Professional Documents
Culture Documents
Objectives / Contents
Information Processing Error / Volume Control Steganography Hash Function Symmetric (Private Key) Encryption Asymmetric (Public Key) Encryption Cryptanalysis
Cryptanalysis
Saad Haj Bakry, PhD, CEng, FIEE
ACKNOWLEDGEMENTS:
Echo Checking: Send Back
1 2 3
4 5 6 7
1
8 0
ODD PARITY
1 0 0 1 1 0 1
EVEN PARITY
1 2 3
4 5 6 7
8 1
PARITY
1 0 0 1 1 0 1
BLOCK
BLOCK CHECKING
PARITY
Saad Haj Bakry, PhD, CEng, FIEE 7
OBJECTIVES:
CONFIDENTIALITY
FOR THE
VOLUME OF TRAFFIC
Saad Haj Bakry, PhD, CEng, FIEE
Filling idle periods with meaningless data (packets) that can be detected by the receiver. (Volume Testing & Control)
8
Proof of Ownership:
Music recorded with frequencies not audible to humans
www.adobe.com
Hash Function
Collision: Messages with the same hash value Chance of Collision: Statistically insignificant
Messages can be checked but not reconstructed from their hash value
Saad Haj Bakry, PhD, CEng, FIEE 10
Algorithm
Replacing a by b b by c c by d. of letters to become: odd followed by even
Example
information security becomes jogpsnbujpo tfdvsjuz information security becomes ifrain-nomto scrt-euiy information security becomes jgsbjo-opnup tdsu-fvjz
11
Both
Definition
Source text / Unencrypted data Transforming plaintext to cipher text (encrypted text) using a cipher and a key Encrypted text / Incomprehensible data
A technique / A procedure / An algorithm (a computer science term) for encrypting data / messages
Cipher text
Cipher / Cryptosystem
A Key
Cryptanalysis
A string of digits used to encrypt data (like a password) / Longer keys lead to stronger encryption Breaking / cracking encryption
12
Symmetric Key
Plain Text
Sender Receiver
13
Asymmetric Keys
Public
Transmission
Private
PUBLIC KEY
Transmission
PRIVATE KEY
Man y
to
One
PRIVATE KEY
to
Man y Public
Reception
PUBLIC KEY
15
One Private
Reception
Saad Haj Bakry, PhD, CEng, FIEE
Private Key:
Kept by the Owner
Infeasible to Deduce
Private Key from the Public Key
Per Organization:
One Public Key OnePrivate Key Not One Secret Key
Problem:
Requires high computer power / Not efficient for data volumes / Performance: Slower
17
per receiver.
Saad Haj Bakry, PhD, CEng, FIEE
Public Key
Problem:
Validation of customers
Customer
Networ k
Organization
Saad Haj Bakry, PhD, CEng, FIEE
identity
Organization
Private Key
18
Problem:
Proving the
Networ k
Organization
Saad Haj Bakry, PhD, CEng, FIEE
identity
of the receiving organizations
19
Public Key
Networ k
Customer Public Key
20
Organization
Private Key
Cryptanalysis
Objectives:
Statistical nature
Plain-text knowledge
Remarks / Understanding
Error Control: against noise. Traffic padding: volume control. Steganography: hiding information.
22
References
B.R. Elbert, Private Telecommunication Networks, Artech House, US, 1989. Telecommunications Management: Network Security, The National Computer Centre Limited, UK, 1992 K.H. Rosen, Elementary Number Theory and its Applications, 4th Edition, Addison Wesley / Longman, 1999. ISO Dictionary of Computer Science: The Standardized Vocabulary (23882), ISO, 1997. F. Botto, Dictionary of e-Business, Wiley (UK), 2000. H.M. Deitel, P.J. Deitel, K. Steinbuhler, e-Business and e-Commerce for Managers, Prentice-Hall (USA), 2001
23