版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Part 1 Cryptography 1,Part I: Crypto,Part 1 Cryptography 2,Part I: Crypto,Crypto Basics Symmetric Key Crypto Public Key Cryptography Hash Functions+ Advanced Cryptanalysis,Chapter 2: Crypto Basics,MXDXBVTZWVMXNSPBQXLIMSCCSGXSCJXBOVQXCJZMOJZCVC TVWJCZAAXZBCSSCJXBQCJZCOJZCNSPOXBXSBTVWJC JZDXGXXMOZQMSC
2、SCJXBOVQXCJZMOJZCNSPJZHGXXMOSPLH JZDXZAAXZBXHCSCJXTCSGXSCJXBOVQX plaintext from Lewis Carroll, Alice in Wonderland The solution is by no means so difficult as you might be led to imagine from the first hasty inspection of the characters. These characters, as any one might readily guess, form a ciphe
3、r that is to say, they convey a meaning Edgar Allan Poe, The Gold Bug,Part 1 Cryptography 3,Part 1 Cryptography 4,Crypto,Cryptology The art and science of making and breaking “secret codes” Cryptography making “secret codes” Cryptanalysis breaking “secret codes” Crypto all of the above (and more),Pa
4、rt 1 Cryptography 5,How to Speak Crypto,A cipher or cryptosystem is used to encrypt the plaintext The result of encryption is ciphertext We decrypt ciphertext to recover plaintext A key is used to configure a cryptosystem A symmetric key cryptosystem uses the same key to encrypt as to decrypt A publ
5、ic key cryptosystem uses a public key to encrypt and a private key to decrypt,Part 1 Cryptography 6,Crypto,Basic assumptions The system is completely known to the attacker Only the key is secret That is, crypto algorithms are not secret This is known as Kerckhoffs Principle Why do we make this assum
6、ption? Experience has shown that secret algorithms are weak when exposed Secret algorithms never remain secret Better to find weaknesses beforehand,Part 1 Cryptography 7,Crypto as Black Box,plaintext,key,key,plaintext,ciphertext,A generic view of symmetric key crypto,encrypt,decrypt,Part 1 Cryptogra
7、phy 8,Simple Substitution,Plaintext: fourscoreandsevenyearsago Key:,Ciphertext: IRXUVFRUHDQGVHYHQBHDUVDJR Shift by 3 is “Caesars cipher”,Plaintext,Ciphertext,Part 1 Cryptography 9,Ceasars Cipher Decryption,Plaintext: spongebobsquarepants,Plaintext,Ciphertext,Suppose we know a Ceasars cipher is being
8、 used: Given ciphertext: VSRQJHEREVTXDUHSDQWV,Part 1 Cryptography 10,Not-so-Simple Substitution,Shift by n for some n 0,1,2,25 Then key is n mod 26 Example: key n = 7,Plaintext,Ciphertext,Part 1 Cryptography 11,Cryptanalysis I: Try Them All,A simple substitution (shift by n) is used But the key is u
9、nknown Given ciphertext: CSYEVIXIVQMREXIH How to find the key? Only 26 possible keys try them all! Exhaustive key search Solution: key is n = 4,Part 1 Cryptography 12,Least-Simple Simple Substitution,In general, simple substitution key can be any permutation of letters Not necessarily a shift of the
10、 alphabet For example,Plaintext,Ciphertext,Then 26! 288 possible keys!,Part 1 Cryptography 13,Cryptanalysis II: Be Clever,We know that a simple substitution is used But not necessarily a shift by n Find the key given the ciphertext: PBFPVYFBQXZTYFPBFEQJHDXXQVAPTPQJKTOYQWIPBVWLXTOXBTFXQWAXBVCXQWAXFQJ
11、VWLEQNTOZQGGQLFXQWAKVWLXQWAEBIPBFXFQVXGTVJVWLBTPQWAEBFPBFHCVLXBQUFEVWLXGDPEQVPQGVPPBFTIXPFHXZHVFAGFOTHFEFBQUFTDHZBQPOTHXTYFTODXQHFTDPTOGHFQPBQWAQJJTODXQHFOQPWTBDHHIXQVAPBFZQHCFWPFHPBFIPBQWKFABVYYDZBOTHPBQPQJTQOTOGHFQAPBFEQJHDXXQVAVXEBQPEFZBVFOJIWFFACFCCFHQWAUVWFLQHGFXVAFXQHFUFHILTTAVWAFFAWTEVOITDHFH
12、FQAITIXPFHXAFQHEFZQWGFLVWPTOFFA,Part 1 Cryptography 14,Cryptanalysis II,Cannot try all 288 simple substitution keys Can we be more clever? English letter frequency counts,Part 1 Cryptography 15,Cryptanalysis II,Ciphertext: PBFPVYFBQXZTYFPBFEQJHDXXQVAPTPQJKTOYQWIPBVWLXTOXBTFXQWAXBVCXQWAXFQJVWLEQNTOZQ
13、GGQLFXQWAKVWLXQWAEBIPBFXFQVXGTVJVWLBTPQWAEBFPBFHCVLXBQUFEVWLXGDPEQVPQGVPPBFTIXPFHXZHVFAGFOTHFEFBQUFTDHZBQPOTHXTYFTODXQHFTDPTOGHFQPBQWAQJJTODXQHFOQPWTBDHHIXQVAPBFZQHCFWPFHPBFIPBQWKFABVYYDZBOTHPBQPQJTQOTOGHFQAPBFEQJHDXXQVAVXEBQPEFZBVFOJIWFFACFCCFHQWAUVWFLQHGFXVAFXQHFUFHILTTAVWAFFAWTEVOITDHFHFQAITIXPFH
