You are on page 1of 3

CRYPTOGRAPHY

by Dr. Ariel M. Sison THE CEASAR CIPHER

Is  Is a substitute cipher, named after Julius Caesar.


 Operation principle:
- A tremendous tool.
- Each letter has translated into the letter a fixed
- The basis for many security mechanisms.
number of positions after it in the alphabet table.
Is not  A substitution cipher replaces one symbol with another.

Example:
- The solution to all security problems.
K=3
- Reliable unless implemented properly.
TREATY IMPOSSIBLE is translated to…
- Reliable unless used properly.
WUHDWB LPSRVVLEOH
- Something you should try to yourself.

o You spend a lot of time becoming an expert.


o You subject your design to outside review. BASIC TERM

Plaintext
- A message in its natural format readable by an attacker.
MESSAGE AUTHENTICATION
- Original message or data (also called cleartext).
- A digest can be used to check the integrity of a message: that the message
has not been changed.
Ciphertext
- Message altered to be unreadable by anyone except the intended
recipients.
TYPES of CIPHERS
Encryption
Private key cryptosystems/ciphers - Transforming the plaintext, under the control of the key.
- The secret key is shared between two parties.
Key
Public key cryptosystems/ciphers - Sequence that controls the operation and behavior of the cryptographic
- The secret key is not shared and two parties can still communicate using algorithm.
their public keys.
Decryption
- Transforming the ciphertext back to the original plaintext.

©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
TYPES of CRYPTHOGRAPHY - Classical transposition or permutation ciphers.
- These hide the message by rearranging the letter order without altering the
Stream Ciphers actual letters used.
- Are fast and easy to implement in hardware - Word Jumble
- One byte at a time.
- Mixes plaintext with key stream Monoalphabetic Cipher
- Either using Symmetric Key or Public Key. - Caesar
- “Cipher” line can be any permutation of the 26 alphabetic character.
Block Ciphers
- Are stronger, but slower and often implemented in hardware.
- One or large block at a time.
- Substitution and transposition. RAIL FENCE CIPHER

 Write message letters out of diagonally over number of rows.


 Read off cipher row by row
CLASSIFICATION of SECURITTY ATTACK  Write message out as:
m e m a t r h t g p r y
Passive Attack e t e f e t eoa a t
- Eavesdropping on, or monitoring of, transmissions to:  Giving this ciphertext:
MEMATRHTGPRYETEFETEOAAT
 Obtain message contents, or
 Monitor traffic flows

ROW TRANSPOSITION CIPHERS


Active Attack
 A more complex scheme.
- modification of data stream to:
 Write letters of message out in rows over a specified number of
 Masquerade of one entity as same other. columns.
 Replay previous messages.  Reorder the columns according to some key before reading of the
 Modify messages in transit. rows.
 Denial of service.
Key: 4 3 1 2 5 6 7
Plaintext: a t t a c k p
o s t p o n e
ENCRYPTION SYSTEMS d u n t i l t
w o a m x y z
Substitution Cipher
- Convert one letter to another. Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
- Cryptoquip.

Transposition Cipher
- Change position of letter in text

©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology
SHA-1
- Computes 160-bit hash value.
STENOGRAPHY - NIST approved message digest algorithm.

 Hiding a message within another medium such as image.


 No key is required.
 Example BIRTHDAY ATTACK
- Modify color map of JPEG image.
 Collisions
- Two different message with same hash value.
 Based on birthday paradox.
SYMMETRIC ALGORITHMS  Hash algorithms should be resistant to this attack.

 DES CRYPTANALYSIS
- Modes: ECB, CBC, CFB, OFB, CM
 3DES  The study of methods to break cryptosystems.
 AES  Often targeted at obtaining a key.
 IDEA  Attacks may be passive
 Blowfish .
 RC4
 RC5 CRYPTANALYSIS ATTACKS
 CAST
Brute Force
 SAFER
- Trying all key values in the keyspace.
 Twofish
Frequency Analysis
ASSYMETRIC ALGORITHMS
- Guess values based on frequency of occurrence.

 Diffie-Hellman Dictionary Attack


 RSA - Find plaintext based on common words.
 El Gamal
 Elliptic Curve Cryptography (ECC) Social Engineering
- Humans are the weakest link.

RNG Attack
HASHING ALGORITHMS - Predict IV used by an algorithm

MD5 Temporary Files


- Computes 128-bit hash value. - May contain plaintext.
- Widely used for file integrity checking.
©Ken Javier BSCS 1-1 I’M ACCEPTING TYPING JOBS! CONTACT ME AT 0955 387 7030
PLM – College of Engineering and Technology

You might also like