FNNC LNQMHMG - PowerPoint PPT Presentation

1 / 37
About This Presentation
Title:

FNNC LNQMHMG

Description:

'If Caesar had anything confidential to say, he wrote it in ... If anyone wishes to decipher these, and get at their meaning, he ... USA PATRIOT Act passes ... – PowerPoint PPT presentation

Number of Views:56
Avg rating:3.0/5.0
Slides: 38
Provided by: Harry112
Category:
Tags: fnnc | lnqmhmg | patriot

less

Transcript and Presenter's Notes

Title: FNNC LNQMHMG


1
FNNC LNQMHMG !
  • Sghr kdbstqd hr zants dmbqxoshnm

2
The Caesar Cipher (Suetonius)
  • If Caesar had anything confidential to say, he
    wrote it in cipher, that is, by so changing the
    order of the letters of the alphabet, that not a
    word could be made out. If anyone wishes to
    decipher these, and get at their meaning, he must
    substitute the fourth letter of the alphabet,
    namely D, for A, and so with the others.

3
Caesar cipher
  • Replace each letter by the letter that comes some
    fixed distance before or after it in the
    alphabet.

Shift 3
Gallia est omnis divisa in partes tres JDOOLD
HVW RPQLV GLYLVD LQ SDUWHV WUHV
4
Cryptography and National Security
5

Unless the issue of encryption is resolved soon,
criminal conversations over the telephone will
become indecipherable by law enforcement. This,
as much as any issue, jeopardizes the public
safety and national security of this country.
FBI Director Louis Freeh, March 30, 1995
6
The Stakes Rise After 9/11
  • Sept. 13, 2001 Sen. Judd Gregg (NH) calls for
    encryption regulations, saying encryption makers
    should be required to include decryption methods
    for government agents.
  • US market force would be used to constrain
    foreign makers of encryption products

7
A month later, encryption is OK!
  • October 24, 2001 USA PATRIOT Act passes
  • Vastly enhanced authorization for government
    surveillance in the interest of national security
  • Not one word about encryption!
  • Why did US Congress drop its efforts to control
    encryption, barely a month after the attack on
    the US?

8
Electronic Commerce!
9
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
10
Letter Frequencies
Source Wikipedia
11
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
12
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
13
e
e
e
e
e
e
e
e
e
e
e
e
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
14
e
t
t
e
t
t
e
t
t
e
e
e
t
e
t
t
e
e
e
e
e
t
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
15
e
t
t
h
h
e
t
t
e
t
t
e
e
e
t
e
h
t
t
h
e
e
e
e
e
t
h
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
16
e
t
t
h
h
e
t
o
t
e
t
o
o
t
e
e
e
t
o
e
h
t
t
h
e
o
e
o
o
e
e
e
t
h
o
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
17
e
i
s
s
t
t
h
h
i
e
t
o
t
e
t
o
o
t
i
e
e
e
t
o
e
h
t
t
h
e
o
e
o
i
o
e
e
i
s
e
t
h
o
i
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
18
e
i
s
s
r
t
t
h
h
i
e
t
o
t
r
e
t
o
o
r
t
i
e
e
e
t
o
e
h
t
t
h
e
o
e
o
i
o
e
e
i
s
r
e
t
h
o
i
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
19
e
i
s
s
r
a
t
t
h
b
l
v
i
h
e
t
o
t
r
e
t
o
o
r
t
i
n
e
n
f
e
e
t
o
a
e
h
a
b
l
u
q
t
f
t
h
e
o
e
o
i
n
c
o
n
m
f
e
e
i
s
r
e
t
h
o
i
d
n
Geoffrey Chaucer, Treatise on the Astrolabe, 1391
20
Substitution cipher
  • Replace each character of the message by another
    character
  • In general
  • Original message is called the plaintext
  • Encrypted result is called the ciphertext
  • Substitution ciphers easily cracked by frequency
    analysis

21
Cryptosystems
22
Cracking ciphers
  • Frequency analysis has been known since the 9th
    century.
  • Al Kindis Manuscript on Deciphering
    Cryptographic Messages

Yaqub Ibn Ishaq al-Kindi (801-873)
23
Mary Stuart, 1587
24
  • Russian monoalphabetic substitution key,
    recovered by Englands Decyphering Branch, 1728
  • From David Kahn, The Codebreakers

25
(No Transcript)
26
The so-called Binnu code assigns a number in
order to each letter in the Italian alphabet and
adds three to that number in the ciphertext so
that "A" is 4, "B" is 5 and so on. -- The
Register
  • If Caesar had anything confidential to say, he
    wrote it in cipher, that is, by so changing the
    order of the letters of the alphabet, that not a
    word could be made out. If anyone wishes to
    decipher these, and get at their meaning, he must
    substitute the fourth letter of the alphabet,
    namely D, for A, and so with the others.

27
The Koan of the Yogi
  • In theory there is no difference between theory
    and practice. In practice, there is.

28
Cryptologic lessons
  • Breakthroughs can render previously reliable
    cryptographic methods insecure
  • News of cryptanalytic breakthroughs travels
    slowly
  • Making strong encryption systems available does
    not guarantee they will be used

29
Vigenère Encryption
  • Use several Caesar substitutions and cycle
    through them
  • Sequence of substitutions determined by a secret
    key

Blaise de Vigenere (1523-1596)
30
Fight fiercely, Harvard! Fight! Fight! Fight!
X
W
T
N
U
N
Z
H JQRR ZPRU NOEJ GQXK LTVM IBWL YVG
31
Breaking Vigenère (1)
  • If the key has length K, then the ciphertext
    letters K positions apart are specified by the
    same character in the key
  • And thus is the result of a simple substitution
  • And thus can be attacked by frequency analysis
  • Example Suppose the key length is three

DJBK FJWO VJSW FKDS GFJD RKEM CNEJ JKSJ FKDJ SJSS
So the decryption reduces to doing frequency
analysis K times provided we know K
32
Breaking Vigenère (2)
  • To find the length of the key
  • Try different values for K, looking at every Kth
    letter of the ciphertext, and pick the one for
    which the frequency distribution looks like the
    frequency distribution for English.
  • Clever methods to do this by hand
  • Babbage, Kasiski counting double letters (1850s,
    1860s)
  • Friedman Index of Coincidence (1920s)
  • With computers, we dont need to be clever Can
    do brute-force statistics

33
Theory vs. Practice1917
34
One-Time Pad Key as long as plaintext
  • The Only Provably Secure Cryptosystem
  • No patterns, so nothing to analyze
  • But getting the keys from Alice to Bob securely
    is just as hard as getting an unencrypted
    message!
  • Unsuitable for e-commerce
  • Meet Amazon to get a key?

35
Beware Security Through Obscurity
  • Kerckhoffs Principle (1883)
  • The system must not require secrecy, and it
    could fall into the hands of the enemy without
    causing trouble. If a system requiring secrecy
    were to find itself in the hands of too many
    individuals, it could be compromised upon each
    engagement in which any of them take part.
  • Still regularly violated by Internet security
    start-ups and their credulous investors

36
DES The Data Encryption Standard
  • A 1976 public standard
  • 56 bit key
  • Long enough in 1976
  • With todays more powerful computers a brute
    force search through possible keys takes only a
    day
  • Superceded by Advanced Encryption Standard or
    AES 128, 192, or 256 bit key
  • AES not cracked as far as we know

37
But the Big Problem Remains
  • How to Get the Key securely from Alice to Bob?

??
To be continued
Write a Comment
User Comments (0)
About PowerShow.com