香港浸会大学:Computer Security(PPT课件讲稿)Cryptography Chapter 1 Symmetric Ciphers

Computer Security Cryptography Chapter 1 Symmetricⅰ phers··· ●●。●● COMP4690. HKBU
COMP4690, HKBU 1 Computer Security -- Cryptography Chapter 1 Symmetric Ciphers

●●●●● ●●●● ●●0 Outline ●●● ●●●● Overview of Cryptography Classical Encryption Techniques Substitution Transposition ● Block Ciphers DES AES COMP4690. HKBU
COMP4690, HKBU 2 Outline ⚫ Overview of Cryptography ⚫ Classical Encryption Techniques ⚫ Substitution ⚫ Transposition ⚫ Block Ciphers ⚫ DES ⚫ AES

●●●●● ●●●● ●●0 Basic Terminology ●●● ●●●● plaintext -the original intelligible message ciphertext- the coded message that depends on the plaintext and the secret key cipher-algorithm for transforming plaintext to ciphertext key -info used in cipher, known only to sender/recipient encipher(encrypt)-converting plaintext to ciphertext decipher (decry pt)-recovering ciphertext from plaintext cryptography -study of encryption principles/methods cry ptanalysis( codebreaking)-the study of principles/methods of deciphering ciphertext without knowing key cryptology-the field of both cryptography and cryptanalysis COMP4690. HKBU
COMP4690, HKBU 3 Basic Terminology ⚫ plaintext - the original intelligible message ⚫ ciphertext - the coded message that depends on the plaintext and the secret key ⚫ cipher - algorithm for transforming plaintext to ciphertext ⚫ key - info used in cipher, known only to sender/recipient ⚫ encipher (encrypt) - converting plaintext to ciphertext ⚫ decipher (decrypt) - recovering ciphertext from plaintext ⚫ cryptography - study of encryption principles/methods ⚫ cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key ⚫ cryptology - the field of both cryptography and cryptanalysis

●●●●● ●●●● ●●0 Symmetric Encryption ●●● ●●●● e Also called conventional private-key single-key sender and recipient share a common key o all classical encryption algorithms are private- key o was the only type prior to the invention of public-key in 1970S COMP4690. HKBU
COMP4690, HKBU 4 Symmetric Encryption ⚫ Also called conventional / private-key / single-key ⚫ sender and recipient share a common key ⚫ all classical encryption algorithms are privatekey ⚫ was the only type prior to the invention of public-key in 1970’s

●●●●● ●●●● ●●0 Symmetric Cipher Model ●●● ●●●● Secret key shared by Secret key shared by sender and recipient sender and recipient Transmitted ciphertext Plaintext Plaintext Input Encryption algorithm Decryption algorithm output (e. g, DES) (reverse of encryption algorithm) COMP4690. HKBU
COMP4690, HKBU 5 Symmetric Cipher Model

●●●●● ●●●● ●●0 Requirements ●●● ●●●● o two requirements for secure use of symmetric encryption a strong encryption algorithm: the opponent should be unable to decrypt ciphertext or discover the key even if he has a number of ciphextexts together with the plaintext that produced each ciphertext o sender and recipient must have the secret key in a secure fashion and must keep the key secure o assume encryption algorithm is known assume a secure channel to distribute the key COMP4690. HKBU
COMP4690, HKBU 6 Requirements ⚫ two requirements for secure use of symmetric encryption: ⚫ a strong encryption algorithm: the opponent should be unable to decrypt ciphertext or discover the key even if he has a number of ciphextexts together with the plaintext that produced each ciphertext ⚫ sender and recipient must have the secret key in a secure fashion, and must keep the key secure ⚫ assume encryption algorithm is known ⚫ assume a secure channel to distribute the key

●●●●● ●●●● ●●0 Cryptanalysis ●●● ●●●● To exploit the characteristics of the cipher algorithm to attem pt to deduce a specific plaintext or to deduce the key ciphertext only o only know the ciphertext, the most difficult known plaintext o know some plaintext, ciphertext] pairs, to deduce the key chosen plaintext Plaintext chosen by cryptanalyst, together with its corresponding ciphertext generated with the key chosen ciphertext o ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the key e chosen text chosen plaintext& chosen ciphertext COMP4690. HKBU
COMP4690, HKBU 7 Cryptanalysis ⚫ To exploit the characteristics of the cipher algorithm to attempt to deduce a specific plaintext or to deduce the key ⚫ ciphertext only ⚫ only know the ciphertext, the most difficult! ⚫ known plaintext ⚫ know some {plaintext, ciphertext} pairs, to deduce the key ⚫ chosen plaintext ⚫ Plaintext chosen by cryptanalyst, together with its corresponding ciphertext generated with the key ⚫ chosen ciphertext ⚫ ciphertext chosen by cryptanalyst, together with its corresponding decrypted plaintext generated with the key ⚫ chosen text ⚫ chosen plaintext & chosen ciphertext

●●●●● ●●●● ●●0 Brute-Force Attack ●●● ●●●● o Attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained proportional to key size assume either know /recognise plaintext Number of Alternative Time required at 10 Key Size(bits) Key Time required at I encryption/ps encryptions 32 232=43x10 21s=358mus 2. 15 milliseconds 20=72x10 As=ll42 years 10.01 hours 212=34x103 21271s=54x102yeas 5. x 10 years 2168=37x1030 s=59×10yean 59 x 100yean 26 characters 26=4×102x1°15s=64x10yean 6.4 x I( years (permutation)
COMP4690, HKBU 8 Brute-Force Attack ⚫ Attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. ⚫ proportional to key size ⚫ assume either know / recognise plaintext

