Mod1 Cryptography
Mod1 Cryptography
Integrity:
Integrity This term covers two related concepts:
Data integrity: Assures that information and programs are
changed only in a specified and authorized manner.
System integrity: Assures that a system performs its intended
function in an unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of the system.
Threat
A potential for violation of security, which exists when there
is a circumstance, capability, action,or event that could
breach security and cause harm. That is, a threat is a
possible danger that might exploit a vulnerability.
Attack
An assault on system security that derives from an
intelligent threat; that is, an intelligent act that is a
deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the
security policy of a system.
THE OSI SECURITY ARCHITECTURE
Modification of messages
Denial of service.
MASQUERADE
A masquerade takes place when one entity pretends to
be a different entity
REPLAY
Replayinvolves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
MODIFICATION OF MESSAGES
Modification of messages simply means that some
portion of a legitimate message is altered, or that
messages are delayed or reordered, to produce an
unauthorized effect
DENIAL OF SERVICE
The denial of service prevents or inhibits the normal use or
management of communications facilities
This attack may have a specific target; for example, an
entity may suppress all messages directed to a particular
destination
SECURITY SERVICES
a processing or communication service that is
provided by a system to give a specific kind of
protection to system resources
security services implement security policies and
Provides for the integrity of all user data on a connection and detects any modification, insertion,
DATA INTEGRITY
deletion, or replay of any data within an entire data sequence, with recovery attempted.
Connection Integrity without Recovery
Provides for the integrity of selected fields within the user data of a data block transferred over a
connection and takes the form of determination of whether the selected fields have been modified,
inserted, deleted, or replayed.
Connectionless Integrity
Provides for the integrity of a single connectionless data block and may take the form of detection of
data modification. Additionally, a limited form of replay detection may be provided.
Selective-Field Connectionless Integrity
Provides for the integrity of selected fields within a single connectionless data block; takes the form of
determination of whether the selected fields have been modified.
NONREPUDIATION
1970s
and by far most widely used
REQUIREMENTS
two requirements for secure use of symmetric
encryption:
a strong encryption algorithm
a secret key known only to sender / receiver
mathematically have:
Y = EK(X)
X = DK(Y)
assume encryption algorithm is known
implies a secure channel to distribute key
SYMMETRIC ENCRYPTION
Symmetric encryption is a form of cryptosystem in which
encryption and decryption are performed using the same
key. It is also known as Conventional encryption.
Symmetric encryption transforms plaintext into ciphertext
using a secret key and an encryption algorithm. Using the
same key and a decryption algorithm, the plaintext is
recovered from the ciphertext.
SYMMETRIC CIPHER MODEL
Plaintext: This is the original intelligible message or data that is
fed into the algorithm as input.
Encryption algorithm: The encryption algorithm performs
various substitutions and transformations on the plaintext.
Secret key: The secret key is also input to the encryption
algorithm.The key is a value independent of the plaintext and of
the algorithm. The algorithm will produce a different output
depending on the specific key being used at the time.
Ciphertext: This is the scrambled message produced as output.
It depends on the plaintext and the secret key. For a given
message, two different keys will produce two different ciphertexts.
Decryption algorithm: This is essentially the encryption
algorithm run in reverse. It takes the ciphertext and the secret
key and produces the original plaintext.
MODEL OF SYMMETRIC CRYPTOSYSTEM
ATTACKS ON CONVENTIONAL ENCRYPTION
SCHEME
There are two general approaches to attacking a
conventional encryption scheme:
Cryptanalytic attacks :
Meet mepxxe px
MONOALPHABETIC CIPHER
SECURITY
now have a total of 26! = 4 x 1026 keys
with so many keys, might think is secure
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
ENCRYPTING AND DECRYPTING
plaintext is encrypted two letters at a time
1. if a pair is a repeated letter, insert filler like 'X
2. if both letters fall in the same row, replace each with letter
to right (wrapping back to start from end)
3. if both letters fall in the same column, replace each with the
letter below it (again wrapping to top from bottom)
4. otherwise each letter is replaced by the letter in the same
row and in the column of the other letter of the pair
SECURITY OF PLAYFAIR CIPHER
security much improved over
monoalphabetic
since have 26 x 26 = 676 digrams
would need a 676 entry frequency table to
analyse (verses 26 for a monoalphabetic)
and correspondingly more ciphertext
was widely used for many years
eg. by US & British military in WW1
itcan be broken, given a few hundred
letters
since still has much of plaintext structure
POLYALPHABETIC CIPHERS
polyalphabetic substitution ciphers
improve security using multiple cipher
alphabets
make cryptanalysis harder with more
alphabets to guess and flatter frequency
distribution
use a key to select which alphabet is used
for each letter of the message
use each alphabet in turn
ith
letter specifies ith alphabet to use
use each alphabet in turn
key:deceptivedeceptivedeceptive
plaintext:wearediscoveredsaveyourself
ciphertext:ZICVTWQNGRZGVTWAVZHCQYGLMGJ
AIDS
simple aids can assist with en/decryption
a Saint-Cyr Slide is a simple manual aid
a slide with repeated alphabet
line up plaintext 'A' with key letter, eg 'C'
then read off any mapping for key letter
can bend round into a cipher disk
or expand into a Vigenre Tableau
SECURITY OF VIGENRE CIPHERS
have multiple ciphertext letters for each plaintext
letter
hence letter frequencies are obscured
of key
TRANSPOSITION CIPHERS
now consider classical transposition or
permutation ciphers
these hide the message by rearranging the letter
order
without altering the actual letters used