Professional Documents
Culture Documents
A few terms
Plaintext – the original message
Ciphertext – the encrypted message
Encryption – how the message is scrambled
Decryption – how the message is unscrambled
Cryptographic system – specific method of encryption and
decryption (also called a cipher or cryptosystem)
Transposition – rearranging elements
Substitution – replacing elements
How does it work
Encryptkey(Plaintext) = Ciphertext
Decryptkey(Ciphertext) = Plaintext
Must know method and key (if used)
Not all crypto methods use keys
How does it work
Caesar cipher
Plaintext = “hello”
Encryption method = substitute letter with letter plus 3
Encrypt(“hello”) = Ciphertext = “khoor”
Stream Ciphers
Convert plaintext to ciphertext 1 bit at a time.
DES
Encrypts 64-bit blocks using a 56-bit key
64-bit block is permutated
64-bit block split into two 32-bit blocks
Each sub-block is combined with the key and
processed 16 times
Sub-blocks are joined and sent through an inverse
permutation process
How DES works
How DES works
How DES works
S-Boxes
Integral part of DES algorithm
Selects which 32 bits to use after the key and 32-bit
data block have been shifted and combined
Some suspect NSA inserted a “trap door” into the S-
Box function
U.S. Senate officially cleared NSA of any improper
manipulation of the DES algorithm though official
findings are classified
Triple DES
Encipher
Plaintext K1 K2 K1 Ciphertext
Decipher
Different Methods
Diffie-Hellman Method
Ciphertext = Encrypt public key[Plaintext]
Plaintext = Decrypt private key[Ciphertext]
Each party creates their own private key
Each party computes a public key using a mathematical
function of the private key
Public keys are exchanged
Message key is computed from other person’s public key and
your own private key
If the math is right, the message key is the same on both sides
Uses of Public Key Cryptography
Digital Signatures
Used to authenticate digital material
Prove identity and validity of action or material
Transmission of symmetric key (public key
encryption is generally slower)
Uses of Public Key Cryptography
Digital Certificates
Used to encode and verify messages
Requires a Certificate Authority that creates a digital
certificate based on a private key and other
authentication information
Implements the “trusted third party” concept
X.509 is a popular standard for defining digital
certificates
Uses of Cryptography
Differential Cryptanalysis
Look for differences in pairs of messages
Only works on certain ciphers
Linear Cryptanalysis
Looks for simple approximation of encryption function
Differential Power Analysis
Measures power consumption of hardware encryption
devices
DPA
Breaking Crypto
Brute Force
Just try different keys until you get one that works
DES Challenge
Worked off of 56 bit keys
Sponsored by RSA to show weaknesses in DES
Electronic Frontier Foundation built special system (DES Cracker)
to crack DES in 56 hours
Jan 19, 1999 – Distributed.Net cracks 56-bit DES in 22 hours and
15 minutes using 100,000 PCs on Internet and DES Cracker
Testing 245 billion keys per second
Depends on where key falls in possible keyspace
Breaking Crypto
Stego Key
Stego Keys
Private key steganography
Similar to a symmetric cipher
Only individuals knowing the secret key can extract the
hidden message
Public Key steganography
Does not rely on the exchange of a secret key
Requires the use of two keys, one public and one private, for
each individual
Public key of receiver used in embedding process, private
key of receiver used in extraction process
Steganographic Classifications
Substitution systems – substitute redundant parts of a cover with a
secret message.
Least significant bit replacement
Unused or reserved space (e.g. files)
Transform domain techniques – embed secret information in a transform
space of the signal (e.g., in the frequency domain).
Spread spectrum techniques – adopting ideas from spread spectrum
communication
Statistical methods – encode info by changing several statistical
properties of a cover and use hypothesis testing in the extraction process
Distortion techniques – store information by signal distortion and
measure the deviation from the original cover in the decoding step.
Cover generation methods – encode information in the way a cover for
secret communication is created.
Hiding images in files
Takes advantage of coding scheme
For pictures, each pixel represented by 1 or more bytes.
If the least significant bit is used to encode the message, small
variations in the picture may occur but the message will be hidden
inside.
A 400 x 300 image will have 120,000 pixels thus
– if 8 bit coding scheme (256 colors) 120,000 bits of coded message can be
encrypted or 15,000 bytes (characters).
– If RGB scheme used with 3 bytes/pixel (one for each color RGB) even more
data can be hidden since the resulting file is much larger.
Steganography
111 000 000 000 111
000 111 000 111 000
000 000 111 000 000
000 111 000 111 000
111 000 000 000 111
111 000 000 000 111 000 111 000 111 000 000 000 111 000 000 000 111 000 111 000 111 000 000 000 111
8 shades of gray
CAB = 0 1 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0
Original = 111 000 000 000 111 000 111 000 111 000 000 000 111 000 000 000 111 000 111 000 111 000 000 000 111
Hidden = 110 001 000 000 110 000 111 001 110 001 000 000 110 000 000 001 110 001 110 000 110 000 001 000 111
8 shades of gray
hidden
original
8 shades of gray
Original
Digital Watermarked
Cover Data I
Watermark Data I’
Secret/public key K
Watermark W
or original data I
Watermark Watermark or
Test Data I’
detection Confidence measure
Secret/public key K
Watermarking Applications
Watermarking for Copy and Copyright
protection.
Fingerprinting for “traitor tracking”
Useful in monitoring or tracing back unauthorized
copies
Image authentication
Summary
What is the Importance and Significance of this
material?