvueehthtshtowsfeaeedtsvequt hymxutuhsxeeyeeoedtstufeombthefuethm djudtmohmq  Guess S is A  Utqaovuohxmoevgeoteevagthatoefeeaxud bmetaxaitvueehthtahtowafeaeedtavequt hymxutuhaxeeyeeoedtatufeombthefuethm djudtmohmq Example Cryptanalysis  U, V and M may correspond to O, I and N  Continuing with trial and error, we finally get the following plaintext It was disclosed yesterday that several informal but direct contacts have been made with political representatives of the Viet Cong in Moscow Summary of today’s lecture  We discussed more examples of Shift/Ceaser Cipher  We also discussed examples of mono-alphabetic cipher and poly-alphabetic cipher Next lecture topics  Our discussion on more cryptographic schemes will continue.  We will explore One Time Pad and OTP  An example of Vigenere Cipher will also be discussed with its limitations.  Transposition Cipher with an example of Rail Fence Cipher will form part of our next lecture. The End
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.