Networking and Security
Networking and Security
Cryptology
The Old Kingdom is the name given to the period in the 3rd millennium BC when
Egypt attained its first continuous peak of civilization – the first of three so-called
"Kingdom" periods, which mark the high points of civilization in the lower Nile Valley
…
(It’s already in use in the Old Kingdom (and probably well before (ever heard this
notion? the main use of language is not to confer information, but rather to
persuade))
--wikipedia
substitution
Cryptography
~ 500bc
transposition
Cryptography
+k
Caesar Cipher
When I was a kid, I invented this also, A->C
many of you likely did as well
B->D
C->E etc
a b c d e f g h I j k l m n o p q r s t u v w x y z
a b c d e f g h I j k l m n o p q r s t u v w x y z
Then ATTACK:
A S Yes, it will
TX
TV just use every nth letter, and it is
AR the same problem… so the amount
CG of “enough” increases, but that’s it
Playfair cipher
by Sir Charles Wheatstone in 1854, popularized
by Lord Lyon Playfair
Works with pairs of letters. It is still subject to frequency analysis, but 625 is harder than 26
no longer used in a computational setting anyway – modern computers can easily break it; still could
be useful for short-term needs, we measure strength of a crypto
algorithm in terms of time - how long does it take to break it?
Playfair cipher
by Sir Charles Wheatstone in 1854, popularized
by Lord Lyon Playfair
WW1, WW2
PT109 - American patrol boat, under the command of Lieutenant John F. Kennedy,
Playfair message received (it is claimed) when it sank:
Key phrase is
“playfair example”
Typewriter fashion
from the top with
repeated letters dropped
HE LL OT HE RE WO UL DB EC OM EX
HE LX LO TH ER EW OU LD BE CO ME
Playfair cipher
DM LX LO TH ER EW OU LD BE CO ME
Playfair cipher
Transposition
(see the Jumble puzzle)
Substitution
(see the cryptoquote puzzle)
Cryptography
Confusion
Hide the relationship between
the key and the ciphertext
Diffusion
Change 1 bit in of plaintext,
½ the cipher text should change
Cryptography
Transposition
Jumble
Cryptography
Transposition
Cryptography
Cab I n
52 14 3
now is the time
k = 52143 now i s the time
ion w e sht et mi
Cryptography
Substitution
cryptoquote
Cryptography
Substitution
cryptoquote
Caesar cipher
also called shift cipher
E(x) = (x + k) % 26
D(y) = (y – k) % 26
Cryptography
Brute-force
how does this work, and
how hard (big) is it?
Cryptography
Secure communications
https, 802.11, WPA, GSM, Bluetooth
Content protection
DVD Blu-ray, CSS
User Authentication
Some uses of cryptography
PGP
GPG
TruCrypt
Secure shell
Video plug-ins
Email clients
Cell phone
HDCP – multimedia
Bank card
VPN
ePassport
On-line banking
Cryptography
Alice
Bob
m E(k,m) = c c D(k,c) = m
E D
k k
Eve
Cryptography
Symmetric block
vs
Asymmetric stream
A chunk of bits at a time
Symmetric block (usually fixed size)
Ke == Kd
vs
cryptanalysis
cryptography