0% found this document useful (0 votes)
51 views3 pages

CRYPTOGRAPHY

Uploaded by

Kenken Javier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views3 pages

CRYPTOGRAPHY

Uploaded by

Kenken Javier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CRYPTOGRAPHY

by Dr. Ariel M. Sison THE CEASAR CIPHER

Is  Is a substitute cipher, named after Julius Caesar.


 Operation principle:
- A tremendous tool.
- Each letter has translated into the letter a fixed
- The basis for many security mechanisms.
number of positions after it in the alphabet table.
Is not  A substitution cipher replaces one symbol with another.

Example:
- The solution to all security problems.
K=3
- Reliable unless implemented properly.
TREATY IMPOSSIBLE is translated to…
- Reliable unless used properly.
WUHDWB LPSRVVLEOH
- Something you should try to yourself.

o You spend a lot of time becoming an expert.


o You subject your design to outside review. BASIC TERM

Plaintext
- A message in its natural format readable by an attacker.
MESSAGE AUTHENTICATION
- Original message or data (also called cleartext).
- A digest can be used to check the integrity of a message: that the message
has not been changed.
Ciphertext
- Message altered to be unreadable by anyone except the intended
recipients.
TYPES of CIPHERS
Encryption
Private key cryptosystems/ciphers - Transforming the plaintext, under the control of the key.
- The secret key is shared between two parties.
Key
Public key cryptosystems/ciphers - Sequence that controls the operation and behavior of the cryptographic
- The secret key is not shared and two parties can still communicate using algorithm.
their public keys.
Decryption
- Transforming the ciphertext back to the original plaintext.

©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
TYPES of CRYPTHOGRAPHY - Classical transposition or permutation ciphers.
- These hide the message by rearranging the letter order without altering the
Stream Ciphers actual letters used.
- Are fast and easy to implement in hardware - Word Jumble
- One byte at a time.
- Mixes plaintext with key stream Monoalphabetic Cipher
- Either using Symmetric Key or Public Key. - Caesar
- “Cipher” line can be any permutation of the 26 alphabetic character.
Block Ciphers
- Are stronger, but slower and often implemented in hardware.
- One or large block at a time.
- Substitution and transposition. RAIL FENCE CIPHER

 Write message letters out of diagonally over number of rows.


 Read off cipher row by row
CLASSIFICATION of SECURITTY ATTACK  Write message out as:
m e m a t r h t g p r y
Passive Attack e t e f e t eoa a t
- Eavesdropping on, or monitoring of, transmissions to:  Giving this ciphertext:
MEMATRHTGPRYETEFETEOAAT
 Obtain message contents, or
 Monitor traffic flows

ROW TRANSPOSITION CIPHERS


Active Attack
 A more complex scheme.
- modification of data stream to:
 Write letters of message out in rows over a specified number of
 Masquerade of one entity as same other. columns.
 Replay previous messages.  Reorder the columns according to some key before reading of the
 Modify messages in transit. rows.
 Denial of service.
Key: 4 3 1 2 5 6 7
Plaintext: a t t a c k p
o s t p o n e
ENCRYPTION SYSTEMS d u n t i l t
w o a m x y z
Substitution Cipher
- Convert one letter to another. Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
- Cryptoquip.

Transposition Cipher
- Change position of letter in text

©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
SHA-1
- Computes 160-bit hash value.
STENOGRAPHY - NIST approved message digest algorithm.

 Hiding a message within another medium such as image.


 No key is required.
 Example BIRTHDAY ATTACK
- Modify color map of JPEG image.
 Collisions
- Two different message with same hash value.
 Based on birthday paradox.
SYMMETRIC ALGORITHMS  Hash algorithms should be resistant to this attack.

 DES CRYPTANALYSIS
- Modes: ECB, CBC, CFB, OFB, CM
 3DES  The study of methods to break cryptosystems.
 AES  Often targeted at obtaining a key.
 IDEA  Attacks may be passive
 Blowfish .
 RC4
 RC5 CRYPTANALYSIS ATTACKS
 CAST
Brute Force
 SAFER
- Trying all key values in the keyspace.
 Twofish
Frequency Analysis
ASSYMETRIC ALGORITHMS
- Guess values based on frequency of occurrence.

 Diffie-Hellman Dictionary Attack


 RSA - Find plaintext based on common words.
 El Gamal
 Elliptic Curve Cryptography (ECC) Social Engineering
- Humans are the weakest link.

RNG Attack
HASHING ALGORITHMS - Predict IV used by an algorithm

MD5 Temporary Files


- Computes 128-bit hash value. - May contain plaintext.
- Widely used for file integrity checking.
©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology

You might also like