Classical Encryption ●●●●● ●●●● ●●0 Technique ●●● ●●●● ● Substitution letters of plaintext are replaced by other letters or by numbers or symbols ● Transposition e Combine substitution transposition COMP4690. HKBU
COMP4690, HKBU 9 Classical Encryption Technique ⚫ Substitution ⚫ letters of plaintext are replaced by other letters or by numbers or symbols ⚫ Transposition ⚫ Combine substitution & transposition

●●●●● ●●●● ●●0 Caesar Cipher ●●● ●●●● by Julius Caesar o first attested use in military affairs o replaces each letter with the letter standing three places further down the alphabet ● example Plaintext: meet me after the toga party Ciphertext: PHHW PH DIWHU WKH WRUD SDUWB COMP4690. HKBU
COMP4690, HKBU 10 Caesar Cipher ⚫ by Julius Caesar ⚫ first attested use in military affairs ⚫ replaces each letter with the letter standing three places further down the alphabet ⚫ example: Plaintext: meet me after the toga party Ciphertext:PHHW PH DIWHU WKH WRJD SDUWB
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Getting to Know Your Data.ppt
- 《计算机系统安全》课程PPT教学课件(信息安全与管理)第九章 防火墙.ppt
- 《计算机网络》课程教学资源(PPT课件讲稿)第六章 传输层.ppt
- 《PHP程序设计》教学资源(PPT课件讲稿)项目七 Ajax商品发布.ppt
- 《电脑组装与维护实例教程》教学资源(PPT课件讲稿)第14章 系统的维护.ppt
- 东北大学:《可信计算基础》课程教学资源(PPT课件讲稿)第五讲 分布式系统的安全(主讲:周福才).ppt
- 《运筹学与最优化方法》课程教学资源(PPT课件讲稿)第十章 智能优化计算简介.ppt
- 《3ds Max 9》教学资源(PPT课件)第8章 灯光、摄影机、渲染输出.ppt
- 编译程序构造 COMPILER CONSTRUCTION(PPT讲稿)原理与实践 Principles and Practice.ppt
- 上海交通大学:《程序设计》课程教学资源(PPT课件讲稿)第7章 间接访问——指针.ppt
- 《数据库系统概论》课程教学资源(PPT课件讲稿)数据结构实用教程(共十章).ppt
- 大连理工大学:《计算机网络》课程教学资源(PPT课件讲稿)Chapter 1 Introduction(roadmap,主讲:孙伟峰).ppt
- 《计算机网络基础》课程PPT教学课件(讲稿)第4章 IP协议.ppt
- 西安交通大学:《微机原理与接口技术》课程教学资源(PPT课件讲稿)第4章 存储器系统接口.ppt
- 《网页设计与制作》课程PPT教学课件(Fireworks Mx 2004)第九章 Firework图像处理.ppt
- 《数据结构》课程教学资源(PPT讲稿)二叉树和二叉搜索树 Trees, Binary Trees, and Binary Search Trees.ppt
- Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks.pptx
- 中国科学技术大学:《算法基础》课程教学资源(PPT课件讲稿)第五讲 概率分析与随机算法.pptx
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Data Preprocessing.ppt
- 《编译原理与技术》课程教学资源(PPT课件讲稿)运行环境.ppt
- 《计算机文化基础》课程教学资源(PPT课件讲稿)第九章 多媒体技术基础.ppt
- 数据挖掘10大算法产生过程(PPT讲稿).ppt
- 清华大学:高校信息化建设理论与规划(PPT讲稿).ppt
- 《汇编语言程序设计》课程教学资源(PPT课件讲稿)第二章 IBM-PC微机的功能结构.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)详细设计.ppt
- 同济大学:《大数据分析与数据挖掘 Big Data Analysis and Mining》课程教学资源(PPT课件讲稿)Decision Tree.ppt
- 上海交通大学:《网络科学导论》课程PPT教学课件(Network Science An Introduction)Chapter 4 Degree Correlations & Community Structure.pptx
- 中国科学技术大学:《数据结构与数据库》课程教学资源(PPT课件讲稿)第五章 串和数组.pps
- 最小生成树(PPT课件讲稿)Minimum Spanning Trees.pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第10章 内排序.ppt
- jQuery个人主页(PPT讲稿).ppt
- 《Internet技术与应用》课程PPT教学课件(讲稿)第3讲 双绞线制作和传输介质.ppt
- 中国铁道出版社:《局域网技术与组网工程》课程教学资源(PPT课件讲稿)第4章 Windows Server系统工程.ppt
- 《电子商务概论》课程教学资源(PPT课件)第十章 电子商务安全技术.ppt
- 《C程序设计》课程电子教案(PPT课件讲稿)第二章 基本数据类型及运算.ppt
- 中国科学技术大学:云计算基本概念、关键技术、应用领域及发展趋势.pptx
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)异常处理 Exception Handling.ppt
- 《计算机系统结构》课程教学资源(PPT课件讲稿)第三章 流水线技术.ppt
- 四川大学:Object-Oriented Design and Programming(Java,PPT课件)3.2 Graphical User Interface.ppt
- 《编辑原理》课程教学资源(PPT课件)目标代码生成.pptx