Crytography - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Crytography

Description:

'the enemy knows the system' by Claude Shannon ... DES, AES, Blowfish, etc. Stream. A5/1, A5/2, RC4, etc. Asymmectric. Public key Cipher ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 28
Provided by: poste5
Category:

less

Transcript and Presenter's Notes

Title: Crytography


1
Crytography Steganography
  • Introduction to concept of cryptography
    steganography

2
Standard Attack
Denial of service
Preventing legitimate use
Pretending to be someone else
Intruding the flow of a communication
3
Terms
  • Plain text
  • Cipher text
  • Key
  • Cipher
  • Encryption
  • Decryption

4
Kerckhoffs' principle
  • the enemy knows the system by Claude Shannon
  • The system must be practically, if not
    mathematically, indecipherable
  • It must not be required to be secret, and it must
    be able to fall into the hands of the enemy
    without inconvenience
  • Its key must be communicable and retainable
    without the help of written notes, and changeable
    or modifiable at the will of the correspondents
  • It must be applicable to telegraphic
    correspondence
  • It must be portable, and its usage and function
    must not require the concourse of several people
  • Finally, it is necessary, given the circumstances
    that command its application, that the system be
    easy to use, requiring neither mental strain nor
    the knowledge of a long series of rules to
    observe

5
Simple Cryptography
  • Khoor, Zruog!!
  • Elppa
  • Ctaropyghpry
  • 3
  • Yvjrhag km ias eiwemciiyeawe nmger
  • crypto

6
Modern Cryptography
  • Symmetric
  • Block
  • DES, AES, Blowfish, etc
  • Stream
  • A5/1, A5/2, RC4, etc
  • Asymmectric
  • Public key Cipher
  • RSA

7
Symmetric cipher
  • Encryption and Decryption is done by same
    key(symmetric key)
  • Fast!!
  • Most case, easy to implement by hardware

8
DES Digital Encryption Standard
9
Example
  • P Professor Hwang is very nice professor!!
  • K plus
  • C c4839979081f7f0f37156f1fbadedef125d53f1d607282
    5fa0febf3bb9d9dc21bd0489ee8cb02a5c
  • http//cissoft.dju.ac.kr/amho/sub/training/des.htm
    l

10
Vernam cipher
  • Plain Text xored with same length of key
  • Psudo-random number is used as encryption key
  • Random seed has meaning of real key

11
Vernam Cipher
12
Problems?
  • Key delivery
  • How can we pass key to the receiver?
  • Number of key
  • For one receiver, sender must have different key

13
Asymmetric cipher
  • Encryption and Decryption use different key
  • A want to send msg B, A encrypt msg B with Bs
    public key
  • B decrypt cipher text Bs private key, and get a
    message

14
RSA Cipher
  • prepare p,q
  • compute n pq
  • Compute Phi(n)(Phi(pq)(p-1)(q-1))
  • Find e,d s.t ed mod Phi(n) 1
  • Publish e,n as public key
  • encrpyt message m, c me (mod n)
  • decrpyt message m cd (mod n)

15
Advantage
  • Secure
  • Factorization of large number is very difficult
  • Easy
  • No key delivery problem
  • Key number is O(n)

16
Disadvantage
  • Slow
  • Finding large prime p,q is very difficult
  • Using expensive operation

17
Solution?
  • Use a asymmetric cipher on the exchange of key
  • Use a symmetric cipher on the phase of real
    communication

18
Steganography?
  • Sometimes, action of send a messages can be a
    hint to enemy
  • Cipher text is very hard to break, but can be
    breaked
  • Steganography is method of hidding message in
    plain text

19
Example
  • P I love you!
  • p 991, q 919, e 881, d 46421
  • block size 5
  • c 41007 67986 69008 97985 01000
  • http//cissoft.dju.ac.kr/amho/sub/training/rsa.htm
    l

20
Example(1)
  • News Eight Weather Tonight increasing snow.
    Unexpected precipitation smothers eastern towns.
    Be extremely cautious and use snowtires
    especially heading east. The highway is not
    knowingly slippery. Highway evacuation is
    suspected. Police report emergency situations in
    downtown ending near Tuesday.
  • Newt is upset because he thinks he is President.

21
Example(2)
22
Example(3)
23
Example(3)
24
Example(3)
25
Example(4)
From Wikipidia, Steganography
26
Question?
27
Thank you!!
Write a Comment
User Comments (0)
About PowerShow.com