14、XAFQHEFZQWGFLVWPTOFFA,Ciphertext frequency counts:,Analyze this message using statistics below,Part 1 Cryptography 16,Part 1 Cryptography 17,中国周朝兵书六韬龙韬中的阴符和阴书记载了 周武王问姜子牙关于征战时与主将通讯的方式:,Part 1 Cryptography 18,Cryptanalysis: Terminology,Cryptosystem is secure if best know attack is to try all keys Exha
15、ustive key search, that is Cryptosystem is insecure if any shortcut attack is known But then insecure cipher might be harder to break than a secure cipher! What the ?,Part 1 Cryptography 19,Double Transposition,Plaintext: attackxatxdawn,Permute rows and columns,Ciphertext: xtawxnattxadakc Key is mat
16、rix size and permutations: (3,5,1,4,2) and (1,3,2),Part 1 Cryptography 20,One-Time Pad: Encryption,e=000 h=001 i=010 k=011 l=100 r=101 s=110 t=111,Encryption: Plaintext Key = Ciphertext,Plaintext:,Key:,Ciphertext:,Part 1 Cryptography 21,One-Time Pad: Decryption,e=000 h=001 i=010 k=011 l=100 r=101 s=
17、110 t=111,Decryption: Ciphertext Key = Plaintext,Ciphertext:,Key:,Plaintext:,Part 1 Cryptography 22,One-Time Pad,e=000 h=001 i=010 k=011 l=100 r=101 s=110 t=111,Ciphertext:,“key”:,“Plaintext”:,Double agent claims sender used following “key”,Part 1 Cryptography 23,One-Time Pad,e=000 h=001 i=010 k=011
18、 l=100 r=101 s=110 t=111,Ciphertext:,“key”:,“Plaintext”:,Or sender is captured and claims the key is,Part 1 Cryptography 24,One-Time Pad Summary,Provably secure Ciphertext provides no info about plaintext All plaintexts are equally likely but, only when be used correctly Pad must be random, used onl
19、y once Pad is known only to sender and receiver Note: pad (key) is same size as message So, why not distribute msg instead of pad?,Part 1 Cryptography 25,Real-World One-Time Pad,Project VENONA Encrypted spy messages from U.S. to Moscow in 30s, 40s, and 50s Nuclear espionage, etc. Thousands of messag
20、es Spy carried one-time pad into U.S. Spy used pad to encrypt secret messages Repeats within the “one-time” pads made cryptanalysis possible,Part 1 Cryptography 26,Codebook Cipher,Literally, a book filled with “codewords” Zimmerman Telegram encrypted via codebook Februar13605 fest13732 finanzielle13
21、850 folgender13918 Frieden17142 Friedenschluss17149 : : Modern block ciphers are codebooks! More about this later,Codebook Cipher: Additive,Codebooks also (usually) use additive Additive book of “random” numbers Encrypt message with codebook Then choose position in additive book Add additives to get
22、 ciphertext Send ciphertext and additive position (MI) Recipient subtracts additives before decrypting Why use an additive sequence?,Part 1 Cryptography 27,Part 1 Cryptography 28,ZimmermanTelegram,Perhaps most famous codebook ciphertext ever A major factor in U.S. entry into World War I,Part 1 Crypt
23、ography 29,ZimmermanTelegramDecrypted,British had recovered partial codebook Then able to fill in missing parts,Part 1 Cryptography 30,Early 20th Century,WWI Zimmerman Telegram “Gentlemen do not read each others mail” Henry L. Stimson, Secretary of State, 1929 WWII golden age of cryptanalysis Midway
24、/Coral Sea Japanese Purple (codename MAGIC) German Enigma (codename ULTRA),Part 1 Cryptography 31,Post-WWII History,Claude Shannon father of the science of information theory Computer revolution lots of data to protect Data Encryption Standard (DES), 70s Public Key cryptography, 70s CRYPTO conferences, 80s Advanced Encryption Standard (AES), 90s The crypto genie is out of the bottle,Part 1 Cryptography 32,Claude Shannon,The founder of Information Theory 1949 paper: Comm. Thy. of Secrecy Systems Fundamental concepts Confusion obscure relationship between plaintext
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026浙江杭州上城区交通室内辅助人员招聘15人考试备考题库及答案解析
- 2026河北张家口经开区第二批公开招聘编外工作人员4名笔试备考题库及答案解析
- 2026中国电信春季校园招聘补招笔试参考题库及答案解析
- 雨水沉淀池基坑开挖方案
- 一般工业固体废弃物处理项目技术方案
- 2026山东临沂市荣军优抚医院(临沂市心理医院)招聘卫生类岗位工作人员3人备考题库(含答案详解)
- 国能龙源环保有限公司2026届春季校园招聘考试模拟试题及答案解析
- 钢结构焊接专项施工方案
- 全民健身场地设施补短板项目技术方案
- 2026扬州对外人才开发服务有限公司招工1人备考题库及答案详解1套
- 2025年温州市泰顺县教育局县城学校选调教师考试笔试试卷【附答案】
- 构建人类命运共同体+课件-2025-2026学年高中政治统编版选择性必修一
- DB37-T 5087-2021 建筑与市政工程绿色施工评价标准
- 脐带脱垂护理业务查房课件
- 气体充装工作业指导书
- 电液伺服阀知识讲解,电液伺服阀组成和工作原理
- 2026届湖南省雅礼教育集团中考物理模拟试题含解析
- 商业道德管理办法
- 高一必修三四数学试卷
- 酒店管事部培训课件
- 国殇的教学课件
评论
0/150
提交评论