ECS726 Week01
ECS726 Week01
Week 1: Introduction
Pasquale Malacaria
EECS, QMUL
Motivation
Motivation: A practical example
1
Motivation: A practical example
2
Motivation: A practical example
3
fundamental security problems
5
Motivation: Information Security
Cryptography
is an essential part of Information Security but there is
more to it than cryptography
6
Motivation: Cryptography vs security
7
Basic Cryptographic Services
Basic Setting
Channel of Communication
Listen Modify
Alice Bob
Eve
8
Basic Setting
Channel of Communication
Listen Modify
Alice Bob
Eve
Channel of Communication
Listen Modify
Alice Bob
Eve
• Note that entities (or users e.g. Alice, Bob, Eve) can
be humans, computers, devices, etc.; whoever or
whatever is taking part in the processing of data. 10
Basic Setting
Channel of Communication
Listen Modify
Alice Bob
Eve
Channel of Communication
Listen
Alice Bob
Eve
12
Security Services
Channel of Communication
Listen Modify
Alice Bob
Eve
13
Security Services
14
Security Services
15
Security Services
16
Relationships between security services
17
Relationships between security services
18
Relationships between security services
19
Relationships between security services
20
Basic cryptographic terminology
21
Basic cryptographic terminology
23
Basic model of a cryptosystem for confidentiality
26
Encryption: an example of coding
▶ encryption/decryption is an example of
coding/decoding, esp. called cryptographic coding.
▶ other types of coding (each for a specific purpose):
▷ “source-coding”: compression
▷ “channel-coding”: error-correction
▷ “line-coding”: modulation
27
comparison to other security mechanisms
28
comparison to other mechanisms
29
comparison to other mechanisms
30
Symmetric vs. Public-Key cryptosystem
31
Symmetric vs. Public-Key cryptosystem
32
Symmetric vs. Public-Key cryptosystem
33
Making the encryption algorithm known
34
Making the encryption algorithm known
37
Breaking encryption algorithms
38
Exhaustive key searches
39
Exhaustive key searches
40
some generic cryptographic attacks
41
some generic cryptographic attacks
44
Caesar Cipher
Z A B
Y 25 0 1 C plaintext ciphertext
24 2 D
X3 W X Y
2 V 22 23 24 2 Z A 3
1 5 D (3) A (0)
19 20 21 W
U 02
E
0
P Q R S 2
4
2
2
B 2 3 4 5 6G
O 4 15 16 17 18 19T
−3 E (4) B (1)
U V
F G
1
5
C D E F
.. ..
6 7
. .
H
T
Z (25) W (22)
18
8
S
I
1
13
7
A (0) X (23)
R7
H
1
8 2
J
I J9 10 11 1M N 16 10
11 K L 5 Q
12 1
K B (1) Y (24)
14 P L
M 13
N O C (2) Z (25)
D (3) A (0)
45
Caesar Cipher
Math. representation:
Encryption:
46
Caesar Cipher
Math. representation:
Encryption:
C = P + K mod 26.
46
Caesar Cipher
Math. representation:
Encryption:
C = P + K mod 26.
Decryption:
46
Caesar Cipher
Math. representation:
Encryption:
C = P + K mod 26.
Decryption:
P = C − K mod 26.
46
Caesar Cipher
Math. representation:
Encryption:
C = P + K mod 26.
Decryption:
P = C − K mod 26.
46
Simple Substitution Cipher
47
Simple Substitution Cipher
48
Simple Substitution Cipher
49
Simple Substitution Cipher
49
Simple Substitution Cipher
50
Simple Substitution Cipher
51
Simple Substitution Cipher
53
Vigenère Cipher
54
Vigenère Cipher
54
Vigenère Cipher
55
Enigma Cipher
▷ 56
Historical Ciphers: Lessons learned
58
Questions?
58